Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Cybercrime Goes Mobile

 

Rating :

 

Comments

 
  • brober15
    brober15 at December 03,2015
    I had heard about the attack on Saudi Aramco but just learned that it was likely an insider threat. This highlights that no matter how secure you think your systems are, the human element will always make things unpredictable. Whether it's someone's poor security practices or someone with malicious intent, it's impossible to plan for everything. So you also need a plan for what to do when things inevitably go sideways.
  • busterhax
    busterhax at December 10,2015
    I can't believe how destructive this is. It goes to show that you can have all of the security in the world and that will never protect against an insider threat.
  • sagarwa9
    sagarwa9 at December 11,2015
    First time I ever heard about Shamoon virus. Another piece of very destructive malware aimed at energy sector companies.
  • haygaff
    haygaff at December 19,2015
    Like many of the other comments, this is the first time that I have heard of this virus. Is this the first insider threat?? My first and biggest questions, how did the access get gained? Employees.....With that said you have to admit that a delete virus the deletes data, boot sector, and itself then replaces itself with something. It is like the equivalent of the last stand in war.
  • mcoates1
    mcoates1 at February 01,2016
    This is interesting. Much of the time, we hear about cyber threats from the outside. However, this is one that was manifested from the inside. Especially from a drop as simple as plugging in a USB. Similar to where I work, we are told not to plug in any unauthorized USB devices into our company machines. This video does a great job of explaining why.
    • «
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved