cyber crime
cyber crime
-
1.
by Etienne A. Gibbs - 2007-02-04
Zombie PCs, Home Computer Hacking, and Drive-by Hacking By Etienne A. Gibbs, MSWInternet Safety AdvocateSpyware, Keyloggers, Hackers, Cyber Terrorists, Cybercriminals, Cybergangs, etc. These threat...
-
2.
by Tarsem - 2007-02-08
Email has fast emerged as the world's most preferred form of communication. Billions of email messages traverse the globe daily. Like any other form of communication, email is also misused by criminal...
-
3.
by Coenraad De Beer - 2007-02-08
One evening Victor Victim sits in front of his computer, downloading his latest e-mails. He gets an e-mail with a subject line reading "CONGRATULATIONS YOUR EMAIL ADDRESS WON 1.5 MILLION UNITED STATES...
-
4.
by Etienne A. Gibbs - 2007-02-18
Are Viruses, Spyware, Trojans, and Hackers Hiding in Your Software? By Etienne A. Gibbs, MSWInternet Safety AdvocateSpyware, Keyloggers, Hackers, Cyber Terrorists, Cybercriminals, Cybergangs, etc. The...
-
5.
by Etienne A. Gibbs - 2007-02-19
MySpace and other social networking sites offer thriving communities where young people engage in countless hours of banal chatter and photo sharing. Not coincidentally, these social networking sit...
-
6.
by Etienne A. Gibbs - 2007-02-27
If your son or daughter is a recently high school graduate and college freshman, he or she is the ideal target cybercriminals are looking. "Why?" you might ask. For cybercriminals the answer is eas...
-
7.
by Coenraad De Beer - 2007-02-28
Why are people reluctant to report spam to the abuse departments of well-known e-mail and hosting service providers? Many people don't know that such departments exist and other are fed up with the ig...
-
8.
by Etienne A. Gibbs, MSW - 2007-02-28
While surfing the 'net, I came across a report about the reduction of identity theft and identity fraud. Obviously, it caught my attention. Following, in part, is that report which was produced by Jav...
-
9.
by Etienne A. Gibbs - 2007-02-27
A ring of cybercriminals recently broken up by Russian authorities used keylogging software planted in e-mail messages and hidden in websites to draw over $1.1 million from personal bank accounts i...
-
10.
by Etienne A. Gibbs, MSW - 2007-03-04
When the Super Highway became commercialized, its use was intended for the free and legitimate exchange of information and instantaneous communication. It was a fairly innocent medium, awkward to some...