ComputerWeekly.com Research Library

Powered by Bitpipe.com

Computer Crimes Research

  • BlackCat emerges as one of the top ransomware threats

    Sponsored by: ComputerWeekly.com

    After several notable ransomware attacks against major enterprises, the BlackCat gang is drawing the attention of security researchers who have connected it to other groups.

  • CW Europe - September-November 2021: Dutch researchers build security software to mimic human immune system

    Sponsored by: ComputerWeekly.com

    In this issue of CW Europe, find out how researchers in the Netherlands are attempting to help IT systems fight certain cyber attacks in a similar way to the human immune system works. Also find out about the so-called "Klarna academy" in Stockholm, which has created the next set of Nordic fintech entrepreneurs.

  • CW Benelux: Dutch banks fight money laundering

    Sponsored by: ComputerWeekly.com

    Dutch banks have decided to work together in the fight against money laundering. Globally, only about 3% of money laundering activity is detected and stopped.

  • CW Europe - June-August 2020: 5G rush in Russia

    Sponsored by: ComputerWeekly.com

    Russian mobile operators are pooling their resources to help them overcome the technical challenges of creating 5G networks. Also read how Swedbank is rebuilding its anti-money laundering systems after a damning report, and how a public-private partnership in the Netherlands is helping to combat cyber fraudsters.

  • CW Nordics February-April 2020: Swedes lose faith in social media as data security fears increase

    Sponsored by: ComputerWeekly.com

    Swedish citizens are becoming more concerned about the activities of social media companies and are reducing their online interaction with them as a result.

  • CW Benelux November 2019-January 2020: Dutch banks fight money laundering

    Sponsored by: ComputerWeekly.com

    Dutch banks have decided to work together in the fight against money laundering. Globally, only about 3% of money laundering activity is detected and stopped.

  • CW Middle East ezine April 11 2019

    Sponsored by: ComputerWeekly.com

    It's that time of year again when the Computer Weekly/TechTarget IT Priorities 2019 survey results are out, so in this issue we take a look at some of the findings.

  • CW Benelux ezine February 2019

    Sponsored by: ComputerWeekly.com

    Dutch military intelligence has released a lot of details about the attempt to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.

  • CW Europe – December 2018

    Sponsored by: ComputerWeekly.com

    Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.

  • CW Nordics ezine November 2018

    Sponsored by: ComputerWeekly.com

    Given the controversy surrounding some recent elections and fears of interference by foreign actors, it is hardly surprising that the Swedish government is seeking support from the IT sector as it attempts to guarantee elections remain trustworthy.

  • CW Benelux ezine August 2018

    Sponsored by: ComputerWeekly.com

    It's hardly surprising that the Netherlands is pioneering smart cities. The tech-savvy nation is already planning to have a digital port in Rotterdam with automated ships. Now, according to one Dutch academic, "almost every Dutch municipality is doing something with smart technology".

  • Computer Weekly – 24 October 2017: Where will AI take us?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, artificial intelligence (AI) enthusiasts and sceptics debate the opportunities and risks of the much-hyped technology. Our latest buyer's guide examines the benefits of cloud-native applications. And we look at best practice in defending email systems from cyber attacks. Read the issue now.

  • CW Benelux August 2017

    Sponsored by: ComputerWeekly.com

    The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today.

  • Computer Weekly – 15 November 2016: Counting the cost of financial cyber crime

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.

  • E-Book - Online Fraud: Mitigation and Detection to Reduce the Threat of Online Crime

    Sponsored by: SearchSecurity.com

    As our economy struggles to regain its footing, online fraud is more prevalent than ever. In this E-Book, experts reveal a model for common fraud and present tips on easing fraud pains. Also, find out how financial fraud affects consumer bank behavior. Read on to learn more.

  • 2008 Verizon Business Data Breach Investigations Report

    Sponsored by: Verizon Business

    Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.

  • The Cybercrime Arms Race

    Sponsored by: Kaspersky

    Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.

  • Cascading Risk

    Sponsored by: Core Security Technologies

    This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.

  • Ten Ways Hackers Breach Security

    Sponsored by: Global Knowledge

    Hacking, cracking, and cyber crimes can wreak havoc on an organization. This white paper discusses ten common methods hackers use to breach your existing security, and what you can do to protect yourself.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.