ComputerWeekly.com Research Library

Powered by Bitpipe.com

Crime White Papers

  • Computer Weekly – 18 October 2022: How Russia hacked a former MI6 spy chief

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, Russian hackers leaked emails and documents from British government, military, and intelligence officials – we examine the implications. New EU laws will govern online safety and the use of AI, but what do they mean for organisations? And we look at the growth in checkout-free shopping. Read the issue now.

  • Computer Weekly - 8 June 2021: The jobseekers turning to cyber crime in the pandemic

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, security researchers say that people left unemployed by the pandemic are turning to cyber crime – we find out why. We examine the confluence of distributed cloud and edge computing technologies. And controversial uses of facial recognition technology come under further scrutiny. Read the issue now.

  • Computer Weekly - 18 May 2021: The real-life consequences of ransomware attacks

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after a ransomware attack shut a major US oil pipeline, we examine the real-life consequences for organisations facing similar threats. We ask the experts for their top tips in reducing datacentre running costs. And we hear how data science skills are helping government make better decisions. Read the issue now.

  • The exploitation of flaws in the HTTPS protocol

    Sponsored by: TechTarget ComputerWeekly.com

    For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.

  • Virtual currencies and their potential role in cyber crime

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.

  • Do Your Employees Have the Freedom to Roam? CW Mobility E-Zine: January 2016

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue of CW Europe, you will take an in-depth look at the major mobile roaming charge concern that is set to impact people across 28 European Union member states. Read on to see if the end of roaming charges will lead to more enterprises adopting video conferencing services.

  • Information Security Asean July 2015

    Sponsored by: TechTarget

    Cyber-crime is a global phenomenon. No business is safe if they fail to implement the right security products and policies.

  • Advanced identity tracking for social networking sites: Using HP ArcSight ESM to identify online predators

    Sponsored by: Hewlett Packard Enterprise

    This critical resource exposes the truth behind online predators using social networking sites to stalk intended victims without being detected by authorities. Click now to see how a correlation engine can help pinpoint these criminals before their next attack.

  • Take Back the Endpoint

    Sponsored by: Kaspersky

    During the course of three days in late 2009, cybercriminals acquired the banking credentials,username and password, for Hillary Machinery, Inc., located in Plano, Texas, and conducted more than 45 separate transactions to over 40 different payees. The result was a loss of $801,495.

  • First Annual Cost of Cyber Crime Study

    Sponsored by: ArcSight, an HP Company

    Despite widespread awareness of the impact of cybercrime, cyber attacks continue to occur frequently and result in serious financial consequences for businesses and government institutions.

  • Top-10 Guide for Protecting Sensitive Data from Malicious Insiders

    Sponsored by: Imperva

    Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.

  • Global Security Report 2011

    Sponsored by: Trustwave

    In 2010, SpiderLabs performed more than 220 investigations worldwide. In 85% of the investigations, a system breach was confirmed. Of those entities in which a system breach was confirmed, 90% involved the actual theft of sensitive data, representing criminals’ effectiveness in extracting data once system access is obtained.

  • Web Threats 2010: The Risks Ramp Up

    Sponsored by: CSC

    In the face of unprecedented web threat level growth, CSC CloudProtection for Mail and Web delivers protection of the very highest quality for thousands of businesses worldwide. Read this white paper to learn more about today's web threats and how your business can protect itself against them comprehensively and cost-effectively.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.