Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Defcon : The History and evolution of malware

 

Rating :

 

Comments

 
  • kkrishna
    kkrishna at July 20,2015
    As technology increases, the number of potential channels for hacking increases exponentially. With more mobile devices, hackers can steal information from anywhere. In addition, home Wifi Networks can easily be hacked. One of the revelations of the NSA leaks was that they were infecting wireless networks from over 8 miles away. It's obviously a bit unsettling to think that a hacker could simply hack into your entire network from such a far distance.
  • araut
    araut at July 20,2015
    Security should be initial thought in any technology/products deployment. However, low non-tech skills are hard to beat by any security measure. For eg: walk into a used car dealership, and check out the cars with navigation or blue tooth phone system. Most people still doesn't delete their address history, home address or phone's contact list before they sell/trade cars.
  • TimWalsh
    TimWalsh at July 21,2015
    I think this video was a great example of how new technologies such as drones combined with the Internet of Things present a wide array of new challenges in cybersecurity. More and more objects are going digital and thus can be hacked. Though law enforcement is taking this type of threat more seriously that it has in the past, I think that it is definitely an uphill battle and new kinds of threats constantly emerge.
  • randerson0
    randerson0 at July 22,2015
    This is one more thing to look out for. There really are millions of ways to steal someone's sensitive information.
  • hpasekov
    hpasekov at July 22,2015
    This video makes me realize that literally any piece of technology on the market can be hacked into and used to hack to other technologies to steal data, money etc. It really scares me that, if my toaster becomes a node on the network and somebody hacks into it, turns it on while I’m not at home, and it sets my house of fire.
    • «
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved