Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Ted Talk - Top Hacker Demo

 

Rating :

 

Comments

 
  • jwren2
    jwren2 at December 12,2016
    The heist that Gonzalez did was crazy! 90 million credit cards! I'm sure he thought he was invincible at the time. There are so many businesses that aren't security minded and are easy targets. Unfortunately, these small businesses could easily be shut down. I find it very interesting that this didn't make headlines and that they try to keep things like this under wrap.
  • jgala
    jgala at December 12,2016
    Multiple exploits on day to day technology can lead to a huge heist that was pulled off by the criminal but what we forget is that as the crimes are getting sophisticated we as law enforcement or investigators also need to step-up our game so as to fight against such criminals. We need to educate people on how to use technology wisely so that it can help us avoid sharing out personal details to anyone over the internet or even phone call.
  • CyberRanger
    CyberRanger at December 14,2016
    Gonzalez was smart. Unfortunately not that smart to know you do not go in the bank and withdraw the money yourself. But it is not good that the government is purposely not telling it citizens how unsafe our financial institutions are with our money.
  • kkelani
    kkelani at December 15,2016
    Who knows how many of these types of financial hacks that occurs every given day.
  • ahammes12
    ahammes12 at December 16,2016
    The video goes to show just how vulnerable smartphones can be to cyber-attacks. Considering most people take their phones with them almost everywhere, the potential for espionage and financial damage is very serious. However, the user can prevent some mobile device attacks by simply being cautious about what they download. Some install apps without reading the permissions cautiously. A lot of attacks on mobile devices recently have been due to users installing specific apps via unofficial streams, specifically jailbreaking.
    • «
    • 15
    • 16
    • 17
    • 18
    • 19
    • 20
    • 21
    • 22
    • 23
    • 24
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved