Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

The Silk Road: The Rise and Fall of the World's Largest Online Black Market

 

Rating :

 

Comments

 
  • kticfrs500
    kticfrs500 at November 27,2016
    Wow! I have heard up to now that there isn’t yet enough knowledge about the android operating system to do severe damage by a cybercriminal. I guess not! Can you imagine being a company having ‘trade secrets’ being penetrated by a competing company who has at their hands a very talented, crooked, and money hungry hacker? And it wouldn’t even be the fault of the IT security team but may have originated from an intern/regular employee who may have simply downloaded a game to play to keep from being bored at lunch and with the microphone on…the crooked company just heard the entire meeting!
  • sam
    sam at November 29,2016
    In 2012, 130, 000 malicious app !!!!! what would be today? Remotely control the phone is the worst attack. The challenging part is part is that the victim doesn't know anything because the phone doesn't show unusual behavior. such attack would be controlling privacy. imagine your conversation is recorded while you are at home with your wife. How ugly is that? that is the worst attack ever. if someone is following all my activities on my cell phone, he can clearly and effectively guess where my next move will be. So please, be aware of what you are downloading on your phone.
  • sam
    sam at November 29,2016
    In 2012, 130, 000 malicious app !!!!! what would be today? Remotely control the phone is the worst attack. The challenging part is part is that the victim doesn't know anything because the phone doesn't show unusual behavior. such attack would be controlling privacy. imagine your conversation is recorded while you are at home with your wife. How ugly is that? that is the worst attack ever. if someone is following all my activities on my cell phone, he can clearly and effectively guess where my next move will be. So please, be aware of what you are downloading on your phone.
  • mtorrey
    mtorrey at November 29,2016
    Wow, I never thought it would be that easy to hack a phone. I also didn't realized how easy it is for viruses to get on my phone when my son is playing games and starts downloading new games. I am going to be extra careful moving forward on what gets downloaded on my phone.
  • asdfaslkjadsfasdasdfas
    asdfaslkjadsfasdasdfas at December 03,2016
    Great video, ever since seeing the massive surveillance system in The Dark Knight circa 2008 where they turned every phone in the city into a sonar node, this has been on my mind. I think its so crazy that we all spend most of our day staring into a camera that is attached to an internet connected device. The problem is only going to get worse thanks to BlackBerry's epic collapse. I believe diversity and more competition in the operating system marketplace would provide more security ... but right now it looks like iOS and Android will have the world in their hands for a while.
    • «
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • 17
    • 18
    • 19
    • 20
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved