Quantcast

Latest Computer crime Stories

c721455c1292435a74f22b721ccfeab1
2011-06-23 10:35:00

The FBI and police agencies in seven other countries have seized computers and servers from which a "scareware" scheme was being operated. According to Reuters, the operation had bilked more than $72 million from victims by selling software that claimed to find security risks on PCs and then asked for cash to fix the non-existent problems. In the US, 22 computers and servers were seized along with 25 others in France, Germany, Latvia, Lithuania, the Netherlands, Sweden and the United...

2011-06-14 00:00:00

Intended for the computer-literate (non-programmer, non-IT staff) home and small business User, the new book provides a source of "how-to" basic techniques for making personal computers resistant to cyber attack. (PRWEB) June 12, 2011 Intended for the computer-literate (non-programmer, non-IT staff) home and small business User, the book provides a source of "how-to" basic techniques for making personal computers resistant to cyber attack. Sample topic discussed within "Is Your Computer...

11c6e5de9f262011de5e4e370e79bd46
2011-05-17 10:30:00

A new initiative was launched on Monday by the White House designed to tighten global defenses against computer attacks and instill U.S. values such as freedom of expression that require international cooperation to ensure an open and secure Internet. "Together, we can work together to build a future for cyberspace that is open, interoperable, secure, and reliable," US President Barack Obama wrote in an introduction to the 25-page "International Strategy for Cyberspace." Cybersecurity has...

2011-05-07 00:00:28

With the rise of the Internet has come internet-based crimes, from child pornography to internet fraud to copyright crimes. The Chetson Firm, a Raleigh criminal law firm, warns that this presents unique challenges to police, and to lawyers. A Raleigh lawyer who is not familiar with the technologies that support the internet - from peer-to-peer networking and file sharing, to encryption schemes that protect data - may not be able to adequately defend you against charges of Internet fraud,...

4b93d452e673ce19042ee351eb4eb108
2011-05-04 11:03:33

With the advancement of technology, the Internet has become a major tool for European organized crime, top officials at Europol say. These criminals use the Internet for drugs and human trafficking as well as money laundering and cybercrime. "Organized crime is a multi"“billion euro business in Europe and it is growing in scale. The further expansion of Internet and mobile technologies, the proliferation of illicit trafficking routes and methods as well as opportunities offered by the...

2011-05-03 06:00:00

NEW YORK, May 3, 2011 /PRNewswire/ -- Verizon will highlight findings from the 2011 Data Breach Investigations Report in a webinar on May 5. The webinar, entitled "Learn from the Mistakes of Others: Be Better Prepared to Combat Security Risks to Your Organization," will share insights and offer recommendations on how organizations can better protect themselves from data breaches. WHEN: Thursday, May 5, 11:15 a.m. - 12:15 p.m. Eastern time WHERE: 2011 Data Breach Investigations...

2011-04-18 23:01:00

NEW YORK, April 19, 2011 /PRNewswire/ -- Data loss through cyber attacks decreased sharply in 2010, but the total number of breaches was higher than ever, according to the "Verizon 2011 Data Breach Investigations Report." These findings continue to demonstrate that businesses and consumers must remain vigilant in implementing and maintaining security practices. The number of compromised records involved in data breaches investigated by Verizon and the U.S. Secret Service dropped from 144...

24dbc62926e8604c7a39c16686f6fd511
2011-02-19 05:55:00

The head of the US National Security Agency (NSA) on Thursday advised computer security specialists to tighten the nation's critical infrastructure against cyber crime that will most likely become more advanced and destructive. Cyber Command director General Keith Alexander said at the RSA Conference in San Francisco that the NSA's "active defenses" designed to defend military networks should be extended to include civilian government agencies and key private-sector networks. "I believe we...

2011-02-16 09:30:00

MOUNTAIN VIEW, Calif., Feb. 16, 2011 /PRNewswire/ -- To protect and inform the billions of people online, Norton today introduced the Norton Cybercrime Index, which tracks and warns computer users about daily cybercrime risks around the world, providing information that is timely and actionable. With recent threats like the Here You Have (H-Y-H) virus, which tried to shut down electronic communications worldwide, and the high-profile attacks by Zeus botnets, computer users need a tool that...

2011-02-15 08:02:00

ATLANTA, Feb. 15, 2011 /PRNewswire/ -- President and CEO of LIGATT Security International, (Pink Sheets: LGTT) Gregory D. Evans continues to be a leading expert in the cyber security industry. According to Nelson Media Research, who analyzes the television audiences, more than 20 million people in the United States have heard Evans speak about cyber crime, as of February 2011. These figures are a low estimate, as they do not include the audiences that have heard Evans speak while on his...


Word of the Day
cock-a-hoop
  • Exultant; jubilant; triumphant; on the high horse.
  • Tipsy; slightly intoxicated.
This word may come from the phrase 'to set cock on hoop,' or 'to drink festively.' Its origin otherwise is unclear. A theory, according to the Word Detective, is that it's a 'transliteration of the French phrase 'coq a huppe,' meaning a rooster displaying its crest ('huppe') in a pose of proud defiance.' Therefore, 'cock-a-hoop' would 'liken a drunken man to a boastful and aggressive rooster.'
Related