Quantcast

Latest Computer crime Stories

2009-06-25 11:00:00

Joint Presentation to Feature Key Findings from '2009 Data Breach Investigations Report' BASKING RIDGE, N.J., June 25 /PRNewswire/ -- Verizon Business and U.S. Department of Justice experts will pair up at the Gartner Information Security Summit for a discussion on recent cybercrime trends. The speakers will highlight important findings from Verizon Business' "2009 Data Breach Investigations Report." WHEN: Tuesday, June 30, 4 p.m. Eastern time WHERE: Gartner Information Security Summit...

e3c286e81eb4e426acb1d46522e553cf1
2009-06-24 08:50:00

The US military announced on Wednesday a new "cyber command" created to fight digital crime and to increase defenses against rising threats to its computers. Defense Secretary Robert Gates created the command that will answer to the US Strategic Command, Pentagon spokesman Bryan Whitman stated. The headquarters, housed at Fort Meade, Maryland, will be accountable for shielding U.S. military systems only, Whitman said. When inquired about if the command would be offensive as well defensive,...

2009-06-18 17:41:00

Jack Harbaugh presenting at ARC's 2009 Annual Global Fraud Prevention Forum on June 24 in Santa Monica, Calif. SCOTTSDALE, Ariz., June 18 /PRNewswire/ -- 41st Parameter Inc., a leading provider of fraud detection and prevention systems to the Airline Industry, today announced Jack Harbaugh, senior vice president of business development, will be speaking at the 2009 Annual Global Fraud Prevention Forum on the "Importance of Device Data for True Intelligence." The presentation will be given on...

2009-06-17 07:09:00

SAN JOSE, California, June 17 /PRNewswire/ -- Finjan Inc., a leader in secure web gateway products and the provider of a unified web security solution for the enterprise market, today announced that its Malicious Code Research Center (MCRC) managed to research a trading network and botnet, where compromised PCs are bought and sold for profit. In the second issue of its "Cybercrime Intelligence Report" of 2009, Finjan shows the operations of the Golden Cash network consisting of an entire...

2009-06-15 10:44:52

Could an entirely new approach to online security, based on distributed sanctions, help prevent cybercrime, fraud and identity theft? A report in the International Journal of Intercultural Information Management suggests it could. Susan Brenner of the University of Dayton School of Law, in Dayton, OH, and Leo Clarke of the Thomas M. Cooley School of Law, in Lansing, MI, suggest that government could control cybercrime by requiring anyone accessing cyberspace to employ reasonable security...

59c2d25045b1a0d03e9fdc7d03445ae71
2009-05-29 14:15:00

President Barack Obama announced on Friday that he would name a new  "cyber czar" to ensure the country is protecting the security of its computer networks.  Speaking at the White House, Obama said the U.S. must do more to deter and defend against a growing number of criminal, espionage and hacker attacks on public and private networks. "It is the great irony of our information age -- the very technologies that empower us to create and to build, also empower those who would seek to...

2009-05-19 09:30:00

Free identity-theft prevention tips, tools and new Web site security widget from Trend Micro - now available to everyone. CUPERTINO, Calif., May 19 /PRNewswire/ -- Between 2007 and 2008, over 80 percent of data breaches were electronic; identity theft - both online and off - affected 10 million new victims in the United States last year alone and cost the average consumer nearly $500. The problem is not endemic to consumers alone - cybercriminals looking for a larger payload are targeting...

2009-05-14 06:00:00

Speaker to Highlight Top Recommendations From Verizon Business '2009 Data Breach Investigations Report' LAS VEGAS, May 14 /PRNewswire/ -- Dr. Peter Tippett, vice president of innovation and technology at Verizon Business, will keynote at the CSI SX security conference on May 18. His presentation, "The Economy's Effect on Security: Inside the Worst Data Breaches," will highlight Verizon Business' "2009 Data Breach Investigations Report," with an emphasis on how security officers can...

2009-05-13 13:55:00

A Panda Security study of 4,000 adolescents reveals alarming statistics around teenage hacking rates and exploration   GLENDALE, Calif., May 13 /PRNewswire/ -- Panda Security, a leading provider of IT security solutions, today announced the results of a four month survey carried out by Panda Security(1) that analyzed the online behaviors, technology knowledge, and hacking activities of more than 4,000 adolescents between the ages of 15 and 18 years old. The study results indicate...

2009-05-07 07:00:00

Establishes Applied Research Agenda for Confronting Global Identity Management Challenges WASHINGTON, May 7 /PRNewswire/ -- The Center for Applied Identity Management Research (CAIMR), a trusted public-private partnership of cross-disciplinary experts focused on conducting applied research that addresses current and future identity management challenges, today announced the release of its first annual workshop report, "An Applied Research Agenda for Confronting Global Identity Management...


Word of the Day
call-note
  • The call or cry of a bird or other animal to its mate or its young.
'Call-note' is newer than 'bird-call,' which originally referred to 'an instrument for imitating the note of birds' but now also refers to 'the song or cry of a bird.'
Related