95 results on '"Computer crimes -- Forecasts and trends"'
Search Results
2. Browser As Attack Vector
3. Strategic Security: Our 13th Annual Survey
4. Botnet Targets CIA, FBI
5. China Attacks Began With Spear Phishing
6. 'Conficker' Computer Virus Going Strong; The Conficker and Taterf worms are still going strong a year after they made their first appearances, security experts report
7. Worms Invade Corporate Computers, Microsoft Finds; In its latest Security Intelligence Report, Microsoft documents the doubling of worms in enterprises during the first half of 2009
8. Evidence Points To China In Cyber Attacks; A Northrup Grumman report suggests that the Chinese government is behind a coordinated series of attacks on U.S. government and private sector computer systems
9. Beware Hijacked Social Networking Accounts, FBI Warns; Social networking sites are becoming a more popular attack vector for cybercriminals because people trust those they believe to be friends
10. Internet Has Never Been More Dangerous, Report Says; The Anti-Phishing Working Group reports record levels of fake antivirus software and other malware
11. IW500: Security Threats Pose New Challenges; New technologies such as cloud computing make security a challenge for enterprises, according to panelists at the InformationWeek 500 Conference
12. Popular News Topics Become Malware Bait; Curiosity about current events is being leveraged to spread malware
13. Google Groups Used To Direct Trojan Malware; Malicious software has been found looking to Google Groups for instructions on how to behave badly
14. Jessica Biel Searches Deemed Most Dangerous; Searching for celebrities may be one of the most effective ways to infect your computer
15. Fake Security Software Steals $34 Million Monthly; Cybercriminals are making a fortune by preying on gullible computer users
16. Twitter Confidential Files Distributed By Hacker; The hacker who hijacked a Twitter admin account in May has been distributing sensitive files taken from the company, ostensibly to educate people about the risks of poor computer security
17. Details Emerge In U.S. Cyber Attacks; Malware that targeted Web sites of The White House, Department of Homeland Security, the FAA, and others appears to be a MyDoom variant
18. Google Sees Spam Surging; Spam, like movie zombies, just keeps coming. Despite the closure of spam ISPs, unwanted messages continue to spread
19. Twitter Employee Account Hijacked; A security breach of a Yahoo Mail account let one hacker peer at info about Barack Obama, Britney Spears, and others
20. Spam Is Making A Comeback, Google Finds; The volume of unwanted messages has been creeping upward at a rate of about 1.2% per day as spammers try to rebuild the infrastructure they lost at McColo
21. Conficker's April Fools' Day Update Begins With A Yawn; The worm was designed initially to exploit a Microsoft Windows vulnerability that was patched last October
22. 'Sexy View' Malware Targets Symbian; The worm targets Symbian OS S60 3rd Edition handsets, and it can send a user's contacts, phone number, and other sensitive information to a remote server
23. Microsoft Internet Explorer 7 Vulnerability Being Exploited; Cyber criminals are using a malicious Microsoft Word file distributed through spam to attack an exploit Microsoft patched last week
24. Identity Thieves Face Pay Cut; While the number of fraud incidents is rising, criminals are earning less for each crime they commit
25. Cybercriminals Try Phishing With Fliers; The link advertised leads to malicious hacking script that attempts to establish a connection to a Web site that Symantec said has been associated with malware
26. Data Loss Costing Companies $6.6 Million Per Breach; Customers, it seems, lose faith in organizations that can't keep data safe and take their business elsewhere, a Ponemon Institute survey found
27. Web Malware Infects Fast, Dies Young; The number of new infected Web sites grew by 66%, from 100,000 to 200,000 per day to 200,000 to 300,000 per day in the past three months, according to AVG Technologies
28. Model's Lawsuit Against Google Prompts Malware Bloom; The Liskula Cohen defamation case has translated into a marketing opportunity that is now preying on social networking manipulation
29. Dell, McAfee, Seagate Deliver Self-Encrypting Hard Drive; The new Momentus FDE (full-disk encryption) notebook hard drives, at speeds of 5,400 and 7,200 rpm, in capacities of up to 320 GB, are shipping
30. Microsoft: Malware Threats Up 43%; The software maker says that the spread of unwanted software is growing faster than ever
31. Defense Intelligence Agency Fixes Risky Web Site Code; The presence of a call to execute JavaScript code that resides on a Statcounter.com server in Ireland provided a weak link in the security chain that could have been exploited
32. New Malware Technique Bypasses Traditional Defenses; Two UC San Diego students have demonstrated a way to turn good computer code into malicious instructions using a technique called 'return-oriented programming.'
33. Computer Keyboards Betray Users' Keystrokes To Radio Eavesdroppers; Swiss security researchers demonstrate that even wired keyboards emanate signals that can reveal a user's keystrokes
34. World Bank Besieged By Hackers, Or Not; According to a media report, the World Bank has experienced at least six major intrusions, two from the same IP address in China, since the summer of 2007
35. Clickjacking Attack Lets Web Sites See, Hear You; The technique can be used to hijack a computer's Webcam and microphone to create a malicious surveillance platform
36. Verizon Data Breach Report Reveals Industry-Specific Risks; The report finds that financial services companies face the highest risk from insiders, while high-tech, retail, and food and beverage businesses are most vulnerable to partner companies
37. Portrait Of A Computer Forensic Examiner; While data can be recovered from any computer, expert Ives Potrafka believes that corporate IT departments have far less control over what happens on PCs used for work
38. 'Clickjacking' Attack Prompts Warning To Disable Browser Plug-Ins; The flaw affects Apple Safari, Google Chrome, Microsoft Internet Explorer, Mozilla Firefox, and Opera and could trick a user into clicking on content from another page
39. CookieMonster Can Steal HTTPS Cookies; The Python-based tool actively gathers insecure SSL information and records that as well as normal HTTP cookies to Firefox-compatible cookie files
40. This Year's Data Breaches Surpass 2007 Totals; The rising number of reported data breaches in the last eight months may just mean corporate security auditors are better at finding compromised systems, ITRC researchers suggest
41. Princeton Review Security Flaw Outed By Competitor; One file reportedly contained information about 34,000 students and another contained names and birth dates of 74,000 students
42. Google Says Infected Spam Is Getting Worse; The company's Postini corporate e-mail security service reported that the volume of e-mail virus attacks peaked at almost 10 million on a single day
43. Black Hat: Windows Jingle Attack Exposed; The latest scheme steals data by encoding a user's password into audio data and concealing that data in the Windows startup tone for decoding later, researchers reveal
44. Most Security Breaches Go Unreported; An RSA survey found the e-mail-borne malware and phishing that affected 69% of respondents' companies, may not have led to serious consequences in every instance
45. Finjan Finds Health And Business Data Being Auctioned Online; More than 500 megabytes of valuable data are being offered to the highest bidder on crimeware servers in Argentina and Malaysia, says security firm Finjan
46. 'State Of The Internet' Shows Attacks, Network Speeds Up; Attacks coming from 125 countries targeted 23 unique network ports, with the most malicious traffic coming from the United States and China, Akamai reports
47. Hackers Make Way For Criminals In Cyberspace; Attacking the European Union's Internet backbone is now the preserve of organized crime, not young hackers out to prove a point
48. Brute-Force SSH Server Attacks Surge; If such an attack succeeds, the attacker may be able to view, copy, or delete important files on the accessed server or execute malicious code
49. Web Firm Sounds Alert On Criminal Data Trove; A Web security firm said on Tuesday it had tipped off international banks and police after finding a huge trove of stolen business and personal data amassed on a server in the space of just three weeks
50. Study Finds 'Alarming' Ignorance About Cybercrime; 'Consumers' unsecured computers play a major role in helping cybercriminals conduct cybercrimes,' the National Cyber Security Alliance warns
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.