Extortion

Results: 118



#Item
21Email / Subscription business model / Internet / Computing / Electronics / Malware / Extortion / Ransomware

Fake speeding ticket emails distributing ransomware | Stay Smart Online:48 AM Home » Alert Service » Fake speeding ticket emails distributing ransomware

Add to Reading List

Source URL: www.illawarralegalcentre.org.au

Language: English - Date: 2014-12-07 19:51:51
22Extortion / Malware / Ransomware / Computing / Eugene Kaspersky / Kaspersky Lab / Bitcoin / IDG / Trojan horses / Software / System software / Antivirus software

Dutch police, Kaspersky Lab fight against CoinVault

Add to Reading List

Source URL: techxplore.com

Language: English - Date: 2015-05-04 04:05:21
23Crimes / Extortion / Cartesian coordinate system / Geometry / Analytic geometry / Mathematics

RTF Document

Add to Reading List

Source URL: abs.gov.au

Language: English - Date: 2014-08-14 21:33:49
24Politics / Political corruption / Abuse / Foreign Corrupt Practices Act / Resource curse / Bribery / Global Witness / Peak oil / Economics / Corruption / Ethics

Extortion in the Oil States: Nationalization, Regulatory Structure, and Corruption Paasha Mahdavi∗ NovemberAbstract

Add to Reading List

Source URL: paasha.bol.ucla.edu

Language: English - Date: 2014-11-11 11:37:35
25

[removed]OCASIO V. UNITED STATES DECISION BELOW: 750 F.3d 399 LOWER COURT CASE NUMBER: [removed]QUESTION PRESENTED: The Hobbs Act defines extortion, in relevant part, as "the obtaining of property from

Add to Reading List

Source URL: www.supremecourt.gov

- Date: 2015-03-03 12:42:46
    26Antivirus software / Concurrent computing / Extortion / Ransomware / USB flash drive / Computer virus / Remote backup service / Data center / Backup / Computing / System software / Malware

    MARCH/APRIL 2015 Volume 7, Number 2 10 Approaches to the Future of Risk:

    Add to Reading List

    Source URL: www.naspa.com

    Language: English - Date: 2015-03-23 14:05:18
    27Ransomware / Antivirus software / Hackers: Heroes of the Computer Revolution / Hacker / Computer virus / Backup / Email spam / Computing / Malware / Extortion

    Computer users face hard choice—pay ransom or lose files

    Add to Reading List

    Source URL: phys.org

    Language: English - Date: 2015-04-18 10:39:30
    28Implied warranty / Security / War / Hazelwood / Damages / Academi

    A Quick Reference Guide to Kidnap for Ransom and Extortion Response Quick Facts Drawing upon decades of experience we are fulfilling a need in the market for comprehensive crisis management expertse. Highly trained staff

    Add to Reading List

    Source URL: www.ironshore.com

    Language: English - Date: 2014-11-17 15:39:09
    29Investment / Financial institutions / Institutional investors / Deductible / Insurability / Indemnity / Cancellation / Co-insurance / Risk purchasing group / Insurance / Financial economics / Types of insurance

    Microsoft Word - Kidnap-Ransom and Extortion Policy6[removed]DOC

    Add to Reading List

    Source URL: www.ironshore.com

    Language: English - Date: 2014-06-10 10:05:35
    30Extortion / Law / Ethics / Crimes / Theft / Robbery

    Adapted from Australian Bureau of Statistics, Recorded Crime - Victims, Australia, [removed]

    Add to Reading List

    Source URL: media.crikey.com.au

    Language: English - Date: 2011-12-14 19:19:18
    UPDATE