Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Cybercrime Goes Mobile

 

Rating :

 

Comments

 
  • aholcom2
    aholcom2 at September 28,2015
    This was a very informative video describing how the Shamoon malware functioned. I did not know that Shamoon was related to the Wiper and Flame malware, and it was also interesting that the speaker in video believes the malware came from a hacktivist group. Its scary to think that a non-government body can create malware that can target and cause so much damage to critical system companies such as energy companies.
  • aholcom2
    aholcom2 at September 28,2015
    This was a very informative video describing how the Shamoon malware functioned. I did not know that Shamoon was related to the Wiper and Flame malware, and it was also interesting that the speaker in video believes the malware came from a hacktivist group. Its scary to think that a non-government body can create malware that can target and cause so much damage to critical system companies such as energy companies.
  • klloyd6
    klloyd6 at October 05,2015
    I found this Shamoon virus especially interesting because of how it was dropped. It initially being introduced by an insider on a USB and determined to be politically rooted makes you wander what other insiders are doing. Makes you question the members of your company and their intentions. The video said the attacker was looking for a specific folder while targeting large organization. Which again makes you second guess your workers loyalty, especially if they go about doing something so negatively driven.
  • bmanahan188
    bmanahan188 at October 21,2015
    Interesting to see both the evolution of malware from previous ones and the determination of possible motives from its actions. In this case the burning flag jpeg gave a strong indication of likely political motives. I enjoyed the breakdown of the separate stages the malware when through, from gaining access, wiping files, and reporting back. Malware follow a similar methodology, give or take, and understanding one can provide insight into another, especially since they can directly reduce code.
  • jhilldog77
    jhilldog77 at October 26,2015
    It seems as if corporations should disable all USB drives on corporate computers as the DoD and government mandates. This would make USB drops impossible; but i'm sure hackers would still find ways to drop their malware it just would be much harder to do without USB access. Interesting video for sure and scary to be able to delete data including the master boot record. Also 30k computers were infecte; amazing how these things spread once they are on the network. Anti-virus seems to always be one step behind the most sophisticated attacks.
    • «
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved