CyberCrime

Results: 3090



#Item
541Types of insurance / Finance / Economy / Money / National security / Actuarial science / Financial institutions / Cybercrime / Insurance / Resilience / Reinsurance / Computer security

Fast growing demand for cyber insurance offers a huge commercial opportunity for insurers and reinsurers, but could also expose the industry to potentially devastating losses. How can your business develop the risk evalu

Add to Reading List

Source URL: www.pwc.com

Language: English - Date: 2015-09-13 21:33:37
542Computer security / Security / Computer access control / Cryptography / Identity management / Cybercrime / Password / Challengeresponse authentication / Computer virus / Antivirus software / Multi-factor authentication / Password policy

“...no one can hack my mind”: Comparing Expert and Non-Expert Security Practices Iulia Ion Rob Reeder

Add to Reading List

Source URL: www.usenix.org

Language: English
543Computer access control / Password / Security / Prevention / Access control / Cybercrime / Password strength

soups_gp_v16_camera_ready

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-05-29 23:53:46
544Computing / Software / Cyberspace / Simulation / Spamming / Email / Cybercrime / Marketing / Agent-based model / Diffusion of innovations / Macroeconomic model / Twitter

Int. J. Security and Networks, Vol. x, No. x, xxxx 1 Spam diffusion in a social network initiated by hacked e-mail accounts

Add to Reading List

Source URL: www.casos.cs.cmu.edu

Language: English
545Cybercrime / Security / Computing / Cyberspace / Identity theft / Phishing / Social engineering / Spamming / Computer security / Website defacement / Transmission Control Protocol / World Wide Web

JPCERT/CC Incident Handling Report [April 1, 2015 – June 30, 2015]

Add to Reading List

Source URL: www.jpcert.or.jp

Language: English - Date: 2015-09-09 21:00:36
546

Brief overview of WWPass WWPass Corporation, based in Manchester, NH, offers solutions to the growing problems of cybercrime, electronic record loss and identity theft. WWPass raises the bar with a new approach to authen

Add to Reading List

Source URL: www.wwpass.com

Language: English - Date: 2015-05-18 15:30:05
    547

    Microsoft PowerPoint - ISACA-LA_June10-2014-Cybercrime_Rising Risks and Reduced Readiness.pptx

    Add to Reading List

    Source URL: isacala.org

    Language: English - Date: 2014-06-12 02:40:28
      548Security / Computing / Computer security / Cyberwarfare / Computer network security / Cybercrime / National security / Threat / Information security operations center / Abuse / United States Computer Emergency Readiness Team / New Jersey Cybersecurity and Communications Integration Cell

      AbuseSA Build a More Resilient World KEY ABUSESA FEATURES: • Automated Data Collection

      Add to Reading List

      Source URL: www.codenomicon.com

      Language: English - Date: 2016-03-02 04:58:12
      549Cybercrime / Phishing / Computer security / Computer emergency response team / CERT Coordination Center / World Wide Web / Advanced persistent threat / International cybercrime

      JPCERT/CC Activities Overview [April 1, 2015 – June 30, 2015]

      Add to Reading List

      Source URL: www.jpcert.or.jp

      Language: English - Date: 2015-09-09 21:00:36
      UPDATE