Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Cybercrime Goes Mobile

 

Rating :

 

Comments

 
  • jharg409
    jharg409 at December 14,2016
    So, Shamoon is less sophisticated than Flame but it still did it's job. It amazes me that things like this, less sophisticated, still managed to get by top minds. After more devastating malware, why isn't there a think tank that accesses all the ways malware like this can succeed?
  • CyberRanger
    CyberRanger at December 15,2016
    WOW. Watch out Stuxnet. This virus would definitely give it a run for its money. Interesting to see someone created this for Overt destruction.
  • kkelani
    kkelani at December 15,2016
    I have never heard of Shamoon virus but I know understand that it is extremely disruptive as it is mean to delete and wipe away data and information. I believe this is a virus best used for espionage and by insider threat.
  • kticfrs500
    kticfrs500 at December 15,2016
    I wonder if the ‘hacktivist’ group who executed this successful penetration and destruction was against the business dealings of that Saudi Arabian gas/energy company with the United States (given the jpg file of a burning American flag). I wonder if the hacktivist was American or from another country in the Middle East? And why is it always that USB Drive! :-[ And yes, given that the effect was to disable the company’s day to day operations for a period of time, the intention of this attack has to be politically related rather than financial.
  • jgala
    jgala at December 15,2016
    Shamoon is another weaponized code launched into the internet. It bypasses level of stuxnet with ease. Especially with oil war between multiple countries it is hard to suspect who could have framed the attack. It virus is highly potent if launched out on large-scale especially if an insider attack occurs on a large corporation.
    • «
    • 12
    • 13
    • 14
    • 15
    • 16
    • 17
    • 18
    • 19
    • 20
    • 21
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved