Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Silk Road and the online drugs trade - Truthloader Investigates

 

Rating :

 

Comments

 
  • adam
    adam at March 11,2016
    This was awesome. So many videos talk about how malware works and they almost always devolve into a diatribe on social engineering. This one, at least, showed some investigative techniques that could be useful to the layman watcher. I also was very enlightened by the statistics at the end describing youth computer users who were very good a using technology but had little idea about how it actually worked.
  • tcmahony
    tcmahony at March 16,2016
    This is one of the better TED talks I have seen. He really drives home that there are massive amounts of malware out on the internet and that is grossly outpaces the number of internet users. Additionally it was great to see how the speaker wrapped up the video stating if more people did the "basics", we would all be much more secure. And if the attackers depicted in this video did the basics as well when it came to opsec they might not have been caught by this company.
  • mcoates1
    mcoates1 at April 11,2016
    I remember for one of the lab assignments, we were able to view the GPS location of the photos that we were given. I didn't even see that as a security or privacy issue on social media platforms. This makes me want to reconsider what I post or at least make sure location services are turned off by default on my phone.
  • fpazdzin
    fpazdzin at April 17,2016
    I didn’t know that a mobile phone sends out all of the previous wireless connections that it has saved. I can see how that could be useful to someone, especially if they are targeting someone specific. They can use the list of wireless connections to track where that person might go or give them a list of open networks that the phone connects to so they can attack that way. This was a very interesting video. The individual is the weakest link when it comes to securing a computer system. Everyone needs to know the basics on how to keep their electronic devices secure.
  • danielm8
    danielm8 at April 19,2016
    Wow, everything is traceable. I never knew cellphones leaked wifi information that could tell everything about you. People who feel a need to share everything and give status updates on twitter and Instagram are easily target-able because their daily routine and location are easy to find. As people involved in Computer Forensics, we must know a little bit of everything about computer security.
    • «
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved