Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Carders & Skimming - Turning credit card theft to cash

 

Rating :

 

Comments

 
  • tlawless
    tlawless at July 04,2015
    A quick comment on the presenter's mention of the world of connected devices. Everything we use today, from phones, cars, home sensors, toasters, egg trays, etc. will eventually be embedded with a network device to allow connectivity. The world of the famed "Internet of Things" (IoT for short) is upon us and it brings with it the scourge of exploitation that has plagued the world of PCs for decades. While an egg tray might not contain data that a user would potentially care about it could provide an easy access hop point to a device that does contain interesting information like your phone or your home security system. It is no longer appropriate for manufacturers to develop to their product threat models in isolation as they must now consider all devices and scenarios that could potentially come into contact with them. Otherwise they will become easy prey and will put their customers at risk.
  • achantha
    achantha at July 12,2015
    I agree with @tlawless in saying that everything we use from phones to egg trays will eventually be embedded with a network device to allow connectivity. As technology continues to advance and consume our every day lives, it increases our vulnerability to cyber hacks and attacks. As we take precautions to protect our information on one device, it may be vulnerable on another device.
  • logybomb
    logybomb at July 14,2015
    I think this was a great presentation. I don't think many people think enough about digital security within their day to day lives. I think we tend to only think about it when we are sitting in front of a computer screen, or nowadays more probably think about it while using the cellphone. I like how he broke down and compared the hackers view of SSL encryption with fighting malaria. Two totally different motivations, but the process is carried out with the same game plan.
  • araut
    araut at July 21,2015
    With any new technologies, someone will always find a way to exploit it. Any new tech that is built for convenience will have some drawbacks. What was very interesting , was how they were using tech / hackers thinking for killing mosquitoes and to eradicate malaria.
  • 428Mach1
    428Mach1 at July 22,2015
    This is two videos in one; the first captures your attention effectively with demonstrations of the vulnerabilities of technologies, "manual" locks, RFID credit cards. He then transitions into one of intellectualventureslabs.com accomplishments by doing a segue by mentioning hackers` mentalities and how they take on "some of the problems humans have" by using "every kind of scientist and one of every tool in the world to work on crazy invention projects". Entertaining and inspiring. I would offer to test that mosquito zapper system when I vacation in the Outer Banks . (8-D
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved