Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

The Silk Road: The Rise and Fall of the World's Largest Online Black Market

 

Rating :

 

Comments

 
  • danielm8
    danielm8 at April 09,2016
    This video is kind of old, posted in 2012, so it is a little outdated. I am sure there are new securities in place as well as new ways for criminal access to phones. The most important thing in protecting yourself is to know the applications you download and do not download things you do not trust. I think it is easier to protect your phone than to protect your computer because applications must have permissions to download. On the computer, there are multiple ways of criminals getting in that do not need permission and the user would never know.
  • nick
    nick at April 17,2016
    Really well put together commercial for TrendMicro. Long haired, tattooed gentleman, seemingly an ex-agent provocateur that knows all about hackers. The marketing for this segment is well done, evil hackers stealing money from innocent victims. Not satisfied with ripping off people that just want to play games on their phone, the evil hacker targets unsuspecting corporations. Then, at the end, the pinch for security and management software. No doubt Rik Ferguson is a well respected member of the information security industry, but this video struck me as an effort to scare the public into investing in mobile device anti-virus. While, no doubt, there are legitimate points noted in the video, end users can protect themselves adequately through personal diligence. Based on anecdotal experience, if the indicator of compromise is the loss of hundreds of dollars through premium texting services, reality doesn't seem to have born this out.
  • nick
    nick at April 17,2016
    Really well put together commercial for TrendMicro. Long haired, tattooed gentleman, seemingly an ex-agent provocateur that knows all about hackers. The marketing for this segment is well done, evil hackers stealing money from innocent victims. Not satisfied with ripping off people that just want to play games on their phone, the evil hacker targets unsuspecting corporations. Then, at the end, the pinch for security and management software. No doubt Rik Ferguson is a well respected member of the information security industry, but this video struck me as an effort to scare the public into investing in mobile device anti-virus. While, no doubt, there are legitimate points noted in the video, end users can protect themselves adequately through personal diligence. Based on anecdotal experience, if the indicator of compromise is the loss of hundreds of dollars through premium texting services, reality doesn't seem to have born this out.
  • fpazdzin
    fpazdzin at April 17,2016
    A very interesting informational video. Most people rely so heavily on their smartphones and it’s easy to forget that they are just another computer. Except this computer has more access to a person’s personal information then they think. I also think a video like this should be part of every business’ new employee orientation. Since social engineering is the best way for attackers to gain access to computer systems, businesses need to be making sure their employees aren’t unknowingly giving outsiders access to their data through the employee’s mobile device.
  • CCotton10
    CCotton10 at April 18,2016
    This video provided some good suggestions to remember at the end. Checking the publisher before downloading any apps is something to remember. Also, checking what permissions the app is asking for is a good idea. It was a little scary to see how easy it was to take control of the phone without the owner's knowledge. This is a good reason to keep phone's out of business meetings. No need to worry then about eavesdropping if no phones are allowed.
    • «
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved