Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Ted Talk - Top Hacker Demo

 

Rating :

 

Comments

 
  • kticfrs500
    kticfrs500 at September 20,2016
    I feel bad for large retail companies like Macy's - who are already having to close stores - concerning information security issues because they are dealing with this problem in two-fold. First, in order secure their customer's money they have to invest in costly information security measures. Second, in order to keep them coming back, they must maintain their (the customers who are supplying their livelihood) confidence in many aspects - customer service and security being a few. So, what must I - as a consumer do - when I wait 30 mins in line to purchase an item only to be assisted by an overworked employee who has only gotten an 10 cent raise in the last 8 years?
  • dbegum
    dbegum at September 22,2016
    I find it interesting that, this guy stole 1+ millions of credit card information and made another attempt in 12 months later he got 90+ millions. To me 1 million isn’t the smallest amount and if everyone were to get involved; I don’t see how he would have gotten that far. What upsetting is that, financial instruction rather worry about their reputation when there are ultimately are the ones getting hit the most. If that had made the news, Gonzalez would have been more cautious with his act. They could have looked at the trend of the retailers getting hit and if they have CCTV, it could have help little to see if anyone is doing anything suspicious on their phone or any electronic devices. Obviously, Miami isn’t a small place and chances of getting to him is pretty slim. But an attempt to stop him early on could lead to others smaller cyber criminals.
  • kbacon5
    kbacon5 at October 06,2016
    I remember reading about this I believe this was the TJ Maxx hacker. I thought from what I read earlier he found a store using a wireless network with no encryption or very weak encryption and was able to get into the credit card information through this network which helped him get into the main store network I guess. Like other users commented I thought it was interesting they referenced Live Free or Die Hard because that is one of the most technically inaccurate movies ever made from my understanding, up there with the movie Hackers with Angelina Jolie. But it was a very good video and it is scary these hackers can bypass security so easily.
  • BBurgess
    BBurgess at October 07,2016
    Its makes sense. It takes me two hands to count how many times I have had to change my credit card numbers and get a new card sent to me, because some retailer I used had their system compromised and my credit card number was stolen. Then to off load the product they sell them in chunks of numbers on black market sites to foreign and domestic thieves. It is all too common these days and you have to know that it happens way more than you think and we only hear about a fraction of the times. Would you give a bank your information and let them hold your money, if their security was easily compromised? I think we'd agree, no one would.
  • Safiyah
    Safiyah at October 19,2016
    As a few have stated before, it is cringe-worthy to see how drastically more damaging this type of crime is than a physical theft. It is also worrisome that information from so many millions of credit cards could be stolen by this one perpetrator, let alone the potential damage multiple thefts can result in, as well as the fact that this type of crime is often linked to identity theft which is one of the most harmful crimes because it is so difficult for victims to recover from (if at all). I truly hope to see more about how to prevent and detect this type cyber crime appearing in Forensic Accounting programs as a requirement since it has clearly become a necessity, based on threats to financial security highlighted in this short clip.
    • «
    • 13
    • 14
    • 15
    • 16
    • 17
    • 18
    • 19
    • 20
    • 21
    • 22
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved