Posts tagged for “Cyber crime”

Security

Deconstructing CyberCrime: Beyond Sensational News Stories

September 6th, 2011

Steve Vinsik, VP, Global Security Solutions, discusses breaking down the anatomy of a cybercrime.Steve Vinsik, VP, Global Security Solutions, discusses breaking down the anatomy of a cybercrime.Steve Vinsik, VP, Global Security Solutions, discusses breaking down the anatomy of a cybercrime.Steve Vinsik, VP, Global Security Solutions, discusses breaking down the anatomy of a cybercrime.

Continue reading...

Security

Celebrities, Cybercrime, and the Courts

June 3rd, 2011

How can government policy keep up with cyber security threats that cross national boundaries?How can government policy keep up with cyber security threats that cross national boundaries?How can government policy keep up with cyber security threats that cross national boundaries?How can government policy keep up with cyber security threats that cross national boundaries?How can government policy keep up with cyber security threats that cross national boundaries?How can government policy keep up with cyber security threats that cross national boundaries?

Continue reading...

Security

The Unseen Dangers of Knock-off Mobile Devices

March 14th, 2011

L.A. Port Police seized more than $10 million in counterfeit iPods, iPhones.L.A. Port Police seized more than $10 million in counterfeit iPods, iPhones.L.A. Port Police seized more than $10 million in counterfeit iPods, iPhones.L.A. Port Police seized more than $10 million in counterfeit iPods, iPhones.L.A. Port Police seized more than $10 million in counterfeit iPods, iPhones.L.A. Port Police seized more than $10 million in counterfeit iPods, iPhones.

Continue reading...

Security

Secure coding must become an integral part of software development

December 28th, 2010

The growth of the internet – and the commercial opportunities it presents – is bringing with it an explosion in software application development.The growth of the internet – and the commercial opportunities it presents – is bringing with it an explosion in software application development.The growth of the internet – and the commercial opportunities it presents – is bringing with it an explosion in software application development.The growth of the internet – and the commercial opportunities it presents – is bringing with it an explosion in software application development.The growth of the internet – and the commercial opportunities it presents – is bringing with it an explosion in software application development.The growth of the internet – and the commercial opportunities it presents – is bringing with it an explosion in software application development.The growth of the internet – and the commercial opportunities it presents – is bringing with it an explosion in software application development.The growth of the internet – and the commercial opportunities it presents – is bringing with it an explosion in software application development.The growth of the internet – and the commercial opportunities it presents – is bringing with it an explosion in software application development.The growth of the internet – and the commercial opportunities it presents – is bringing with it an explosion in software application development.The growth of the internet – and the commercial opportunities it presents – is bringing with it an explosion in software application development.The growth of the internet – and the commercial opportunities it presents – is bringing with it an explosion in software application development.

Continue reading...

Security

Can Online Transactions Be Safe?

December 10th, 2010

There’s no doubt that online banking and shopping is convenient – especially with Christmas just around the corner. However, research shows that German people are put off by security concerns.There’s no doubt that online banking and shopping is convenient – especially with Christmas just around the corner. However, research shows that German people are put off by security concerns.There’s no doubt that online banking and shopping is convenient – especially with Christmas just around the corner. However, research shows that German people are put off by security concerns.There’s no doubt that online banking and shopping is convenient – especially with Christmas just around the corner. However, research shows that German people are put off by security concerns.There’s no doubt that online banking and shopping is convenient – especially with Christmas just around the corner. However, research shows that German people are put off by security concerns.There’s no doubt that online banking and shopping is convenient – especially with Christmas just around the corner. However, research shows that German people are put off by security concerns.There’s no doubt that online banking and shopping is convenient – especially with Christmas just around the corner. However, research shows that German people are put off by security concerns.There’s no doubt that online banking and shopping is convenient – especially with Christmas just around the corner. However, research shows that German people are put off by security concerns.There’s no doubt that online banking and shopping is convenient – especially with Christmas just around the corner. However, research shows that German people are put off by security concerns.There’s no doubt that online banking and shopping is convenient – especially with Christmas just around the corner. However, research shows that German people are put off by security concerns.There’s no doubt that online banking and shopping is convenient – especially with Christmas just around the corner. However, research shows that German people are put off by security concerns.There’s no doubt that online banking and shopping is convenient – especially with Christmas just around the corner. However, research shows that German people are put off by security concerns.

Continue reading...

Security

Cyber Security in the Diplomatic Core

October 27th, 2010

At a time when governments have the ability to launch a worm such as Stuxnet and potentially target nuclear plants and utility control systems, we need people in U.S. embassies to address these imminent threats.At a time when governments have the ability to launch a worm such as Stuxnet and potentially target nuclear plants and utility control systems, we need people in U.S. embassies to address these imminent threats.At a time when governments have the ability to launch a worm such as Stuxnet and potentially target nuclear plants and utility control systems, we need people in U.S. embassies to address these imminent threats.At a time when governments have the ability to launch a worm such as Stuxnet and potentially target nuclear plants and utility control systems, we need people in U.S. embassies to address these imminent threats.At a time when governments have the ability to launch a worm such as Stuxnet and potentially target nuclear plants and utility control systems, we need people in U.S. embassies to address these imminent threats.At a time when governments have the ability to launch a worm such as Stuxnet and potentially target nuclear plants and utility control systems, we need people in U.S. embassies to address these imminent threats.At a time when governments have the ability to launch a worm such as Stuxnet and potentially target nuclear plants and utility control systems, we need people in U.S. embassies to address these imminent threats.At a time when governments have the ability to launch a worm such as Stuxnet and potentially target nuclear plants and utility control systems, we need people in U.S. embassies to address these imminent threats.At a time when governments have the ability to launch a worm such as Stuxnet and potentially target nuclear plants and utility control systems, we need people in U.S. embassies to address these imminent threats.At a time when governments have the ability to launch a worm such as Stuxnet and potentially target nuclear plants and utility control systems, we need people in U.S. embassies to address these imminent threats.At a time when governments have the ability to launch a worm such as Stuxnet and potentially target nuclear plants and utility control systems, we need people in U.S. embassies to address these imminent threats.At a time when governments have the ability to launch a worm such as Stuxnet and potentially target nuclear plants and utility control systems, we need people in U.S. embassies to address these imminent threats.

Continue reading...