Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

The Silk Road: The Rise and Fall of the World's Largest Online Black Market

 

Rating :

 

Comments

 
  • jpnick99
    jpnick99 at July 13,2016
    Vulnerability of smart phones was recently on display with the new launch of Pokemon Go. Someone got a hold of the source code, put in a back door, and released the app in countries the original developer had not released it yet. The result was countless smartphones being compromised. Contacts, emails, credit card information, logon and passwords, etc.
  • Modasiya
    Modasiya at July 27,2016
    This is definitely a breach to personal security and corporate security as well. No wonder we are so much habituated to smart phones and the one click installation that many a times we are unaware about the genuineness and security concerns. If fake apps for netflix can be created and launched, I wonder we have many such apps flirting in the market.
  • mikebrashier
    mikebrashier at July 27,2016
    I thought he would finish his question "where is the nearest.." with "barber shop". But seriously, I think mobile security is finally getting the attention it deserves. Recently, Edward Snowden partnered with some hardware makers to create a phone case that lets the user know whenever the phone is sending or received unauthorized signals. It hooks in to the phone very deep. It measures electrical signals at the component level. I think features like this as well as mobile encryption will get more popular in the near future.
  • jwren2
    jwren2 at September 09,2016
    Very informative for your average Smartphone user. People are the biggest vulnerabilities. It's crazy what a person will click on before making sure it's legitimate. It's also amazing how much the cyber criminal has evolved at their social engineering techniques.
  • kbacon5
    kbacon5 at October 14,2016
    This was a very interesting video and like other people said makes you think twice about cell phones. Also, someone mentioned the internet of things and connecting our smartphones to all our electronic devices. I overheard someone having a conversation about a television that had been hacked and was switching the channels and the malware was using the camera too. It seems like tvs would not be a main target but I guess malware writers are targeting everything.
    • «
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • 17
    • 18
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved