Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

How to Hack using Metasploit

 

Rating :

 

Comments

 
  • 428Mach1
    428Mach1 at July 20,2015
    I get the feeling (as a former programmer) that Stuxnet was a collaborative effort involving a diverse team; Windows programming gurus, Seimens PLC operating system and nuclear scientists. I would speculate that the "sponsor" had access to resources that your "average" hacker would not. I also speculate that there are more viruses/trojans like Stuxnet that we DON`T hear about. Interesting presentation, too.
  • TimWalsh
    TimWalsh at July 21,2015
    This was a great explanation of Stuxnet for people who are not necessarily tech whizzes; but it also covered a lot. I really like learning about Stuxnet because it exists at the Nexus of cybersecurity and international affairs/national security. Issues like this are complex because you need technical knowledge to understand the virus; but also the foreign policy experience to understand the politics at play that motivated Stuxnet. I think videos like this one would be great to show to policy-makers to bridge the gap between the technical and non-technical.
  • randerson0
    randerson0 at July 21,2015
    Stuxnet won't be the last trojan horse/worm of its kind. It will be a blueprint for future malware. It's scary to think that someone could go after software not as obscure as Siemen's Step 7.
  • kkrishna
    kkrishna at July 22,2015
    Truly astonishing. It really makes you wonder how vulnerable infrastructure is to a cyber attack. This type of attack is very alarming in the sense that most of our infrastructure would be unprepared for something like this and it could cause serious problems.
  • jhilldog77
    jhilldog77 at September 17,2015
    Amazing and terrifying at the same time. The sophistication of the attack makes you wonder who did it...and in only a 500kb file. The US in particular needs more government funding/programs for training and hiring cyber police to ensure this does not happen to our critical defense and infrastructure computer information systems.
    • «
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved