Computer fraud

Results: 842



#Item
381Cybercrime / Email / Computer crimes / Phishing / Email spam / Malware / Spam / Anti-spam techniques / Web threat / Internet / Spamming / Computing

Microsoft Word[removed]July 24 Royal Baby Fraud.docx

Add to Reading List

Source URL: iic.cisecurity.org

Language: English - Date: 2013-10-15 17:22:53
382Crime prevention / National security / Cyberwarfare / Payment systems / Computer network security / Vulnerability / Payment Card Industry Data Security Standard / Debugging / Exploit / Security / Electronic commerce / Computer security

The Visa Fraud Control group has seen increased number of exploits on ecommerce merchants

Add to Reading List

Source URL: usa.visa.com

Language: English - Date: 2014-01-29 01:43:37
383Law / Internet privacy / Amicus curiae / Computer Fraud and Abuse Act / Information privacy / Weev / Ethics / Privacy / Computer law

Microsoft Word[removed]USA v. Auernheimer amicus brief final for filing.docx

Add to Reading List

Source URL: jonathanmayer.org

Language: English - Date: 2014-03-16 23:29:22
384Crime / Information technology audit / Cybercrime / 98th United States Congress / Computer Fraud and Abuse Act / Hacking / United States v. Lori Drew / Protected computer / Mandatory sentencing / Computer law / Criminal law / Law

Cybersecurity: Cyber Crime Protection Security Act (S. 2111, 112th Congress) -- A LegalAnalysis

Add to Reading List

Source URL: fpc.state.gov

Language: English - Date: 2015-01-04 01:24:52
385Advertising / Malware / Computer network security / Rogue software / Internet fraud / Online advertising / Malvertising / Click fraud / Client honeypot / Internet / Computing / System software

The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements Apostolis Zarras Alexandros Kapravelos

Add to Reading List

Source URL: cs.ucsb.edu

Language: English - Date: 2014-09-15 13:22:30
386Electronic commerce / Internet fraud / Panix / Social engineering / Online shopping / Computing / Computer-mediated communication / Spamming / Email / Internet

Public Service Announcement Prepared by the Internet Crime Complaint Center (IC3) September 04, 2014 African Cyber Criminal Enterprise Members Using “School Impersonation”

Add to Reading List

Source URL: nhfcu.org

Language: English - Date: 2014-09-08 12:21:13
387Computer crimes / Crime / Confidence tricks / Social engineering / Phishing / Internet fraud / Identity theft / Vishing / Hacker / Computing / Internet / Spamming

Vol. 1, Issue 2 – Winter[removed]Your Logo Here] Your quarterly resource for security and privacy awareness

Add to Reading List

Source URL: www.privacyguidance.com

Language: English - Date: 2011-03-31 19:12:00
388Social engineering / Phishing / Crimes / Password / Identity theft / National Strategy for Trusted Identities in Cyberspace / Transaction authentication number / Single sign-on / Internet fraud / Spamming / Computer security / Security

Microsoft Word[removed]NSTIC by the numbers FINAL.docx

Add to Reading List

Source URL: assets.fiercemarkets.com

Language: English - Date: 2011-04-15 11:46:08
389Crime / Criminal law / Computer network security / Cybercrime / Computer Fraud and Abuse Act / Hacking / Computer crime / Identity theft / Patriot Act / Computer law / Law / Information technology audit

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-10-17 09:40:35
390Payment systems / Social engineering / Spamming / Rootkits / Zeus / Malware / Wire transfer / Phishing / Transaction authentication number / Cybercrime / Computer crimes / Crime

Fraud Alert Involving Unauthorized Wire Transfers to China

Add to Reading List

Source URL: www.ic3.gov

Language: English - Date: 2011-04-26 09:07:15
UPDATE