Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Defcon : The History and evolution of malware

 

Rating :

 

Comments

 
  • 428Mach1
    428Mach1 at July 24,2015
    A brief but informative warning. One point that was not mentioned; the personal and portable devices that were demonstrated to be hackable were probably not secured with encryption, passwords or a mobile management and security system. The use of drones was interesting and amusing. I had not forseen the use of drones to more efficiently "harvest" unsecured mobile devices` data. But where there`s a will ....and available new technology, the industrious criminal will adapt that technology for new ways of making victims of the unsuspecting. Oh, I am not surprised that law enforcement is reprioritizing - cybercrime seems to be ubiquitous.
  • hhoang5
    hhoang5 at September 24,2015
    The video shows how the booming industry of cybercrimes: people do not need to know how to hack; cybercriminals can now be easily hired online. The potential for cyberattacks on wearables and internet-connected devices such as drones is also alarming. While it is good that law enforcement realizes the increasing level of threat from cybercrimes, one concern remains: will they evolve fast enough to catch up with cybercriminals?
  • Beggsse
    Beggsse at September 24,2015
    This was an encouraging video with regards to the future efforts of law enforcement and the priority that cyber threats will have above terrorism. After watching "Everyday Cybercrime and What You Can Do About It" which highlighted the challenges of jurisdictional issues for cyber crimes, which are borderless and international, this provided a welcome message of priority. Very eye-opening to think about the hacking potential with drones and ultimately anything that has a computer functioning as the brain of the system.
  • sagarwa9
    sagarwa9 at October 04,2015
    Cyber crime will definitely be on top of threats list. The more we rely on technology the more vulnerable we make ourselves to cyber attacks.
  • sliu23
    sliu23 at October 07,2015
    It is said that FBI could use drones to surveillance suspects and even hack in the target’s mobile phone long ago, which means drone-based hacking is possible. Nowadays, drones become cheaper and easier to be obtained, and wireless devices is ubiquitous throughout our daily life, such as PDA, cellphone, watch and etc. All of these offer the convenience and motivation for normal hackers to overcome technical difficulty of using drone as the hack platform. And using drone as the hack platform would also make criminals detecting and locating harder than old times. Because the “attacker drone” could keep moving during hacking procedure. Even the drone was captured, attacker still could have enough time to leave or destroy evidence. I think the drone-based hacking would be a tendency of future cyber-crime.
    • «
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved