Computer crimes

Results: 5188



#Item
611Computing / Computer crimes / National security / Security / Botnet / Police / Computer network security / Multi-agent systems / Spamming

Team Cymru Launches New Tool to help with Cyber Crime Investigations

Add to Reading List

Source URL: www.team-cymru.org

Language: English - Date: 2015-02-12 11:10:13
612Computer crimes / Phishing / Computer network security / Anti-phishing software / Web threat / Cybercrime / Social engineering / Spamming

Anti-Phishing Security Strategy Angelo P. E. Rosiello Agenda 1. Brief introduction to phishing 2. Strategic defense techniques

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:28
613International Telecommunication Union / International Multilateral Partnership Against Cyber Threats / Computer security / Public safety / Crime / National Cyber Security Division / Computer crimes / Cyberwarfare / Security

IT SCC Response to NIST Framework RFI

Add to Reading List

Source URL: www.it-scc.org

Language: English - Date: 2015-02-25 13:42:24
614Trustworthy computing / Computer Crime and Intellectual Property Section / Charney / Microsoft / Computing / Economy of the United States / Law / Computer crimes / Computer security / Information technology management

Scott Charney Corporate Vice President, Trustworthy Computing Scott Charney is Corporate Vice President for Microsoft’s Trustworthy Computing Group. This group is responsible for the security of Microsoft’s product

Add to Reading List

Source URL: mscorpnews.blob.core.windows.net

Language: English - Date: 2015-01-12 14:01:19
615Electronic warfare / Hacking / Military technology / Phishing / The Organ / Internet privacy / Internet-related prefixes / Cyber-bullying / Album / Cybercrime / Computer crimes / Cyberwarfare

Transcript for Plenary 2 – Room 305 – International Law Enforcement Track 3(b) International Law Enforcement Site: Suntec Singapore International Convention and Exhibition Centre, Room 303 Date: 17 June 2011 Start:

Add to Reading List

Source URL: 2011.rigf.asia

Language: English - Date: 2011-12-23 22:25:37
616Cyberwarfare / Password / Computer crimes / Passphrase / John the Ripper / Phishing / Crypt / Password policy / Cognitive password / Computer security / Security / Cryptography

Text Entry Method Affects Password Security Yulong Yang† , Janne Lindqvist† , Antti Oulasvirta‡ † Rutgers University, ‡ Aalto University Abstract Background. Text-based passwords continue to be the

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-04-21 23:17:08
617Spamming / Phishing / Web threat / European Network and Information Security Agency / Transaction authentication number / Malware / Cybercrime / Computer crimes / Social engineering

Incident handling and cooperation during phishing campaign Handbook, Document for teachers September[removed]European Union Agency for Network and Information Security

Add to Reading List

Source URL: www.enisa.europa.eu

Language: English
618Computer crimes / Cyberwarfare / Crime prevention / National security / Computer security / Cyberterrorism / Threat / Malware / Computer network security / Security / Terrorism

Cyberterrorism Prevention Checklist by Frank Fiore and Jean François As CEO, CIO, or other top executive of your organization, you need to be certain that your departments understand the threat of cyberterrorism. Take t

Add to Reading List

Source URL: ptgmedia.pearsoncmg.com

Language: English - Date: 2009-06-09 12:21:07
619United States Department of Homeland Security / Computer network security / Computer security / Secure communication / National security / Public safety / Cyber-security regulation / National Cyber Security Division / Cyberwarfare / Security / Computer crimes

April 16, 2013 Dear Members of the U.S. House of Representatives, The undersigned representatives of the financial services industry are writing in support of H.R. 756, the “Cybersecurity Enhancement Act”; H.R. 967,

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2013-04-18 11:14:54
620Criminal law / Computer law / International Cybercrime / Convention on Cybercrime / Crimes Act / Computer crime / Legal aspects of computing / Theft / Cyberstalking / Computer crimes / Law / Crimes

06 - Cyberspace Law materials - Crime PageCyberspace Law materials - Crime

Add to Reading List

Source URL: www.bakercyberlawcentre.org

Language: English - Date: 2013-12-09 02:25:53
UPDATE