Computer fraud

Results: 842



#Item
521Criminal law / Identity theft / Identity Theft Resource Center / Computer crime / Grand Theft Auto IV / Fair and Accurate Credit Transactions Act / Identity fraud / Crimes / Identity / Theft

Identity Theft: The Aftermath 2006 Conducted by the Identity Theft Resource Center® (ITRC) With comparisons to The Aftermath 2003, 2004, 2005 Surveys

Add to Reading List

Source URL: www.idtheftcenter.org

Language: English - Date: 2014-01-29 15:31:38
522Social engineering / Computer crimes / Email / Phishing / Internet Explorer 7 / Internet fraud / SiteKey / Firefox / Google Chrome / Software / Computing / Spamming

You’ve Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings Serge Egelman Carnegie Mellon University [removed]

Add to Reading List

Source URL: www.guanotronic.com

Language: English - Date: 2008-11-15 13:21:03
523Computer network security / Security / Threat / Security risk / Organized crime / Script kiddie / Computer security / Hacking / Cyberwarfare

Best practice strategies to improve your enterprise security 2nd Annual Australian Fraud Summit 2013 Murray Goldschmidt, Chief Operating Officer April 2013

Add to Reading List

Source URL: www.senseofsecurity.com.au

Language: English - Date: 2013-05-07 23:23:26
524Government / Electronic voting / Information society / Voting machine / Electoral fraud / Ballot / Laptop / Optical scan voting system / Punchscan / Politics / Elections / Election fraud

Voting Security The key to creating voter trust and maintaining security against voting fraud is to use the same two fundamental methods that are used for high-security computer systems - an air gap, and separation of co

Add to Reading List

Source URL: www.sos.ca.gov

Language: English - Date: 2011-05-14 16:40:42
525Security / Data / Companies listed on the New York Stock Exchange / Information security / Malware / Communications protocol / Email / Application firewall / Host Based Security System / Computing / Computer security / McAfee

Data Sheet McAfee Application Data Monitor Detect fraud, data loss, and hidden threats with application-layer inspection Key Advantages

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:52:37
526Money / Online shopping / Credit card / Debit card / PayPal / Interac / Phishing / SANS Institute / Credit card fraud / Payment systems / Electronic commerce / Business

OUCH! | November[removed]IN THIS ISSUE.. • Online Stores • Your Computer • Your Credit Card

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2013-11-04 15:43:04
527Credit card / Security / Online shopping / Internet privacy / Password / Merchant services / Computer security / Credit card fraud / 3-D Secure / Electronic commerce / Computer network security / Business

Cyber Security Monthly Newsletter November 2011 Volume 6, Issue 11 Tips for Secure Shopping Online

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2011-11-21 17:14:46
528Phishing / Malware / Internet fraud / Identity theft / Hacker / Internet security / Cybercrime and countermeasures / International Cybercrime / Cybercrime / Computer crimes / Crime

Monthly Cyber Security Tips NEWSLETTER February[removed]Volume 4, Issue 2

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2009-02-13 16:32:35
529Business / Computer-aided audit tools / Continuous auditing / Financial audit / Audit / Internal audit / Statements on Auditing Standards / Statement on Auditing Standards No. 99: Consideration of Fraud / Internal control / Auditing / Accountancy / Risk

November[removed]White Paper Evolution of Auditing: From the Traditional Approach to the Future

Add to Reading List

Source URL: www.aicpa.org

Language: English - Date: 2013-03-05 10:03:56
530Electronic voting / Cross-platform software / Software / Politics / Election fraud / Proprietary software / Vulnerability / Voter-verified paper audit trail / Software independence / Software licenses / Computing / Computer law

WRITTEN TESTIMONY OF DAVID WAGNER, PH.D. COMPUTER SCIENCE DIVISION UNIVERSITY OF CALIFORNIA, BERKELEY BEFORE THE COMMITTEE ON HOUSE ADMINISTRATION, ELECTIONS SUBCOMMITTEE U.S. HOUSE OF REPRESENTATIVES

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2013-10-18 17:59:35
UPDATE