Cybercrime

Results: 3090



#Item
501Computer hardware / Computing / Cybercrime / Computer storage devices / Non-volatile memory / USB flash drive / USB / Computer virus / AutoRun / Drive letter assignment / Social engineering / Personal computer

1 Users Really Do Plug in USB Drives They Find Matthew Tischer† Zakir Durumeric‡† Sam Foster† Sunny Duan† Alec Mori† Elie Bursztein3 Michael Bailey† †

Add to Reading List

Source URL: zakird.com

Language: English
502Human sexuality / Behavior / Pornography / Sex and the law / Human behavior / Cybercrime / Abuse / Bullying / Sexting / Revenge porn / Cyberbullying / Child pornography

State Sexting Laws A Brief Review of State Sexting and Revenge Porn Laws and Policies July 2015 Sameer Hinduja, Ph.D. and Justin W. Patchin, Ph.D.

Add to Reading List

Source URL: cyberbullying.org

Language: English - Date: 2015-07-15 15:32:30
503Computer security / Cybercrime / National security / Computer network security / Cyberwarfare / Fox-IT / Threat / Supply chain attack / Outline of computer security

Fox-IT vormtaal patroon-0,3 cmyk

Add to Reading List

Source URL: www.fox-it.com

Language: English - Date: 2016-02-28 10:36:02
504Security / Prevention / National security / Safety / Cybercrime / E-commerce / Cyberwarfare / Computer network security / Computer security / United States Cyber Command / Resilience / Cyber-attack

SUPERSTORM SANDY: IMPLICATIONS FOR DESIGNING A POST‑CYBER ATTACK POWER RESTORATION SYSTEM Paul Stockton Copyright © 2016 The Johns Hopkins University Applied Physics Laboratory LLC. All Rights Reserved.

Add to Reading List

Source URL: www.jhuapl.edu

Language: English - Date: 2016-03-29 09:30:55
505Censorship / Freedom of speech / Hate crime / Hate speech / Political correctness / Definitions of terrorism / Terrorism Act / Freedom of speech by country

  Pakistan: New Cybercrime Bill Threatens the Rights to Privacy and Free Expression ARTICLE 19 and Digital Rights Foundation Pakistan have serious concerns about measures

Add to Reading List

Source URL: digitalrightsfoundation.pk

Language: English - Date: 2015-04-20 17:02:37
506Cybercrime / Phishing / Computer security / Website defacement / Transmission Control Protocol / World Wide Web

JPCERT/CC Incident Handling Report [April 1, 2015 – June 30, 2015]

Add to Reading List

Source URL: www.jpcert.or.jp

Language: English - Date: 2015-09-09 21:00:36
507

10 AprilFighting cybercrime worldwide requires law enforcement and private sector to work more closely together, says INTERPOL Chief INTERPOL to work with Kaspersky Lab to create cyber alerts on serious global Int

Add to Reading List

Source URL: www.forum-tac.com

Language: English - Date: 2015-05-25 11:53:58
    508Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Cybercrime / Computer security / Internet privacy / Information security / Authentication

    CNRS Information System Security Charter This charter, annexed to the internal regulations of Entities, is to inform users of their rights and responsibilities in connection with the use of CNRS computer resources and In

    Add to Reading List

    Source URL: cc.in2p3.fr

    Language: English - Date: 2015-11-26 03:23:27
    509Cyberwarfare / Computing / Computer security / Computer network security / Internet security / Cryptography / Cybercrime / Electronic voting / Malware / Denial-of-service attack / Computer virus / Computer worm

    Security Considerations for Remote Electronic Voting over the Internet Avi Rubin AT&T Labs – Research Florham Park, NJ

    Add to Reading List

    Source URL: avirubin.com

    Language: English - Date: 2012-11-01 14:51:07
    510Computing / Security engineering / Computer security / Security / Computer network security / Sqrrl / Threat / Cyberwarfare / Cybercrime / E-commerce / Big data / Information security operations center

    DATASHEET SQRRL ENTERPRISE USE CASE: CYBER HUNTING Proactively uncover hidden threats through cyber hunting The days when Security Operations Center analysts could sit back and wait for alerts to come to them have long

    Add to Reading List

    Source URL: sqrrl.com

    Language: English - Date: 2016-02-15 14:44:42
    UPDATE