Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Forensic Lunch - Forensic / Malware Analyst's Life & Career

 

Rating :

 

Comments

 
  • lnguye46
    lnguye46 at October 30,2017
    The video goes into a lot of details regarding the ISM band IMSI. I learned that an IMSI catcher is a similar to a GPS tower. The attacker can take control of the SIM card and headset if they choose to. The primary point is that NSA and other gov’t entity can monitor or filter through your phone’s metadata. They have control over the frequency and networks.
  • fsalzaabi
    fsalzaabi at November 06,2017
    Cellphones can now be hacked almost as easily as computers. Millions of people have access to cellphones and other mobile devices and perform most of their business on them. Cybercriminals use new technologies and software to infiltrate mobile systems and gain illegal access to the financial information of consumers. All users of mobile devices must install antiviral software on their devices.
  • MGwann
    MGwann at November 07,2017
    Wow this IMSI catcher tool is interesting! While I think that this would have great ability in assisting IR and LE personnel, I would also think it would cause a great liability and even fruit of the poisonous tree issues for such personnel. I also thought it was interesting to hear how the iPhone was easily connectable TIMSI's versus non iPhones.
  • whiller
    whiller at November 22,2017
    Chris Paget shows how to intercept 2G cellphone signals using inexpensive hardware masquerading as a cell tower transmitting on a USA ham radio frequency. He says that 2G is "broken" from a security perspective, and that only the advances of 3G and 4G will remove the vulnerabilities that he exploits in his demo.
  • nparke
    nparke at December 03,2017
    Its interesting that the iphones are the ones that connect more easily to his device than the other types of phones. The speaker made many good notes that really helped question the security of phones and how it is possible to spoof a network tower (the demo did a good job). I wish he would of gone into more detail of how the connections work, I was a little lost a few times of how he was actually able to make his machine spoof the network tower. Overall, this was an interesting topic on cellphone security.
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved