Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Cybercrime Goes Mobile

 

Rating :

 

Comments

 
  • llew5537
    llew5537 at November 26,2014
    I love smartphones but definitely have to be more careful about downloading so many apps.
  • tristayifei
    tristayifei at February 04,2015
    I used the smartphone mainly for messages, phone calls, Wechat, and map. I never thought about smartphones can own such a strong power. This remind me a recent story I just read couple days earlier. A staff from National Bureau brought a hard drive to a decryption person. There were two things planing here. On the National Bureau side, to decipher is just a cover, and the real thing is to enter the server. On the decryption side, he want to take this opportunity to steal the content of the hard drive. We should really follow the words Mr. Ferguson said, always have the password ready, stick to the official channel, check the apps’ reputation and the permission information the app asking for, and lastly, always download at a safe environment.
  • kcn278
    kcn278 at February 05,2015
    Loved the way Mr. Ferguson narrated the point of view from both perspective. I feel part of the reason why people carelessly download in that manner is because they are either used to having an anti virus software to warn them of suspicious activity or assuming that the victim is using an iOS device they will still believe that iOS is immune to viruses. Around the time iPhone 3 and 3g were released, many people spread rumors about how iOS is immune to viruses. Users may still believe that.
  • marinoms
    marinoms at February 05,2015
    I believe that this video illustrates a point that is only going to become worse. Smartphones are now used as social media device, map/tracking device, banking tool, phone/text, and as a work phone with email and access to server that it is the perfect devicd to hack. You essentially gain access to every part of a persons life. This is pretty scary yet in a computer forensic point of view, an excellent way to get in the criminals head and view almost everything about their life.
  • DPerry
    DPerry at February 16,2015
    This is of course where everything is going. Much worse though will be the biometric repercussions that will come with the apps associated with human bio-implants. Not to mention the possible breach in national security and/or personal security.
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved