Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

IBM

Android Malware That Acts Like a Person and AI Agents That Act Like Malware

IBM via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore cutting-edge cybersecurity threats in this 42-minute podcast episode that examines the intersection of artificial intelligence and malicious activities. Discover how AI agents can be weaponized for cyberattacks, learn about sophisticated Android malware that mimics human typing patterns, and understand social engineering schemes targeting stock market manipulation. Delve into the growing bug bounty landscape and examine why governance frameworks consistently lag behind technological implementation. Gain insights from cybersecurity experts as they analyze behavior-based threat detection tools, discuss the Herodotus malware strain, and explore brokerage-focused attack vectors, while addressing the critical AI governance gap that leaves organizations vulnerable to emerging threats.

Syllabus

00:00- Intro
01:08 - Malicious AI agents
20:39 - Herodotus malware
27:09 - Brokerage attacks
33:30 - Ballooning bug bounties

Taught by

IBM Technology

Reviews

Start your review of Android Malware That Acts Like a Person and AI Agents That Act Like Malware

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.