Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

DEF CON 21 - Hacking Driverless Vehicles

 

Rating :

 

Comments

 
  • rbflapjack
    rbflapjack at October 30,2017
    Very informative but a little long. Probably the most thorough video about the history of viruses and pretty interesting about how it go started and just how far back it goes. Kinda reminds of the movie WarGames.
  • fsalzaabi
    fsalzaabi at October 31,2017
    The change in the types and complexity of viruses and other malware is incredible over the last 2 decades. Computer viruses are now capable of infecting computer systems on a global scale thanks to the Internet and the prevalence of social media platforms. Cyber-criminals have a favorite malware tool today – ransomware. It is specifically designed to disable a computer system until some form of payment is made. Even then, there is no guarantee that the victim will have full access to the machine.
  • Digger62
    Digger62 at November 02,2017
    Very informative video. A bit on the long side. Excellent history of malware. The examples are interesting. I remember getting a couple of those back in the day. Showing how malware replicates and (at the time of this video) how people today still do not take computer security as seriously as they need to. The wake up call came in 2003 when CSX trains had to come to a complete stop due to a virus. This exposed how industry needed to take malware seriously and how malware can be done for profit. The piece on Stuxnet is really interesting.
  • multarnc
    multarnc at November 02,2017
    It is a bit scary to see how far viruses have come. What started as a challenge between programmers/hackers, eventually turned into a criminal enterprise with its own marketplace. However, I am a bit surprised that it took almost 20 years before virus writers started using them to make money. Given the increase in complexity and volume, anyone who works in vulnerability management knows that trying to use outdated methods for protecting against viruses is a losing battle. Even heuristic analysis and whitelisting aren’t foolproof. I am curious how long it will take the industry to move towards resiliency versus trying to chase vulnerabilities.
  • whiller
    whiller at November 21,2017
    Great video on the evolution of malware. I found it especially interesting that in 25 years, going from Brain to Stuxnet, some of the same techniques are still being used in rootkits. Also, I never heard about Sony sending rootkits on some of its music CDs. I'd like to learn more about what they were hoping to do with them.
    • «
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved