Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Cybercrime Goes Mobile

 

Rating :

 

Comments

 
  • haneen
    haneen at May 05,2016
    First of all, for example, if the company that was under attack by shannon had it's backup plan, the damage won't be that big. Secondly, if it was created because of political reasons, I don't think that political agencies will allow weak people to work inside, so it's not going to be an attak caused from inside ( for this situation). Finally, if its going to be executed from outside then as he said, it's going to need some information to get into the network, and some credentials. It is a good tool, but not the best.
  • pdonyina
    pdonyina at May 06,2016
    The people who write viruses shifted their intentions from notoriety to profit. Since then, most viruses have been designed to remain undetected and unobtrusive
  • pdonyina
    pdonyina at May 06,2016
    Computer forensic experts who have inspected the Shamoon code have stated that Shamoon was not an especially difficult virus to create, so copycat viruses are quite possible
  • pdonyina
    pdonyina at May 06,2016
    nice!! It is a destructive malware that corrupts files on a compromised computer and overwrites the MBR (Master Boot Record) in an effort to render a computer unusable
  • pdonyina
    pdonyina at May 06,2016
    The attack replaces the deleted files with JPEG images - obstructing any potential file recovery by the victim. This is bad
    • «
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved