Computer fraud

Results: 842



#Item
311Malware / Electronic commerce / Rogue software / Computer crimes / Computer network security / Spyware / Internet fraud / Identity theft / Credit card / Espionage / Crime / Internet

PDF Document

Add to Reading List

Source URL: www.regalbank.com

Language: English - Date: 2013-03-28 02:35:23
312Law / Cybercrime / Information technology audit / Computer network security / Protected computer / Title 18 of the United States Code / Racketeer Influenced and Corrupt Organizations Act / Computer Fraud and Abuse Act / Racket / Criminal law / Computer law / Crime

Updated Administration Proposal: Law Enforcement Provisions

Add to Reading List

Source URL: www.whitehouse.gov

Language: English - Date: 2015-01-13 14:55:07
313Law / Title 18 of the United States Code / National Information Infrastructure Protection Act / Hacking / Computer law / Information technology audit / Criminal law

TITLE 18 > PART I > CHAPTER 47 > Sec[removed]ACCESS DEVICE FRAUD Section[removed]Fraud and related activity in connection with access devices (a) Whoever (1) knowingly and with intent to defraud produces, uses, or traffics

Add to Reading List

Source URL: myfloridalegal.com

Language: English - Date: 2003-09-11 15:01:16
314Data visualization / Data mining / Cluster analysis / Visualization / K-means clustering / Geographic information system / Berrien Moore III / Data Analysis Techniques for Fraud Detection / Statistics / Data analysis / Science

Available online at www.sciencedirect.com Procedia Computer Science[removed]–1455 International Conference on Computational Science, ICCS 2011

Add to Reading List

Source URL: www.climatemodeling.org

Language: English - Date: 2011-05-18 10:26:40
315Cybercrime / Internet / Computer-mediated communication / Confidence tricks / Phishing / Email spam / Password / Internet fraud / Advance-fee fraud / Spamming / Social engineering / Email

NEWS RELEASE City of Yuma Police Department For Immediate Release Date: October 9, 2013 Contact: Officer Joe Franklin

Add to Reading List

Source URL: yumacountysheriff.org

Language: English - Date: 2013-11-21 19:42:43
316Law / Organized crime / Phishing / Romanian Police / Credit card fraud / Fraud / Child pornography / International Cybercrime / Brigada de Investigación Tecnológica / Computer crimes / Crime / Ethics

2079_Octopus_Workshop 2_VSpiridon_Romania

Add to Reading List

Source URL: www.coe.int

Language: English - Date: 2010-03-12 07:54:21
317Peer-to-peer computing / Business / Computing / Advance-fee fraud / High-yield investment program / Electronic money / Get-rich-quick scheme / Social engineering / Spamming / Bitcoin

1 There’s No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams Marie Vasek and Tyler Moore Computer Science and Engineering Department

Add to Reading List

Source URL: lyle.smu.edu

Language: English - Date: 2015-01-22 16:51:02
318Computing / Computer-mediated communication / Spamming / Cryptographic protocols / DomainKeys Identified Mail / DomainKeys / MDaemon / Domain Assurance Council / Phishing / Email authentication / Spam filtering / Email

DKIM Interop Testing Event – For Immediate Release Internet Messaging Leaders Work Together to Fight Email Fraud Email Testing Event Strengthens Sender Accountability DALLAS, Texas and SUNNYVALE, California – Novemb

Add to Reading List

Source URL: dkim.org

Language: English - Date: 2008-07-25 21:50:27
319Jurisdiction / Computer law / Cyberwarfare / Economic Espionage Act / Computer Fraud and Abuse Act / Industrial espionage / Protected computer / Theft / Espionage / Law / Trade secrets / Civil procedure

BNA’s Patent, Trademark & Copyright Journal ®

Add to Reading List

Source URL: www.morganlewis.com

Language: English - Date: 2014-12-19 14:49:20
320Spamming / Phishing / Email / Website / SANS Institute / Internet fraud / Gmail / Computer-mediated communication / Social engineering / Computing / Internet

Phishing Why an attack created in 1987 still works today TJ OConnor GIAC (GSE, GSEC, GCFW, GCIA, GCIH, GCFA, GREM, GPEN, GWAPT, GCFE)

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-08-27 18:45:04
UPDATE