Computer crimes

Results: 5188



#Item
31Crimes / Internet privacy / Identity assurance / Identity management / Identity theft / Identity 2.0 / Gemalto / Online identity / Computer security / Identity / Security / Smart cards

Interagency Advisory Board Meeting Agenda, Wednesday, September 26, Opening Remarks 2. Enabling the Mobile Government Workforce with PIV Credentials in

Add to Reading List

Source URL: www.fips201.com

Language: English - Date: 2015-06-15 12:08:41
32Computer crimes / Spamming / Phishing / Social engineering / Malware / Threat / Cyberwarfare / Email / Spam / Cybercrime / Internet / Computing

Data Feeds Cyber criminals launch thousands of cyber attacks every day, and compromise thousands of legitimate websites, to spread malware, capture account credentials, launch phishing attacks, and perpetrate fraud. Thes

Add to Reading List

Source URL: info.cyveillance.com

Language: English - Date: 2015-07-18 11:24:51
33Computer crimes / Bullying / Human behavior / Aggression / Cyber-bullying / Social psychology / Internet privacy / Email / Cyberstalking / Abuse / Ethics / Behavior

Microsoft Word - Cyberbullying.doc

Add to Reading List

Source URL: internetsafety101.org

Language: English - Date: 2010-10-06 15:07:28
34Computer crimes / Computer network security / Computer security / Secure communication / Critical infrastructure protection / Cyberwarfare / European Network and Information Security Agency / National Cyber Security Division / International Cybercrime / National security / Security / United States Department of Homeland Security

COUNTRY: GREECE Greece does not have a cybersecurity strategy or dedicated cybersecurity legislation. The legal and institutional framework that supports cybersecurity is also limited. The national computer emergency res

Add to Reading List

Source URL: cybersecurity.bsa.org

Language: English - Date: 2015-02-26 18:08:30
35Cyberwarfare / Security engineering / Computer crimes / Computer security / Critical infrastructure protection / Computer emergency response team / National Cyber Security Division / Cyber-security regulation / National security / Security / United States Department of Homeland Security

COUNTRY: GERMANY Germany has a comprehensive cybersecurity strategy, adopted in 2011 and complemented by a strong cybersecurity legal framework. The existence of the Federal Office for Information Security (BSI), in char

Add to Reading List

Source URL: cybersecurity.bsa.org

Language: English - Date: 2015-02-26 18:08:32
36Spamming / Computer crimes / Social engineering / Password / Phishing / HTTP cookie / Cross-site scripting / Email / Malware / Security / Computing / Computer security

Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication Chris Karlof J.D. Tygar David Wagner {ckarlof, tygar, daw}@cs.berkeley.edu

Add to Reading List

Source URL: www.chriskarlof.com

Language: English - Date: 2012-01-02 15:39:31
37Cybercrime / Espionage / Computer network security / Fraud / Crime prevention / Internet Crime Complaint Center / Identity theft / Federal Bureau of Investigation / Cyberterrorism / Crime / Computer crimes / Security

C y b e rcr i m e s  Read the fine print on website privacy policies—On many social networking and photo sharing sites, there is wording on

Add to Reading List

Source URL: www.ncpc.org

Language: English - Date: 2015-05-05 06:09:00
38War / Electronic warfare / Hacking / Military technology / Military science / Cyberterrorism / Cyber / Industrial espionage / Internet-related prefixes / Cyberwarfare / Computer crimes / Security

The Cyber War Has Not Begun James Andrew Lewis Center for Strategic and International Studies March 2010 Expanded attention to cybersecurity is a good thing, but it seems that it is difficult to discuss this topic withou

Add to Reading List

Source URL: csis.org

Language: English - Date: 2010-03-11 13:45:21
39HTTP / Computer crimes / Computer network security / Internet ethics / Cross-site request forgery / HTTP cookie / Phishing / Internet privacy / JavaScript / Software / Computing / Google Chrome

All Your Screens are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API Yuan Tian∗ , Ying-Chuan Liu‡ , Amar Bhosale† , Lin-Shung Huang∗ ,Patrick Tague† ,Collin Jackson∗ ∗ {yuan.tian, Carnegie Me

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-21 13:48:10
40Bullying / Social psychology / Computer crimes / Sociology / Cyber-bullying / School bullying / Cyberstalking / Harassment / Victimisation / Abuse / Ethics / Behavior

The Dynamics of the Roles of Aggressor and Victim in Bullying and Cyberbullying: A Challenge for the Resilient Development of Students1 Ana-Nicoleta Huluba Grigore Abstract: The diversification of the current types of bu

Add to Reading List

Source URL: symposion.acadiasi.ro

Language: English - Date: 2014-11-13 04:20:30
UPDATE