Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Defining Cyberwar

 

Rating :

 

Comments

 
  • jgala
    jgala at November 06,2016
    GhostRAT is widely used tool for hijacking systems along with performing various tasks on the hijacked system. The good part about the video is it shows various methods on how systems can be compromised which is really helpful to avoid such attacks in future. Mandiant has acquired a lot of in-depth details which are used for internal training but some of them, which are released to public are useful. As the video is old that is the reason that Gmail got tricked into creating account based on IP & not on the phone number confirmation which has been patched so far.
  • jgala
    jgala at November 06,2016
    GhostRAT is widely used tool for hijacking systems along with performing various tasks on the hijacked system. The good part about the video is it shows various methods on how systems can be compromised which is really helpful to avoid such attacks in future. Mandiant has acquired a lot of in-depth details which are used for internal training but some of them, which are released to public are useful. As the video is old that is the reason that Gmail got tricked into creating account based on IP & not on the phone number confirmation which has been patched so far.
  • sam
    sam at November 11,2016
    It is very helpful to see such kind of back door made for exploitation. Sometimes I wonder how come the designers of such devices unable to figure out such kind of weakness in the system. I'm assuming that one of the designing criteria is making sure the system is secure. I feel that we are carrying a decade-long problem, which needs to go back and fix everything. Instead thinking ahead of time come up with really better secure stuff before releasing to the market
  • sam
    sam at November 11,2016
    It is very helpful to see such kind of back door made for exploitation. Sometimes I wonder how come the designers of such devices unable to figure out such kind of weakness in the system. I'm assuming that one of the designing criteria is making sure the system is secure. I feel that we are carrying a decade-long problem, which needs to go back and fix everything. Instead thinking ahead of time come up with really better secure stuff before releasing to the market
  • Safiyah
    Safiyah at November 21,2016
    I can't help but have the word "unsettling" come to mind over and over as I watch more of the videos in this gallery. As several others have commented, it is majorly worrisome how easy it seemed for this (persistent) hacker to steal and upload the victim's files. More concerning is the fact that I have known folks who would actually open up those .zip attachments on the phishing emails if not for my insistence otherwise. Thinking about the number of hackers out there who are dedicated to stealing and the sheer number of people who are highly susceptible to falling victim is a scary thing; people all over the world need to be better educated on cyber-security to have a chance at protecting themselves in this technologically pervasive age .
    • «
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • 17
    • 18
    • 19
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved