Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Defining Cyberwar

 

Rating :

 

Comments

 
  • aholcom2
    aholcom2 at November 14,2015
    I have always enjoyed reading Mandiants/FireEyes APT reports about the latest malware campaigns. This was a very cool video showing how Chinese hackers hack into victim computers. One thing that confused me in this video is whether the person on the computer is the actual hacker, and if so how is Mandiant viewing the computer and how is that legal?, or is it simply another Mandiant employee impersonating the hacker.
  • tshafi
    tshafi at November 15,2015
    This video is very revealing as to the level of sophistication that these hackers have. I am impressed by this and want to learn more about it. I am further inspired to learn about ethical hacking and set up of my own hacking test network system.
  • busterhax
    busterhax at November 27,2015
    Interesting to see whats going on on the back end of things like this.
  • haygaff
    haygaff at December 19,2015
    Even the bad guys have set backs. They just kept coming. Smart move to uninstall the software on the machine after use. The USG over the years has stepped its game to try to keep up with the growing threat of other host countries cyber attack and intelligence forces but this is a never ending battle. The battle lines will continue to get blurred as technology gets better and better.
  • BrianDaugette
    BrianDaugette at January 25,2016
    This is a really interesting video and I wonder how Mandiant was able to observe the hacker's activity. Now that this video is a few years old it would interesting to see Mandiant put out another one in which they detail how or if the APT 1 actors have changed their tactics since the release of the APT 1 report and this video. Do they still use Gmail, lightbolt, ghostrat, etc., or have they moved on to other tools. Do they use different IP addresses now, and how have they changed how they manage their hop point infrastructure, if at all? This is also a really good PR piece for Mandiant, and started the trend of commercial companies putting out Cyber threat reports on State sponsored actors/tools.
    • «
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved