ComputerWeekly.com Research Library

Powered by Bitpipe.com

Crime Research

  • The exploitation of flaws in the HTTPS protocol

    Sponsored by: ComputerWeekly.com

    For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.

  • Virtual currencies and their potential role in cyber crime

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.

  • Norton Cyber Security Insights Report – UK Insights

    Sponsored by: ComputerWeekly.com

    More than 12 million British people have experienced cybercrime in the past year, this UK summary of the Norton Cyber Security Insights Report reveals.

  • Norton Cyber Security Insights Report

    Sponsored by: ComputerWeekly.com

    This report examines consumers' online behaviours, attitudes and security habits alongside the dangers and financial cost of cyber crime

  • The Global Risks Report 2016

    Sponsored by: ComputerWeekly.com

    This report from the World Economic Forum identifies the most pressing global risks countries and organisations will face in 2016, including sections on technology and cyber crime.

  • Sharing knowledge to tackle online banking fraud

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series argues that an information sharing service between national banking systems and law enforcement agencies could counteract online fraud.

  • Fighting Economic Crime in the Financial Services sector

    Sponsored by: ComputerWeekly.com

    PwC examines the impact of Cybercrime on the financial services industry.

  • Fighting fraud in government

    Sponsored by: ComputerWeekly.com

    Public sector organisations are experiencing increasing levels of economic crime, including cybercrime, and are particularly at risk from being defrauded by their own employees and their suppliers, according to findings from PwC’s latest Global Economic Crime Survey.

  • Do Your Employees Have the Freedom to Roam? CW Mobility E-Zine: January 2016

    Sponsored by: ComputerWeekly.com

    In this issue of CW Europe, you will take an in-depth look at the major mobile roaming charge concern that is set to impact people across 28 European Union member states. Read on to see if the end of roaming charges will lead to more enterprises adopting video conferencing services.

  • Information Security Asean July 2015

    Sponsored by: TechTarget ANZ

    Cyber-crime is a global phenomenon. No business is safe if they fail to implement the right security products and policies.

  • Advanced identity tracking for social networking sites: Using HP ArcSight ESM to identify online predators

    Sponsored by: Hewlett Packard Enterprise

    This critical resource exposes the truth behind online predators using social networking sites to stalk intended victims without being detected by authorities. Click now to see how a correlation engine can help pinpoint these criminals before their next attack.

  • New Reality of Stealth Crimeware Video

    Sponsored by: Intel

    An overwhelming amount of new malware is created everyday and it puts your sensitive data at risk. View this informative webcast to learn more about the implications of stealth crimeware and the possible repercussions they could have on your business.

  • Take Back the Endpoint

    Sponsored by: Kaspersky Lab

    During the course of three days in late 2009, cybercriminals acquired the banking credentials,username and password, for Hillary Machinery, Inc., located in Plano, Texas, and conducted more than 45 separate transactions to over 40 different payees. The result was a loss of $801,495.

  • First Annual Cost of Cyber Crime Study

    Sponsored by: ArcSight, an HP Company

    Despite widespread awareness of the impact of cybercrime, cyber attacks continue to occur frequently and result in serious financial consequences for businesses and government institutions.

  • Top-10 Guide for Protecting Sensitive Data from Malicious Insiders

    Sponsored by: Imperva

    Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.

  • Global Security Report 2011

    Sponsored by: Trustwave

    In 2010, SpiderLabs performed more than 220 investigations worldwide. In 85% of the investigations, a system breach was confirmed. Of those entities in which a system breach was confirmed, 90% involved the actual theft of sensitive data, representing criminals’ effectiveness in extracting data once system access is obtained.

  • Web Threats 2010: The Risks Ramp Up

    Sponsored by: CSC

    In the face of unprecedented web threat level growth, CSC CloudProtection for Mail and Web delivers protection of the very highest quality for thousands of businesses worldwide. Read this white paper to learn more about today's web threats and how your business can protect itself against them comprehensively and cost-effectively.

Browse by Report Type: Crime White Papers | Crime Multimedia | Crime IT Downloads

See more topics related to: Crime

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.