Computer fraud

Results: 842



#Item
41Craigslist / Internet in the United States / Computing / Computer Fraud and Abuse Act / World Wide Web / Lawsuit / Judgment / Craigslist Inc. v. 3Taps Inc.

PDF Document

Add to Reading List

Source URL: craigslistorgblog.files.wordpress.com

Language: English - Date: 2015-06-26 22:49:03
42Peer-to-peer computing / Business / Computing / Advance-fee fraud / High-yield investment program / Electronic money / Get-rich-quick scheme / Social engineering / Spamming / Bitcoin

1 There’s No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams Marie Vasek and Tyler Moore Computer Science and Engineering Department

Add to Reading List

Source URL: fc15.ifca.ai

Language: English - Date: 2015-01-11 00:33:02
43Electronic voting / Electoral systems / Computer memory / Sociology / Government / Voting machine / Voter-verified paper audit trail / Voting system / Ballot / Politics / Elections / Election fraud

Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -orHow to Store Ballots on a Voting Machine (Extended Abstract) David Molnar UC Berkeley

Add to Reading List

Source URL: naveen.ksastry.com

Language: English - Date: 2013-06-08 15:25:56
44Computer Fraud and Abuse Act / United States v. Lori Drew / Stored Communications Act / Protected computer / Fourth Amendment to the United States Constitution / Amicus curiae / Computer law / Law / Criminal law

__________________________________ No__________________________________ IN THE UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT

Add to Reading List

Source URL: www.eff.org

Language: English - Date: 2011-10-06 17:37:47
45Criminal law / 98th United States Congress / Computer Fraud and Abuse Act / Hacking / Information technology audit / Clickwrap / CFAA / Browse wrap / Copyright law of the United States / Computer law / Software licenses / Law

“ACCESS GRANTED: The Necessity of a Presumption of Public Access under the CFAA and Beyond.” Christine S. Davik University of Maine School of Law Recently, there has been a significant increase in attempts to use th

Add to Reading List

Source URL: conferences.asucollegeoflaw.com

Language: English - Date: 2015-03-05 16:29:11
46Computer crimes / Spamming / Phishing / Social engineering / Malware / Threat / Cyberwarfare / Email / Spam / Cybercrime / Internet / Computing

Data Feeds Cyber criminals launch thousands of cyber attacks every day, and compromise thousands of legitimate websites, to spread malware, capture account credentials, launch phishing attacks, and perpetrate fraud. Thes

Add to Reading List

Source URL: info.cyveillance.com

Language: English - Date: 2015-07-18 11:24:51
47

3taps Statement Regarding craigslist’s Misuse of the CFAA At craigslist’s urging, a federal court has recently interpreted the Computer Fraud and Abuse Act (CFAA), known as the “worst law in technology,” to apply

Add to Reading List

Source URL: 3taps.com

Language: English - Date: 2013-08-19 16:31:50
    48Email / Security clearance / Internet privacy / Computing / National security / Internet / Password

    SYSTEM AUTHORIZATION ACCESS REQUEST (SAAR) PRIVACY ACT STATEMENT AUTHORITY: Executive Order 10450, 9397; and Public Law, the Computer Fraud and Abuse Act. PRINCIPAL PURPOSE: To record names, signatures, and other

    Add to Reading List

    Source URL: www.dsca.mil

    Language: English - Date: 2014-09-24 09:50:46
    49Cybercrime / Espionage / Computer network security / Fraud / Crime prevention / Internet Crime Complaint Center / Identity theft / Federal Bureau of Investigation / Cyberterrorism / Crime / Computer crimes / Security

    C y b e rcr i m e s  Read the fine print on website privacy policies—On many social networking and photo sharing sites, there is wording on

    Add to Reading List

    Source URL: www.ncpc.org

    Language: English - Date: 2015-05-05 06:09:00
    50Confidence tricks / Social engineering / Crimes / Electronic commerce / Phishing / Internet fraud / Identity theft / Spyware / Email fraud / Spamming / Internet / Cybercrime

    Key Icon on a Computer Keyboard

    Add to Reading List

    Source URL: www.police.act.gov.au

    Language: English - Date: 2010-11-03 19:17:34
    UPDATE