Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Cybercrime Goes Mobile

 

Rating :

 

Comments

 
  • sliu23
    sliu23 at October 28,2015
    The evolution of malware from previous ones is good way to accelerate development cycles. The malware writer can use sophisticated technique applied in the previous malware to achieve his goals. However, it would be easier to identify the malware developer and even attacker. Shamoon virus is similar to the Flame virus, which indicates us that the virus shares the similar background with Flame virus. Fortunately, Shamoon virus just modified the MBR to destruct the Windows system boot procedure and didn’t cause physic damage to the Saudi Aramco oil infrastructure. Otherwise, the environment and workers would also be endangered by this attack. But what about the next attack?
  • zsesay
    zsesay at November 05,2015
    Like I commented in the past video, these hackers needs psychiatric evaluation. Using Shamoon virus to wipe/delete a system, I cannot image such people exist in this universe.
  • gcorker
    gcorker at November 14,2015
    Good analysis. This video and some of the articles I read on Shamoon highlighted that it was not an especially sophisticated virus. It's crazy to how destructive something can be that is considered to be not too difficult execute.
  • tshafi
    tshafi at November 15,2015
    This video was good in that it showed aspects related to the sophistication and scope of the Shamoom virus. It points to evidence of it being an inside job, the signs of it being political, the scale of devastation and evidence that a hacktivist group was involved. It is illuminating in the way that we see certain characteristics can lead us to notice certain things about the virus. I learned that this virus was probably not written from scratch, which suggests that there are other organizations responsible for its existence and other potential victims of the virus.
  • Beggsse
    Beggsse at November 20,2015
    The video nicely summarizes the main ideas for a higher level briefing on the Shamoon virus. The analytical aspects are most interesting as attacks are compared to previous attacks for similarities and differences, as to sophistication, motivation, insider or outsider, targets, and goals. The fact that this non-nation state hack was able to infect and wipe clean 30k computers reveals the vulnerability that all companies face especially those hacked with the help of insiders. Hopefully the knowledge gained will help prevent future attacks by both hacktivists as well as those seeking financial gain.
    • «
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved