Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Defcon : The History and evolution of malware

 

Rating :

 

Comments

 
  • tshafi
    tshafi at December 03,2015
    After watching this I wonder what it would be like to go undercover as a hacker for a few years. How much about zero day attacks could be learned? How much would the experience prepare an investigator regarding the mindset and methods of the cyber-criminal?
  • busterhax
    busterhax at December 10,2015
    It's assuring knowing that law enforcement is aggressively growing in this field.
  • fsyed3
    fsyed3 at December 17,2015
    I feel naive but i didn't realize that stolen personal data was just available for sale on the black market. Terrifying, especially when you consider the sheer number of entities that process and have some form of personally identifiable information.
  • mcoates1
    mcoates1 at January 25,2016
    It scares me to think that cyber crimes could become more of a threat than terrorism as mentioned in this video. The idea that criminals are getting smarter by discovering new and creative ways to use technology to accomplish their crimes is astounding. The most frightening part is how they can use hacking to alter signals in ones pacemaker. A few years back, I would have never thought that to be possible but apparently it is.
  • CCotton10
    CCotton10 at February 22,2016
    It seems to me that as we continue to use technology, it will become more and more attractive to criminals. If a cellphone can be hacked and enough personal information can be gained to steal your personal identity, it is a very attractive target. If it can be done quickly, even better. Cyber crimes should be becoming more important.
    • «
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved