-
BSharma
at May 03,2017
Mobile Cybercrime has increased significantly as demonstrated in this video. Using unsecured Wifi in public spaces without password protection and having secured the mobile devices leaves them vulnerable to mobile spyware and malware attacks. Because of this pervasive growth of cyber criminal activities as captured in the video, this gives tremendous growth in the area of mobile forensics.
-
BSharma
at May 03,2017
Mobile Cybercrime has increased significantly as demonstrated in this video. Using unsecured Wifi in public spaces without password protection and having secured the mobile devices leaves them vulnerable to mobile spyware and malware attacks. Because of this pervasive growth of cyber criminal activities as captured in the video, this gives tremendous growth in the area of mobile forensics.
-
BSharma
at May 03,2017
Mobile Cybercrime has increased significantly as demonstrated in this video. Using unsecured Wifi in public spaces without password protection and having secured the mobile devices leaves them vulnerable to mobile spyware and malware attacks. Because of this pervasive growth of cyber criminal activities as captured in the video, this gives tremendous growth in the area of mobile forensics.
-
sstumvoll
at May 05,2017
Amazing that 35 billion apps are downloads and this was back in 2012 when phones became our best friend.. In 2013 viruses like Trojans were installed via SMS on phones. Scary to know that criminals are professionals in uploading apps to our smartphones. Stan is a clever dude making money by installing malware on your phone. Malware gives him remote control over the phone. He can intercept what is coming in and going out. And no one knows it is happening. He can sell it on the black market. Does locking our phone with a password really protect us?
-
Wangja
at May 10,2017
Recent news is aboot 2 factor authentication having been compromised. The recent compromise is not explained very well, but after watching this video, I can understand how 2 factor authentication can be bypassed when a mobile phone gets infected with malware.