Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >  

Crimes

RSS Feed   
Crimes Reports
 
The exploitation of flaws in the HTTPS protocol
sponsored by ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 16 Apr 2019 | Published: 16 Apr 2019

ComputerWeekly.com

Virtual currencies and their potential role in cyber crime
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.
Posted: 04 Aug 2016 | Published: 04 Aug 2016

ComputerWeekly.com

Fighting fraud in government
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Public sector organisations are experiencing increasing levels of economic crime, including cybercrime, and are particularly at risk from being defrauded by their own employees and their suppliers, according to findings from PwC’s latest Global Economic Crime Survey.
Posted: 13 Jan 2012 | Published: 13 Jan 2012

ComputerWeekly.com

Ransomware - NEW for 2020: Ransomware Defense for Dummies - 2nd Edition
sponsored by Cisco Umbrella
EBOOK: The 2nd edition of Cisco Umbrella's popular Ransomware Defense For Dummies eBook explores the top cyber security best practices to reduce risks.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Cisco Umbrella

Ransomware Can’t Stop the Presses at La Sentinelle
sponsored by Malwarebytes
CASE STUDY: In this case study, La Sentinelle, a media group in Mauritius, sought to eliminate downtime associated with ransomware in the wake of a disruptive malware attack. Download this white paper to learn how they developed a program that would enable them to identify, mitigate, and prevent malware attacks.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

Malwarebytes

Observations from The Front Lines of Threat Hunting
sponsored by CrowdStrike
WHITE PAPER: Falcon OverWatch is a CrowdStrike managed threat hunting service, comprised of a team of specialists who analyze networks to identify, isolate and hunt cyberattackers. Download this report to view the key trends and recommendations from OverWatch’s threat hunting findings.
Posted: 21 Feb 2020 | Published: 21 Feb 2020

CrowdStrike

Do Your Employees Have the Freedom to Roam? CW Mobility E-Zine: January 2016
sponsored by ComputerWeekly.com
EZINE: In this issue of CW Europe, you will take an in-depth look at the major mobile roaming charge concern that is set to impact people across 28 European Union member states. Read on to see if the end of roaming charges will lead to more enterprises adopting video conferencing services.
Posted: 21 Jan 2016 | Published: 21 Jan 2016

ComputerWeekly.com

Global Security Report 2011
sponsored by Trustwave
WHITE PAPER: In 2010, SpiderLabs performed more than 220 investigations worldwide. In 85% of the investigations, a system breach was confirmed. Of those entities in which a system breach was confirmed, 90% involved the actual theft of sensitive data, representing criminals’ effectiveness in extracting data once system access is obtained.
Posted: 27 Jan 2011 | Published: 26 Jan 2011

Trustwave

Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
sponsored by Imperva
WHITE PAPER: Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

Web Threats 2010: The Risks Ramp Up
sponsored by CSC
WHITE PAPER: In the face of unprecedented web threat level growth, CSC CloudProtection for Mail and Web delivers protection of the very highest quality for thousands of businesses worldwide. Read this white paper to learn more about today's web threats and how your business can protect itself against them comprehensively and cost-effectively.
Posted: 17 Nov 2010 | Published: 17 Nov 2010

CSC
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info