Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

The Silk Road: The Rise and Fall of the World's Largest Online Black Market

 

Rating :

 

Comments

 
  • brober15
    brober15 at October 22,2015
    I could be wrong, but I think that for the attack depicted to happen you'd have to enable installation of apps from 3rd parties. I don't think most people would have that turned on already, unless you are using the Amazon Appstore or are into pirated apps. Though perhaps we'll see a scam similar to the Windows one where people call you pretending to be from Microsoft to try to walk you through installing TeamViewer so they can control your computer. A good thing is that iOS and now the latest version of Android allow for more granular control of app permissions. Of course, you basically have to buy a new Android phone to get the latest version unless you have a Nexus device, since between the OEMs and the carriers it takes forever to push out updates, if at all. Hopefully Google will figure out a way around this. It seems now like Stagefright will be hanging around for a long time.
  • zsesay
    zsesay at November 19,2015
    Very true, we live in a remarkable world.. In deed, the smart phone are not just phones but computers. These videos are all eye openers. The problem is, how many people out there that don't know about this? I was one of them, but today, I know. But even that, do I know how to prevent this? that is the big question. These warning videos should leave instructions on how to prevent such issues and teach friends and family too. That way, the news will travel fast and people would take precaution
  • jhilldog77
    jhilldog77 at November 19,2015
    The android platform is the most hacked device in the world with 130,000 malicious Apps just for Android! iOS has also been hacked recently through the App Store posting malicious Apps. Mobile security/software is something we do not think about much even though our smartphone never leaves our side most days. After seeing this video we should all go out and install security/anti-virus apps on our mobile devices.
  • tshafi
    tshafi at November 24,2015
    The fact that the smartphone outsells the PC is not so remarkable. Phones and phone telecom packages in many countries are made more affordable than PCs, and can do quite more in a more compact device. “Cyber criminals follow the money,” considering that in security the weakest link is often the human component, and given the nature of the phone as being a personal and intimate device, people are just not aware of the fact that they need to safeguard their phones. Also, due to the development environments for developing phone software, more and more people can make apps for phones. People are simply not aware and can be fooled into allowing strangers into their homes (or more specifically, their phones). Phone crime is the new frontier, and the frontier is often characterized with lawlessness. This video’s main goal is to educate people, strengthening the link in the security chain that is the human component.
  • tshafi
    tshafi at November 24,2015
    The fact that the smartphone outsells the PC is not so remarkable. Phones and phone telecom packages in many countries are made more affordable than PCs, and can do quite more in a more compact device. “Cyber criminals follow the money,” considering that in security the weakest link is often the human component, and given the nature of the phone as being a personal and intimate device, people are just not aware of the fact that they need to safeguard their phones. Also, due to the development environments for developing phone software, more and more people can make apps for phones. People are simply not aware and can be fooled into allowing strangers into their homes (or more specifically, their phones). Phone crime is the new frontier, and the frontier is often characterized with lawlessness. This video’s main goal is to educate people, strengthening the link in the security chain that is the human component.
    • «
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved