Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Everyday Cybercrime - and what you can do about it

 

Rating :

 

Comments

 
  • araut
    araut at July 21,2015
    I had seen some with the ones that hijack your screen and display fake F.B.I Warning. or take picture of user via webcam for few seconds and display that as warning. Those are not that hard to remove. but this one seems like it encrypts the file and you basically loose it forever.
  • TimWalsh
    TimWalsh at July 21,2015
    Very good reason to back up your data, be prudent, and update your antivirus (but remember that it wont catch everything!) This video was broken down very logically and simply.
  • hpasekov
    hpasekov at July 22,2015
    This is a great video showing how cryptolocker works. It is important to know that even a file with .pdf is not necessarily a pdf file. People should be aware of this fact that an executable file can hide under any extension. That's the last file extension that counts; it was an .exe extension in this case.
  • aholcom2
    aholcom2 at September 04,2015
    This was a very interesting video demonstrating Ransomware. This was the first time I have seen a video showing how Ransomware can be used to encrypt all of a user's files. As others have mentioned above, it is good to periodically backup your data and practice good computer habits (i.e.: don’t download random files from the Internet, don’t click suspicious email links, etc.). Unfortunately this type of attack is probably only to get even more popular due to many people paying the ransom demands.
  • brober15
    brober15 at September 09,2015
    One of the fascinating things about ransomware to me is that there is a customer service component. They provide instructions for paying the ransom, make it easy to enter the payment information, and actually return your files unencrypted so that new victims will at least consider paying. I imagine that since a lot of the victims don't have much technical skill, some thought was given on creating a simple, easy to follow UI. And apparently you can even get "support" if you have issues. Some legitimate companies don't even go that far.
    • «
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved