Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Ted Talk - Top Hacker Demo

 

Rating :

 

Comments

 
  • pdonyina
    pdonyina at April 25,2016
    The sheer extent of the human victimization caused by Gonzalez and his organization is unparalleled
  • jnegron
    jnegron at April 27,2016
    I like the video is short and very informative. This happened @2005 and sounds like today. The "Analyst" has an excellent point, hacker = hacker win the best but hacker = GOV always the GOV will win.
  • Ksdonovan
    Ksdonovan at May 05,2016
    I have been a victim of credit card fraud a few times in the past ten years and I would like businesses to spend more time protecting our data rather than covering up the crime. Someone mentioned new chip technology preventing certain types of theft, but not when a hacker steals information from a company's database.
  • jpnick99
    jpnick99 at June 12,2016
    The contrast between the average amount of money stolen during a conventional bank robbery versus a cyber attack surprised me. I assumed it be more, but not that magnitude. I see the effect cyber criminals have on financial institution security personnel. It's all about risk management and identifying the threat. The obvious threat to the business and ultimately the bottom line is obviously no longer the man with a mask and a gun. It should be focused on network security and cyber criminals.
  • ronnypaladino
    ronnypaladino at June 14,2016
    It seems like he was mostly doing "drive by" these companies, exploring the WAPs and gaining access to the network. I wasn't clear on the bank robbery aspect of it as I don't believe that he actually hacked a bank according to the video. But, there were a number of big hacks relating to credit information theft, to include from major companies such as Target using similar tactics. Strong security measures and policies need to be implemented, especially when dealing with personal and financial information.
    • «
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • 17
    • 18
    • 19
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved