Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Defining Cyberwar

 

Rating :

 

Comments

 
  • zsesay
    zsesay at September 16,2015
    Wow, this is very serious. It seems as if Chinese, if not stopped, would one day shut the world down. A lot of these hackers are originated from China. I think technology should have a constitution and policies in place that would protect hacking into another country, the government of that country should be penalized. This way, all countries would work diligently to catch these bad people. It is interesting that despite all the effort to stop these hackers, they have new ideas everyday.
  • jhilldog77
    jhilldog77 at September 17,2015
    It seems as if the key to stopping these types of hacks is to eliminate back doors and security vulnerabilities -particularly on Windows OS. A constant battle for sure to stay one step ahead of the hackers as they continue to get more sophisticated with their methods and techniques. GUI hacking tools are making it much easier as well for the hackers to execute with ease.
  • sagarwa9
    sagarwa9 at September 17,2015
    This video just proves how important it is to have some basic knowledge of security so that you don't become prey to such incidents where you end up revealing crucial information to a hacker unknowingly.
  • ycheng8
    ycheng8 at September 21,2015
    It seems like APTs are really dangerous. The hacker can utilize not only this application but also other tools to steal lots of information from the victim. This video makes me feel likes that the Chinese hackers attacked other countries for specific purpose, especially for Taiwan.
  • sliu23
    sliu23 at September 21,2015
    This video shows us that the people is a critical component for a security system. No matter how solid the security system is, if there is someone cheated by the phishing e-mail from the adversary, the system is exploited. Of course, the system in the video is not much secure. Therefore, besides spending plenty of resource on the security technique application or development, system administrators also need to pay more attention on the security awareness training on employees. Moreover, I noticed that the attacker in this video use the phone number and IP address which could exploit his location and identity to login the Gmail. Does this kind of behavior come from his carelessness or arrogance? It is unwise for a normal hacker to exploit himself in such way even for a national sophisticated hacker.
    • «
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved