Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Defcon : The History and evolution of malware

 

Rating :

 

Comments

 
  • Ahmed
    Ahmed at March 14,2015
    the number of hackers is been widely increasing in the last 4 years on the other side the number of anti-hacking methodologies is also growing to leave a slight chance for hackers to play with those secure infrastructures.
  • nbodyk
    nbodyk at March 28,2015
    Interesting. I really didn't give much thought to the fact that drones could be used to steal mobile phone data. That is really disturbing given the growth of drones and the people who want to use them. It just goes to show you new technology can come out and someone is going to find a way to exploit it to make money.
  • connellyt
    connellyt at April 08,2015
    I think what he was doing with the drone was a bit of news sensationalism. While interesting, if it can be done with a drone, you could already do the same thing without a drone, and by just walking by someone.
  • dmoraval
    dmoraval at April 08,2015
    Just to be fare with all devices. Everything can be hack, not just drones and wearables. Any device that has a processor, RAM, and any kind of communication can be hacked. I think that sometimes news doesn't have good stories, so they create sensation around it just to sell it. Anyway, if people apply good practices when using devices they minimize risk to be compromised.
  • dmoraval
    dmoraval at April 08,2015
    Just to be fare with all devices. Everything can be hack, not just drones and wearables. Any device that has a processor, RAM, and any kind of communication can be hacked. I think that sometimes news doesn't have good stories, so they create sensation around it just to sell it. Anyway, if people apply good practices when using devices they minimize risk to be compromised.
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved