Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Computer Crimes

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Breaches, Computer Fraud
DEFINITION: Cyberextortion is a crime involving an attack or threat of attack against an enterprise, coupled with a demand for money to avert or stop the attack.Cyberextortion can take many forms. Originally, denial of service (DoS) attacks were the most common method. In recent years, cybercriminals have developed ransomware that can be used to encrypt the victim's data. The attacker then demands money for  … 
Definition continues below.
Computer CrimesWhite Papers (View All Report Types)
6 Matches
The Cybercrime Arms Race
sponsored by Kaspersky Lab
WHITE PAPER: Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
Posted: 18 Feb 2008 | Published: 01 Feb 2008

Kaspersky Lab

Combating Insider Threats - The Application-level User Behavior Tracking Approach
sponsored by Intellinx Software Inc.
WHITE PAPER: This white paper looks at the growing problem of the insider threat and discusses the regulatory and other drivers that fuel the demand for new security solutions in this area. Find out how to mitigate insider threats and read this paper today.
Posted: 17 May 2007 | Published: 01 Apr 2006

Intellinx Software Inc.

Protecting Organizations from Spyware
sponsored by Websense, Inc.
WHITE PAPER: The internet has become a critical resource employees rely on to get their jobs done. Employees use the web to perform research and gather information. Learn about the risks associated with these activities.
Posted: 04 Apr 2007 | Published: 29 Jan 2007

Websense, Inc.

Ten Ways Hackers Breach Security
sponsored by Global Knowledge
WHITE PAPER: Hacking, cracking, and cyber crimes can wreak havoc on an organization. This white paper discusses ten common methods hackers use to breach your existing security, and what you can do to protect yourself.
Posted: 09 Feb 2007 | Published: 01 Jan 2007

Global Knowledge

The Extraordinary Failure of Anti-Virus Technology
sponsored by SecureWave
WHITE PAPER: Anti-Virus technology fails to prevent computers from virus infections. This paper examines how whitelisting prevents malware and defends against evolving threats. Learn about five common security breaches and how whitelisting can help prevent them.
Posted: 02 Feb 2007 | Published: 01 Feb 2007

SecureWave

Anti-Phishing Best Practices: Keys to Aggressively and Effectively Protecting Your Organization from Phishing Attacks
sponsored by Cyveillance
WHITE PAPER: Phishing has become one of the most common and effective online scams and can cost your company thousands of dollars. Download this new white paper and discover seven key objectives of an effective phishing protection and response plan.
Posted: 14 Nov 2006 | Published: 01 Apr 2006

Cyveillance
6 Matches
 
COMPUTER CRIMES DEFINITION (continued): …  the decryption key. As the number of enterprises that rely on the Internet for their business has increased, opportunities for cyberextortionists have exploded. The probability of identification, arrest, and prosecution is low because cyberextortionists usually operate from countries other than those of their victims and use anonymous accounts and fake e-mail addresses. Cyberextortion can be lucrative, netting attackers millions of dollars annually. A typical attack may result in a demand for thousands of U.S. dollars. Payment does not guarantee that further attacks will not occur, either by the … 
Computer Crimes definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement