CyberCrime

Results: 3090



#Item
481Taxation in the United States / Identity documents / Data security / Cybercrime / Secure communication / Internal Revenue Service / Form W-2 / Identity theft / Personally identifiable information / Phishing / Data breach / Payroll tax

UNITED STATES DISTRICT COURT MIDDLE DISTRICT OF NORTH CAROLINA DAVID LINNINS, KIM WOLFINGTON, And CAROL BLACKSTOCK on behalf of themselves and all others similarly

Add to Reading List

Source URL: www.carolinasclassaction.com

Language: English - Date: 2016-05-19 09:56:05
482Cryptography / Security / Computer security / Computer access control / Computer network security / Barcodes / Cybercrime / Hypermedia / QR code / Authentication / Password / SQRL

SAVVIcode: Preventing Mafia Attacks on Visual Code Authentication Schemes (Short Paper) Jonathan Millican and Frank Stajano , University of Cambridge Computer Laboratory, Cambr

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-07-13 10:08:14
483

bürgerorientiert · professionell · rechtsstaatlich Cybercrime Lagebildwww.lka.polizei.nrw.de

Add to Reading List

Source URL: www.mik.nrw.de

Language: German - Date: 2015-10-01 04:09:20
    484Computer access control / Identity management / Federated identity / Cybercrime / Security token / Password / Multi-factor authentication / Electronic authentication / Phishing / Authentication / One-time password / Password policy

    Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens Jeunese Payne∗ , Graeme Jenkinson∗ , Frank Stajano∗ , M. Angela Sasse† and Max Spencer∗ ∗ University of Cambridge

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2016-05-17 20:42:08
    485Password / Security / Cryptography / Cybercrime / Onboarding / Outlook.com / Point and click / Computer security

    FermiWorks Initial Sign In and OnboardingWelcome to Fermilab! One important part of onboarding is to enter your account information into FermiWorks, Fermilab’s Human Capital Management System. FermiWorks is

    Add to Reading List

    Source URL: fermiworks.fnal.gov

    Language: English - Date: 2016-03-28 17:04:06
    486Cybercrime / Computer recycling / Data security / Sales taxes in the United States / Personal computer / Computing / Recycling / Software / Computer / Reuse

    Financial Policy ManualPLANT ASSETS - RETIREMENT OF COMPUTING EQUIPMENT Effective: October 2004 Revised: September 2009 Last Reviewed: March 2015

    Add to Reading List

    Source URL: www.finance.upenn.edu

    Language: English - Date: 2015-08-05 11:18:18
    487Cyberwarfare / Cybercrime / Computer security / Computer network security / Secure communication / EHNAC / Health Insurance Portability and Accountability Act / Cybersecurity Information Sharing Act / United States Department of Homeland Security / Accreditation / Cyber-security regulation / Cyber security standards

    Cybersecurity Protection in Healthcare: How Accreditation Can Mitigate Your Risk

    Add to Reading List

    Source URL: www.ehnac.org

    Language: English - Date: 2016-05-09 17:07:24
    488Cybercrime / Password / Security / Form / HTTP cookie / Outlook.com / Spamming

    Microsoft Word - Tips for Using the Online System for Grant Reporting

    Add to Reading List

    Source URL: www.adminitrustllc.com

    Language: English - Date: 2014-12-17 17:54:01
    489Email authentication / Spam filtering / Computing / Social engineering / Cybercrime / Internet / Network architecture / Spamming / Phishing / DMARC / DomainKeys Identified Mail

    LostPass Pixel-perfect LastPass Phishing ShmooConSean Cassidy

    Add to Reading List

    Source URL: raw.githubusercontent.com

    Language: English
    490Security / Government / Safety / National security / United States Department of Homeland Security / Cybercrime / Cyberwarfare / Computer network security / Computer security / Counter-terrorism / Homeland security / Texas Department of Public Safety

    TEXAS HOMELAND SECURITY STRATEGIC PLAN: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the Priority Actions aligned with each Objective in the Texas Homeland Security Strategic Plan 2015

    Add to Reading List

    Source URL: txdps.state.tx.us

    Language: English - Date: 2015-10-22 14:12:04
    UPDATE