Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

viaForensics webinar: Mobile forensic challenges on iOS and Android

 

Rating :

 

Comments

 
  • dmoraval
    dmoraval at March 18,2015
    Every time we heard the word hacking we instantly think about software, apps. However, hardware can be hacked too. Indeed, the first hacks had been done in telephone circuits. This video shows you how appliance can be hack. For instance, firewall, ISD, Encryption system, or a hotel thermostat. Basic steps are get device target, open source info, and attack vector. Attack methods could be voltage glitching, timing manipulation, fuse resetting, debug path manipulation. Very nice video .............
  • nbodyk
    nbodyk at April 18,2015
    I agree. When most people think of hacking their picturing the person sitting in front of a computer hacking into software systems. People tend to forget that hardware can be hacked into as well and they may not necessarily take precautions to protect their hardware. I will agree beer good, fire bad as a fellow beer lover.
  • DPerry
    DPerry at April 25,2015
    Its funny they mention look for people being lazy; that was nearly the prime topic of a 4 hour teleconference I was on last week. The overall purpose was cyber security; but as secure as your building / network / computer / phone may be, it will always fall under the weakness of humanity.
  • mariawhit8
    mariawhit8 at April 26,2015
    Love the Defcon videos since I've never been. Good article on attacking the very hardware design for protection. Hardware hacking isn't widely discussed and I'm shocked at how cheaply it can be accomplished. Even though the steps are somewhat repeatable it does not seem simple analyzing circuits and modifying based on device type.
  • gmazur
    gmazur at April 28,2015
    Security conferences always seem to cover interesting hardware hacks, they are always impressive, deal with a typical protocols you've never heard of. However, on the flip side, in order to complete these types hacks, typically you need physical access and a lot of time.
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved