Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

The Silk Road: The Rise and Fall of the World's Largest Online Black Market

 

Rating :

 

Comments

 
  • jnegron
    jnegron at April 27,2016
    This video makes me go back to my Motorola RAZR... We all need to pay attention to what we are downloading from the web and the different apps stores.
  • Ksdonovan
    Ksdonovan at May 06,2016
    I am definitely reevaluating the apps I download on my smartphone. I didn't realize how easy it is for someone to gain access to our personal information and use it to their advantage. I feel like the general population needs more education about hackers so they can protect themselves.
  • dgrove
    dgrove at July 05,2016
    Even though this video is a few years old, people have become even more reliant on their smartphones. Smartphones are essentially computers in our pockets where we are able to do almost anything on a smartphone we can do on a computer. This video highlights how we need to make sure we are taking the security of our mobile devices as serious as we do our computers.
  • jdg8
    jdg8 at July 05,2016
    Even though all electronic devices can be breached by an experienced hacker, this is the one reason why I prefer iPhones over Android. iPhones seem more protected because their apps are not open-source apps. Also, Apple takes customer privacy very seriously, as shown in their recent fight with the FBI over their devices' encryption mechanisms.
  • sbudd4
    sbudd4 at July 11,2016
    A common theme of malware development appears to be the social engineering aspect. What I find equally interesting is how one might inoculate themselves from human hacking. It’s one thing to be simply aware of phishing scams for example, but another to have an actual understanding of the psychological mechanics at play.
    • «
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • 17
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved