Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Forensic Lunch - Forensic / Malware Analyst's Life & Career

 

Rating :

 

Comments

 
  • shubhragupta
    shubhragupta at April 03,2017
    There have been many articles which talks about cellphone spying and how our critical information has been used in many different places. There are so many softwares available which are easily accessible and works on text spying, sms tracker etc.
  • student0
    student0 at May 08,2017
    I thought that it was interesting that cellphone encryption in India is illegal- I had no idea. I find it highly shocking that cell phone companies don’t notify the user when they are connecting to towers that force them to be in an unencrypted state. That the presenter suggested that cell phone companies make it so that the user is not notified in changes in encryption status so that users do not call with complaints is an interesting hypothesis. I wonder if cyber crime and security in information systems will become a primary concern of everyday users that they will demand notification from cell phone companies. It will take user demand for cyber security practices in order for companies to be more transparent in the security of their systems.
  • sreinoso103
    sreinoso103 at May 09,2017
    This is not a topic that I know much about, but it is interesting how much we don't know about cell data security. In response to @student0, I do imagine that encryption and other security efforts will be something that definitely makes its way into customers every day life. As PII becomes a more common concern companies will have to pay attention.
  • cmassey
    cmassey at July 29,2017
    Not one of the best speeches, but still very informative. All tech talk, and is a relevant topic with the nature phone usage has been going (ubiquitous). Bottom line, it's neat to hear how he put-together a home-made Stingray.
  • forensiks
    forensiks at July 29,2017
    I cannot believe that what he is saying about DDOSing the cell network is reality. If there is actually "no" way to defend against such an attack that could be absolutely devastating, especially if this was used along with a physical attack of some sort. The chaos and confusion that has occurred during terrorist attacks and natural disasters has already caused communication issues, so at least some sort of emergency protocols are being established for such situations. But he is talking about an amazing radius, and I don't know that contingency plans are that well prepared.
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved