Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

DEF CON 22 - Weaponizing Your Pets: The War Kitteh and the Denial of Service Dog

 

Rating :

 

Comments

 
  • jpnick99
    jpnick99 at June 14,2016
    Interesting video, but not as informative as other videos on the dark web/silk road that are posted on this forum. We know now the Silk Road has been shut down by law enforcement, but numerous other dark web websites have sprung up to take its place. As long as things are illegal and people want it, there is going to be a place where those transactions can take place. Given how pervasive the Internet is, it just makes sense a market would have developed online.
  • ronnypaladino
    ronnypaladino at June 29,2016
    I can see one side's argument about not having to go buy drugs from an armed person in a bad neighborhood, not that I agree, it is drugs and its illegal. But, not being regulated is very dangerous as well. Kids can get their hands on it, people will get addicted, overdose etc. which is the reason they are illegal, its bad. Privacy on the internet is one thing, but use it to commit crimes and claim privacy is just absurd.
  • sbudd4
    sbudd4 at July 11,2016
    Was interested to hear about the Silk Road forums serving as an avenue for discussing safe/responsible drug-use as well as a means to offer advice on how to quit drugs.
  • jdg8
    jdg8 at July 29,2016
    I'm still somewhat new to the cyber industry as a student learning new things everyday. However, I had no idea that this kind of activity existed, whereas people could buy and sell illegal products in an online environment with so much organization that reduces their levels of getting caught or in hot water. Shocking!
  • michealb40
    michealb40 at September 04,2016
    Even the best security can fail when the weakest link is identified. Read this to see how the FBI took control of a CP site and circumvented the customer's anonymity through creative use of malware. http://arstechnica.com/tech-policy/2016/06/fbis-use-of-tor-exploit-is-like-peering-through-broken-blinds/
    • «
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved