Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Defcon : The History and evolution of malware

 

Rating :

 

Comments

 
  • kticfrs500
    kticfrs500 at November 26,2016
    The timing in my watching this video along with the recent cyber attacks that caused services such as Netflix and Amazon to be unavailable is unmissable. This video was recorded at least 2 years ago as reading other student's comments, providing a foreboding of what could happen. And you would think we would have the technology to fight against that by now. We really need to cool it on adding anymore devices to the 'Internet of Things' before we almost willingly reveal to our very own enemies how and where we could be attacked.
  • sam
    sam at November 29,2016
    Using drone for hacking is an interesting area to make a good research. I have a friend who worked a small project by flying small drone to big and tall buildings. He demonstrated possible attack vector, and also able to collect a lot of user information. Even our Wearable device are subject to attack, so without our consent someone might be using our info to attack us
  • sam
    sam at November 29,2016
    Using drone for hacking is an interesting area to make a good research. I have a friend who worked a small project by flying small drone to big and tall buildings. He demonstrated possible attack vector, and also able to collect a lot of user information. Even our Wearable device are subject to attack, so without our consent someone might be using our info to attack us
  • sam
    sam at November 29,2016
    Using drone for hacking is an interesting area to make a good research. I have a friend who worked a small project by flying small drone to big and tall buildings. He demonstrated possible attack vector, and also able to collect a lot of user information. Even our Wearable device are subject to attack, so without our consent someone might be using our info to attack us
  • mtorrey
    mtorrey at November 29,2016
    I would have never imagine a scenario when a drone is flying overhead and stealing information or hacking your phone. It may not be easily done but I believe technology is evolving in a way where soon it might be possible for anyone to do what's on the video. We have to be proactive and find ways to secure any important data on our phones and computers.
    • «
    • 13
    • 14
    • 15
    • 16
    • 17
    • 18
    • 19
    • 20
    • 21
    • 22
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved