CyberCrime

Results: 3090



#Item
611

The Identity Theft Enforcement and Restitution Act of 2008 New Federal Law Targets ID Theft, Cybercrime President Bush last week signed into law a bill that seeks to make it easier for prosecutors to go after cybercrooks

Add to Reading List

Source URL: www.theiacp.org

Language: English - Date: 2014-02-04 08:47:44
    612Cybercrime / Protected computer / Appeal / Cioni / Law / Computer law / Computer network security

    Case: Document: 88 Date Filed:

    Add to Reading List

    Source URL: www.eff.org

    Language: English - Date: 2011-10-06 17:37:47
    613Cyberwarfare / Crime prevention / National security / Computer crimes / DShield / Phishing / Password / Malware / Vulnerability / Cybercrime / Computer security / Computer network security

      Reconceptualizing the Role of Security User L. Jean Camp Abstract: The Internet is not the only critical infrastructure that relies on the participation of

    Add to Reading List

    Source URL: www.ljean.com

    Language: English - Date: 2014-06-07 19:18:24
    614Internet culture / Internet / Disability / Population / Accessibility / Blindness / Anonymous / Project Chanology / Cybercrime / Information society / Educational psychology

    Comment from Anonymous, anonymous This is a Comment on the Architectural and Transportation Barriers Compliance Board (ATBCB) Proposed Rule: Information and Communication Technology Standards and Guidelines

    Add to Reading List

    Source URL: law.resource.org

    Language: English - Date: 2015-05-11 12:41:52
    615Electronic commerce / Information technology management / Marketing / Spam / Defamation / Troll / Twitter / Internet / Computing / Cybercrime

    Negative Comments Response Template (for Social Media) How to handle negative comments for Facebook, Twitter, LinkedIn and other social media platforms Level Comment

    Add to Reading List

    Source URL: www.bluewiremedia.com.au

    Language: English - Date: 2014-10-11 11:09:30
    616Computer crimes / Spamming / Phishing / Social engineering / Malware / Threat / Cyberwarfare / Email / Spam / Cybercrime / Internet / Computing

    Data Feeds Cyber criminals launch thousands of cyber attacks every day, and compromise thousands of legitimate websites, to spread malware, capture account credentials, launch phishing attacks, and perpetrate fraud. Thes

    Add to Reading List

    Source URL: info.cyveillance.com

    Language: English - Date: 2015-07-18 11:24:51
    617Cybercrime / Science / Antivirus software / DShield / Malware / Blacklist / Whitelist / Phishing / DNSBL / Spamming / Computer security / Computing

    To appear in Usenix Security, AugustHighly Predictive Blacklisting Jian Zhang

    Add to Reading List

    Source URL: www.cyber-ta.org

    Language: English - Date: 2008-05-20 23:18:29
    618

    Strategic Considerations on EU Law Enforcement Cooperation towards 2020 CEPOL Course “Cybercrime forensics & digital evidence” Tallinn

    Add to Reading List

    Source URL: www.sisekaitse.ee

    - Date: 2014-11-25 02:59:41
      619

      The world has gone digital. From Google to cybercrime, from email to virtual museums; everything we do now is affected by digital cultures and the internet. In this degree, we critically explore this change and

      Add to Reading List

      Source URL: www.kcl.ac.uk

      Language: English - Date: 2015-04-28 08:00:01
        620

        WIRTSCHAFTSKRIMINALITÄT UND CYBERCRIME FH Wiener Neustadt; Absolventinnen und Absolventen des FH-Lehrgangs „Wirtschaftskriminalität und Cybercrime“. Zahlen, Daten, Fahnder Am 30. Jänner 2014 endete der erste Fach

        Add to Reading List

        Source URL: www.bmi.gv.at

        Language: German - Date: 2014-03-19 04:28:10
          UPDATE