Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

DEF CON 21 - Hacking Driverless Vehicles

 

Rating :

 

Comments

 
  • klloyd6
    klloyd6 at November 19,2015
    Watching this video shows just how far we have come in technology. Just looking at the first virus on a floppy disk to the outdated visual virus graphics. It is interesting how we have moved to hidden or silent malware in which we won’t even know we have been infected. I recall hearing about some of these viruses and I think he did a great job analyzing the history behind them. I wonder what is to come for our computers in the future in regards to attacks.
  • jhilldog77
    jhilldog77 at November 21,2015
    This video was very long but I could have listened to this gentlemen all day. Learning about the history of malware and computer viruses and how they evolved from BRAIN A to Stuxnet; a very complex and sophisticated piece of code. It was interesting to see the evolution of the malware from 1986 to present day (Stuxnet). It makes you wonder what kind of ultra sophisticated viruses we will see in the next 25 years as the Internet of Things puts billions of devices on line and makes them a potential target.
  • Beggsse
    Beggsse at November 23,2015
    I really enjoyed this timeline historical view of the history of malware. When I began this course, I was looking for an understanding of malware and I feel that viewing this video with less than one month to go was really informative. The perspective on what was being used at each time period was helpful as this would logically become the target of malware writers. I was in college in 1986 and remember using two floppy drives to move data around. I feel I have come full circle now understanding this need as there were no networks or hard disks. I remember the visual viruses that activated characters across the screen as well as the concerns about documents, emails, browsers, etc. It makes me curious about the future. Most interestingly, I enjoyed the contrast of the two defined time periods of 1986-2003 and 2003-2011. In the earlier time period he suggests it was more for fun and not as formalized and pursued by more westernized countries. The advent of Fizzer in 2003 turned the malware focus to making money and now professional people became involved from countries such as Russia, China, and Brazil in an effort to make and launder money. Motivation is a key to where this will go in the future and he proved that by tracking down the motivation of the creators of Brain, the first pc virus. Very interesting.
  • zsesay
    zsesay at November 27,2015
    This video is very interesting and too long.. I thought computer viruses had been in existence even before 1986. He mentioned illegal virus and never knew there is something like legal virus. This indeed had been around for long time and I hope since floppy disks no longer exist
  • sliu23
    sliu23 at November 30,2015
    A very comprehensive video gives us a review of malware development history from 1986 to 2010. For me, the old time Dos virus is quite interesting, simple but funny. Since most of them were created for fun, they look like harmless nowadays, and some of them even contained the contract way of creators. Today we may hardly meet this kind of virus. And more and more new malware focuses on making money or attack specific targets with high political value. That’s a huge change during the 25 years. Another change, of course, is the way how malware spread in the world. It would not be surprising to us, because the computer device and internet environment are also stepping further. Malware just utilizes all the ways they could to infect devices and spread on the internet. If this speech was made in 2015, in my view, he would have spent time on mobile malware too, which would be the tendency of this decade.
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved