To many involved in criminal dense, cyber crime is the bane of the 21st Century. It accounts for millions in ill-gotten earnings each year. Vast criminal networks spanning the global are now activel...
Zombie PCs, Home Computer Hacking, and Drive-by Hacking By Etienne A. Gibbs, MSWInternet Safety AdvocateSpyware, Keyloggers, Hackers, Cyber Terrorists, Cybercriminals, Cybergangs, etc. These threat...
Are Viruses, Spyware, Trojans, and Hackers Hiding in Your Software? By Etienne A. Gibbs, MSWInternet Safety AdvocateSpyware, Keyloggers, Hackers, Cyber Terrorists, Cybercriminals, Cybergangs, etc. The...
MySpace and other social networking sites offer thriving communities where young people engage in countless hours of banal chatter and photo sharing. Not coincidentally, these social networking sit...
If your son or daughter is a recently high school graduate and college freshman, he or she is the ideal target cybercriminals are looking. "Why?" you might ask. For cybercriminals the answer is eas...
While surfing the 'net, I came across a report about the reduction of identity theft and identity fraud. Obviously, it caught my attention. Following, in part, is that report which was produced by Jav...
A ring of cybercriminals recently broken up by Russian authorities used keylogging software planted in e-mail messages and hidden in websites to draw over $1.1 million from personal bank accounts i...
When the Super Highway became commercialized, its use was intended for the free and legitimate exchange of information and instantaneous communication. It was a fairly innocent medium, awkward to some...
Two out of five identity theft victims surveyed by the Identity Theft Assistance Center (ITAC, a nonprofit organization dedicated to fighting identity theft through victim assistance, research and law...
In its annual report earlier this year, the Federal Trade Commission announced that the most vulnerable targets of identity theft are 18-29-year olds. Likewise, the 2007 Identity Fraud Survey Report, ...