Search

Your search keyword '"Computer crimes -- Forecasts and trends"' showing total 95 results

Search Constraints

Start Over You searched for: Descriptor "Computer crimes -- Forecasts and trends" Remove constraint Descriptor: "Computer crimes -- Forecasts and trends" Publisher united business media llc Remove constraint Publisher: united business media llc
95 results on '"Computer crimes -- Forecasts and trends"'

Search Results

1. Stay a step ahead of fraud: perpetrators of fraud are changing tactics faster than traditional methods of detection can track. Predictive analytics, authentication and rules engines are helping companies detect and fight crime

2. Browser As Attack Vector

3. Strategic Security: Our 13th Annual Survey

4. Botnet Targets CIA, FBI

5. China Attacks Began With Spear Phishing

6. 'Conficker' Computer Virus Going Strong; The Conficker and Taterf worms are still going strong a year after they made their first appearances, security experts report

7. Worms Invade Corporate Computers, Microsoft Finds; In its latest Security Intelligence Report, Microsoft documents the doubling of worms in enterprises during the first half of 2009

8. Evidence Points To China In Cyber Attacks; A Northrup Grumman report suggests that the Chinese government is behind a coordinated series of attacks on U.S. government and private sector computer systems

9. Beware Hijacked Social Networking Accounts, FBI Warns; Social networking sites are becoming a more popular attack vector for cybercriminals because people trust those they believe to be friends

10. Internet Has Never Been More Dangerous, Report Says; The Anti-Phishing Working Group reports record levels of fake antivirus software and other malware

11. IW500: Security Threats Pose New Challenges; New technologies such as cloud computing make security a challenge for enterprises, according to panelists at the InformationWeek 500 Conference

13. Google Groups Used To Direct Trojan Malware; Malicious software has been found looking to Google Groups for instructions on how to behave badly

14. Jessica Biel Searches Deemed Most Dangerous; Searching for celebrities may be one of the most effective ways to infect your computer

15. Fake Security Software Steals $34 Million Monthly; Cybercriminals are making a fortune by preying on gullible computer users

16. Twitter Confidential Files Distributed By Hacker; The hacker who hijacked a Twitter admin account in May has been distributing sensitive files taken from the company, ostensibly to educate people about the risks of poor computer security

17. Details Emerge In U.S. Cyber Attacks; Malware that targeted Web sites of The White House, Department of Homeland Security, the FAA, and others appears to be a MyDoom variant

18. Google Sees Spam Surging; Spam, like movie zombies, just keeps coming. Despite the closure of spam ISPs, unwanted messages continue to spread

19. Twitter Employee Account Hijacked; A security breach of a Yahoo Mail account let one hacker peer at info about Barack Obama, Britney Spears, and others

20. Spam Is Making A Comeback, Google Finds; The volume of unwanted messages has been creeping upward at a rate of about 1.2% per day as spammers try to rebuild the infrastructure they lost at McColo

22. 'Sexy View' Malware Targets Symbian; The worm targets Symbian OS S60 3rd Edition handsets, and it can send a user's contacts, phone number, and other sensitive information to a remote server

23. Microsoft Internet Explorer 7 Vulnerability Being Exploited; Cyber criminals are using a malicious Microsoft Word file distributed through spam to attack an exploit Microsoft patched last week

24. Identity Thieves Face Pay Cut; While the number of fraud incidents is rising, criminals are earning less for each crime they commit

25. Cybercriminals Try Phishing With Fliers; The link advertised leads to malicious hacking script that attempts to establish a connection to a Web site that Symantec said has been associated with malware

26. Data Loss Costing Companies $6.6 Million Per Breach; Customers, it seems, lose faith in organizations that can't keep data safe and take their business elsewhere, a Ponemon Institute survey found

27. Web Malware Infects Fast, Dies Young; The number of new infected Web sites grew by 66%, from 100,000 to 200,000 per day to 200,000 to 300,000 per day in the past three months, according to AVG Technologies

28. Model's Lawsuit Against Google Prompts Malware Bloom; The Liskula Cohen defamation case has translated into a marketing opportunity that is now preying on social networking manipulation

29. Dell, McAfee, Seagate Deliver Self-Encrypting Hard Drive; The new Momentus FDE (full-disk encryption) notebook hard drives, at speeds of 5,400 and 7,200 rpm, in capacities of up to 320 GB, are shipping

30. Microsoft: Malware Threats Up 43%; The software maker says that the spread of unwanted software is growing faster than ever

31. Defense Intelligence Agency Fixes Risky Web Site Code; The presence of a call to execute JavaScript code that resides on a Statcounter.com server in Ireland provided a weak link in the security chain that could have been exploited

32. New Malware Technique Bypasses Traditional Defenses; Two UC San Diego students have demonstrated a way to turn good computer code into malicious instructions using a technique called 'return-oriented programming.'

33. Computer Keyboards Betray Users' Keystrokes To Radio Eavesdroppers; Swiss security researchers demonstrate that even wired keyboards emanate signals that can reveal a user's keystrokes

34. World Bank Besieged By Hackers, Or Not; According to a media report, the World Bank has experienced at least six major intrusions, two from the same IP address in China, since the summer of 2007

35. Clickjacking Attack Lets Web Sites See, Hear You; The technique can be used to hijack a computer's Webcam and microphone to create a malicious surveillance platform

36. Verizon Data Breach Report Reveals Industry-Specific Risks; The report finds that financial services companies face the highest risk from insiders, while high-tech, retail, and food and beverage businesses are most vulnerable to partner companies

37. Portrait Of A Computer Forensic Examiner; While data can be recovered from any computer, expert Ives Potrafka believes that corporate IT departments have far less control over what happens on PCs used for work

38. 'Clickjacking' Attack Prompts Warning To Disable Browser Plug-Ins; The flaw affects Apple Safari, Google Chrome, Microsoft Internet Explorer, Mozilla Firefox, and Opera and could trick a user into clicking on content from another page

39. CookieMonster Can Steal HTTPS Cookies; The Python-based tool actively gathers insecure SSL information and records that as well as normal HTTP cookies to Firefox-compatible cookie files

40. This Year's Data Breaches Surpass 2007 Totals; The rising number of reported data breaches in the last eight months may just mean corporate security auditors are better at finding compromised systems, ITRC researchers suggest

41. Princeton Review Security Flaw Outed By Competitor; One file reportedly contained information about 34,000 students and another contained names and birth dates of 74,000 students

42. Google Says Infected Spam Is Getting Worse; The company's Postini corporate e-mail security service reported that the volume of e-mail virus attacks peaked at almost 10 million on a single day

43. Black Hat: Windows Jingle Attack Exposed; The latest scheme steals data by encoding a user's password into audio data and concealing that data in the Windows startup tone for decoding later, researchers reveal

44. Most Security Breaches Go Unreported; An RSA survey found the e-mail-borne malware and phishing that affected 69% of respondents' companies, may not have led to serious consequences in every instance

45. Finjan Finds Health And Business Data Being Auctioned Online; More than 500 megabytes of valuable data are being offered to the highest bidder on crimeware servers in Argentina and Malaysia, says security firm Finjan

46. 'State Of The Internet' Shows Attacks, Network Speeds Up; Attacks coming from 125 countries targeted 23 unique network ports, with the most malicious traffic coming from the United States and China, Akamai reports

47. Hackers Make Way For Criminals In Cyberspace; Attacking the European Union's Internet backbone is now the preserve of organized crime, not young hackers out to prove a point

48. Brute-Force SSH Server Attacks Surge; If such an attack succeeds, the attacker may be able to view, copy, or delete important files on the accessed server or execute malicious code

49. Web Firm Sounds Alert On Criminal Data Trove; A Web security firm said on Tuesday it had tipped off international banks and police after finding a huge trove of stolen business and personal data amassed on a server in the space of just three weeks

50. Study Finds 'Alarming' Ignorance About Cybercrime; 'Consumers' unsecured computers play a major role in helping cybercriminals conduct cybercrimes,' the National Cyber Security Alliance warns

Catalog

Books, media, physical & digital resources