This episode of cyber Secrets was released in May, 2014 How do attackers identify possible weaknesses? This video covers the first step in foot printing the target