Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Defining Cyberwar

 

Rating :

 

Comments

 
  • randerson0
    randerson0 at July 21,2015
    I want to know how they got this video. This doesn't seem like something you would just hand over.
  • araut
    araut at July 21,2015
    How did they see how the gmail was created? and who gives their real phone number while creating an account to be used for spear phishing. This is either a re-enactment mandiant made after doing some reverse engineering or some script kiddie.
  • 428Mach1
    428Mach1 at July 22,2015
    An excellent (and brief) overview for non-technical users of 'the web' alerting and informing them via showing how a hacker - here an actor (that term is used repeatedly throughout the 5 minute video) - establishes a presence to do his nefarious deeds. I was amused (amazed) that the actor provided a call-back number for the Shanghi province. Hmmmmm. Might a co-conspirator perform the set-up stateside ? I`d think that THOSE accounts - associated with a number in China MIGHT be on a "Watch list". Oh, the APT stands for Advanced Persistent Threat. I like that term and all that it implies. Go to the Mandiant {Fire Eye} site and read the full version of any of their reports.
  • hpasekov
    hpasekov at July 22,2015
    I have always thought that one needs to be a good programmer to be able to hack into a computer system; however, it seems that these days, one uses one application to listen to open ports, another application to gain access to the system, and a different application to transfer needed files.
  • bmanahan188
    bmanahan188 at September 06,2015
    Really enjoyed the demonstration of an APT and the descriptions of tools used. This really drives home the point of the danger of APTs and all the methods that they can utilize to get into your systems.
    • «
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved