Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Cybercrime Goes Mobile

 

Rating :

 

Comments

 
  • dmoraval
    dmoraval at March 18,2015
    This attack is unique and uncommon. The malware reported to a server inside the company. Uncommon behavior, malwares usually report to a server on Internet, outside attacked network. It is a destructive malware, wipe files and destroy MBR. Check this video to understand some basic ideas how virus work.
  • connellyt
    connellyt at March 21,2015
    This was a good high level overview of the Shamoon malware attack. It would be nice if the video did a deeper dive into the malware itself..
  • jczarny
    jczarny at March 29,2015
    Good video on the Shamoon malware. I never knew why It was named Shamoon until today, so that's a bonus. I found it interesting how he tied the malware to activist by way of the burning flag, and the limited complexity of the malware vs nation state capabilities.
  • tristayifei
    tristayifei at April 08,2015
    Professor Zulfikar Ramzan discusses the Shamoon Virus, and this is the first time I heard about this virus. I am surprised by the way it operated, like dropping itself via thumb drive and insider, and spread through network. The Shamoon Virus is associated with malware and deletes data from the system, so the MBR won’t function anymore. Also I noticed that he mentions that he suspects people who created Shamoon are from hacktivist, who is motivated by political not financially.
  • Ahmed
    Ahmed at April 16,2015
    Shamoon was a nightmare for the whole Saudi Community, it made a huge damage into Aramco infrastructure...and it took time to figure out what it did, how did it get to the system, and the amount of damage happened.
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved