Computer fraud

Results: 842



#Item
761Data management / Business intelligence / Intelligence / Computer-aided audit tools / Data mining / Data sharing / Analytics / Formal sciences / Statistics / Science

North Carolina’s Enterprise Fraud, Waste and Improper Payment Detection Program July 2012 North Carolina Office of the State Controller

Add to Reading List

Source URL: www.osc.nc.gov

Language: English - Date: 2012-07-11 14:05:31
762Computer hardware / Hewlett-Packard / Business intelligence / HP IT Management Software / HP Software Division / Computing / Vertica / Technology

Case study Scalable data engine underpins Ekogenio anti-fraud platform HP Vertica provides the scalability and responsiveness to bolster the launch of Iknoplex financial services software

Add to Reading List

Source URL: www.vertica.com

Language: English - Date: 2014-03-17 15:17:54
763Multi-agent systems / Botnets / Malware / Email spam / Click fraud / Storm botnet / Spamming / Computing / Computer network security

Europol Public Information The Hague, January 2014 Intelligence Notification[removed]Sefnit and Click Fraud

Add to Reading List

Source URL: www.europol.europa.eu

Language: English - Date: 2014-05-20 11:54:35
764Crimes / Theft / Cybercrime / Legal terms / Mail and wire fraud / Making false statements / Protected computer / Authentication / Title 18 of the United States Code / Law / Criminal law / Computer law

CYBERCRIME LAWS OF THE UNITED STATES

Add to Reading List

Source URL: www.oas.org

Language: English - Date: 2007-10-15 16:46:54
765Ethics / Crimes / IC3 / National White Collar Crime Center / Internet Crime Complaint Center / Phishing / Identity theft / Fraud / Federal Bureau of Investigation / Computer crimes / Cybercrime / Law

INITIATIVES The IC3 participates in multiple initiatives targeting an array of cyber crime schemes that victimize individuals and businesses domestically and abroad. These initiatives are a coordination of industry resou

Add to Reading List

Source URL: www.ic3.gov

Language: English - Date: 2014-03-21 12:54:48
766Legal aspects of computing / Computing / Computer law / Law / Computer Fraud and Abuse Act

November 9, 2011 Technology Law Computer & Internet Crimes Unauthorized Access

Add to Reading List

Source URL: www.sakr-law.com

Language: English - Date: 2011-12-28 00:58:01
767Cybercrime / Social engineering / Internet fraud / Identity theft / CVV / Phishing / Card security code / ShadowCrew / Fraud / Crimes / Theft / Law

Computer Security[removed]Perils of the Internet (Peligros del Internet)

Add to Reading List

Source URL: www.interall.co.il

Language: English - Date: 2014-01-02 04:02:44
768Spamming / Computing / Computer crimes / Zeus / Malware / Cyberwarfare / Mail and wire fraud / Computer security / Computer network security / Botnets / Multi-agent systems

IN THE UNITED STATES DISTRICT COURT THE WESTERN DISTRICT OF UNITED STATES OF AMERICA Plaintiff, )

Add to Reading List

Source URL: www.justice.gov

Language: English - Date: 2014-05-30 12:41:03
769Confidence tricks / Computer crimes / Law / Internet fraud / Panix / Phishing / Crime / Fraud / Social engineering / Spamming / Ethics

Fairfield Glade Neighborhood Watch Coalition Alan Baker, Plateau PC Users Group[removed]Websites for Reference / Learning About Internet Scams and Fraud

Add to Reading List

Source URL: www.ppcuginc.com

Language: English - Date: 2014-04-06 19:42:08
770Payment systems / Social engineering / Spamming / Rootkits / Zeus / Malware / Wire transfer / Phishing / Transaction authentication number / Cybercrime / Computer crimes / Crime

Fraud Alert Involving Unauthorized Wire Transfers to China

Add to Reading List

Source URL: www.ic3.gov

Language: English - Date: 2011-04-26 09:07:15
UPDATE