Computer Crime Research Center
Computer Crime Articles 2005
- Dec 24 Bob Felton Cyber security breaches threaten, 2006 forecasts
- Dec 22 The CAN-SPAM Act is working
- Dec 12 Computer crime trace: finding and evaluating
- Dec 07 Mohamed Chawki Cybercrime in France: An Overview
- Dec 02 Terrance A. Roebuck Network security: DoS vs DDoS attacks
- Nov 28 Sandra O’Connell Fraud: Online security concerns
- Nov 25 Scott Charney, Kent Alexander Types of computer crime
- Nov 23 Chuck McCutcheon Viruses, hackers and other cybersecurity dangers
- Nov 21 Arati Bechtel Howto avoid phishing scam
- Nov 18 Spyware howto
- Nov 15 BarkerJr Cyber crime
- Nov 10 Jack Kapica E-fraud: damage increases
- Nov 02 James Plummer New Patriot Act revisions affect computer industry
- Oct 28 Iain Thomson Internet safety approaches
- Oct 24 Jim Kouri, CPP Cybercrime: Threat increasing
- Oct 19 Dan Herbeck Child porn: State goes easy on child porn offenders
- Oct 18 Paul Meadowcroft, head of transaction security of the e-Security activities of the Thales Group Credit card fraud, IT Observer
- Oct 16 Daniel Thomas Specialist police units tackle computer crime
- Oct 12 Aarti Security issues: find the enemy within
- Oct 04 Michael Arnone White hat, gray hat, black hat
- Sep 29 Controlling spam
- Sep 21 Jeanne Sahadi Credit card breach: Tracing who dunnit
- Sep 07 Top ten viruses and hoaxes reported to Sophos in August 2005
- Aug 30
Peter Brookes The Art of Cyber War
- Aug 28 Federico Biancuzzi Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
- Aug 25 A flaw in the child porn witch-hunt
- Aug 16 Internet Stability, Security Must Be Maintained, U.S. Says
- Aug 09 Steve Coll, Susan B. Glasser and Julie Tate Terrorists Turn to the Web as Base of Operations
- Aug 08 compiled by CCRC Computer crime: Malware Quarterly Report, PandaLabs
- Jul 29 CCRC staff Computer crime: the most significant case
- Jul 21 The true cost of computer crime
- Jul 19 CyberArk Computer crime: Data breaches
- Jul 18 David Bank and Riva Richmond Where the Dangers Are
- Jun 29 Vladimir Golubev Fighting cybercrime in CIS: strategy and tactics
- Jun 09 Protect your Mobile Workers from Wireless Hotspot Phishing
- Jun 03 Jaikumar Vijayan We have stopped 96% of all the attacks on Microsoft
- Jun 03 Vladimir Golubev Credit card frauds, an interview with Vladimir Golubev
- May 23 Kapinus O.V., Mihailov I.Y. Smart-cards research as a part of computer-technical expertise
- May 16 Tony Krone, PhD A typology of online child pornography offending
- May 11 U.S. Cyber-Crime Unit Focuses on Russian Hackers
- May 11 Mohamed Chawki A Critical Look at the Regulation of Cybercrime
- May 05 Bill Machrone Secure Instant Messaging
- Apr 29 Vladimir Golubev Criminal legal description of computer-facilitated crimes
- Apr 25 Ahmad Nasir Mohd Zin with Zahri Yunos How to make online banking secure
- Apr 25 Art Jahnke A hacker story
- Apr 25 Criminalization of computer wrongdoing prerequisite for combating computer crime
- Apr 21 Michele Derus Mortgage fraud takes heavy toll
- Apr 20 Tim Phillips Kevin Mitnick and the art of intrusion - Part 2
- Apr 16 Vladimir Golubev International cooperation in fighting cybercrime
- Apr 15 Carrie Kirby ONLINE CRIME: A Booming Business
- Apr 11 CCRC staff Fraud in the Internet
- Apr 11 Simon Moores Opinion: Is cybercrime unstoppable?
- Apr 06 Douglas Schweitzer Be Prepared for Cyberterrorism
- Mar 30 Michael Sisk A Phish Story
- Mar 25 Tim Phillips Kevin Mitnick and the art of intrusion - Part 1
- Mar 23 Gary Craig How dangerous are those who find pleasure in child porn?
- Mar 17 Robert Louis B. Stevenson Plugging the "phishing" hole: legislation versus technology
- Mar 16 Vladimir Golubev DoS attacks: crime without penalty
- Mar 14 Eric Beauchesne Spam losing inbox battle, polls suggest
- Mar 07 Rise in internet child porn arrests
- Mar 07 Nate Mook From MS Anti-Spam to Vaccines
- Mar 05 Judge Mohamed CHAWKI and Dr. Mohamed WAHAB Technology Is a Double-Edged Sword: Illegal Human Trafficking in the Information Age
- Feb 27 Arun Srinivasan Combating Cyberterrorism
- Feb 07 Nick Turse and Tom Engelhardt Resisting the Homeland Security State
- Feb 01 Marion Baillot Bribery greases terrorists' path
- Jan 22 Portsia Smith Local eBay seller has money, ID stolen online
- Jan 19 Vladimir Golubev Peculiarities Of The National Cyber Crime In Ukraine
- Jan 17 Robert B. Fried The Internet: A Breeding Ground for Online Pedophiles
- Jan 14 Chronicle Staff ON THE RECORD: Stratton Sclavos
- Jan 10 Trenton Albrecht Combating Computer Crime
- Jan 03 Computer crime: cyber fraud
- Jan 02 Vladimir Golubev Problems of counteraction to cybercrime and cyberterrorism in Ukraine
- Jan 02 Robert T DeMarco Kids get lesson on Internet predators
Copyright © 2001-2024 Computer Crime Research Center