Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Cybercrime Goes Mobile

 

Rating :

 

Comments

 
  • mariawhit8
    mariawhit8 at April 29,2015
    I've never heard of the Shamoon virus...but it just goes to show that even in 2012 people still haven't learned not to pick up unknown USB devices and stick them into their systems.
  • skatakam
    skatakam at April 29,2015
    This is quite destructive. The way it erases MBR tells us the technical ability of the malware authors of shamoon.
  • tlawless
    tlawless at July 09,2015
    No amount of virus scanning can defeat an insider. Yet again we see that people are more important to system and network security than the HW/SW protection mechanisms themselves. I think the use of COTS applications or shared code bases is a driver of the skyrocketing malware volume we see each day.
  • achantha
    achantha at July 12,2015
    This is my first time hearing about this virus but I can see how destructive it was. I agree with @knc278, I also believe someone on the inside have strong opinions about what was being done and may have disclosed that information to someone involved with hacktivist or may have been involved with it themselves.
  • mrgodfrey3
    mrgodfrey3 at July 15,2015
    Shamoon can spread from an infected machine to other computers on the network. Once it infects a node, the virus continues to gather data from the network, upload them to the attacker, and erases the data fro the source. Finally the virus overwrites the master boot record of the infected computer, making it unbootable. This virus has attacked networks in the Saudi energy sector and it still looms as a destructive threat.
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved