Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Cybercrime Goes Mobile

 

Rating :

 

Comments

 
  • BrianDaugette
    BrianDaugette at March 27,2016
    Interesting and well done presentation on the Shamoon malware/destructive attack against SaudiAramco. Interesting that part of Flame was used in Shamoon, showing that when it comes to cyber attacks, once the genie is out of the bottle it can't be put back in again. Hackers are going to take what is available and repurpose it to their own ends. I wonder if the nation state responsible for Flame considered the repercussions if their malware was discovered. Surely they knew other hackers would use the code if it was discovered, especially considering how sophisticated it was. It's also amazing that so many computers were infected with this. But if there was an insider, as alluded to in the presentation then I guess someone on the inside could have went around infecting machines with the virus.
  • CCotton10
    CCotton10 at April 08,2016
    Interesting video. It doesn't seem they have much information on who committed the attack but can make some distinction about state sponsored, insider or hactivist. I was unaware of these distinctions previously.
  • danielm8
    danielm8 at April 19,2016
    Shamoon and Stuxnet are different in that their goals are different. Shamoon is also not as sophisticated and was internal attack. If it is not sophisticated enough to be a nation state written piece of malware. Does that mean the top level hackers are all working for one government or another?
  • stadkal
    stadkal at April 21,2016
    Every security provider concentrates in protecting the company from any external attack and have few checkups for the insider activity. After having look over this virus, everyone will give equal importance to both insider and outsiders activity on there network.
  • jnegron
    jnegron at April 27,2016
    Excellent video if you want to understand the basic ideas of how virus works.
    • «
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved