Computer fraud

Results: 842



#Item
81Computer crimes / Bank fraud / Zeus / Malware / Computer security / Kaspersky Lab / Software / Spamming / Antivirus software / System software / Botnets

The Luuuk banking fraud campaign: half a million euros stolen in a single week The Luuuk banking fraud campaign: half a million euros stolen in a single week The experts at Kaspersky Lab’s Global Research and Analysis

Add to Reading List

Source URL: press.kaspersky.com

Language: English - Date: 2014-06-20 07:32:13
82Voting machine / USB flash drive / Firmware / DRE voting machine / Ballot / Security token / Technology / Government / Election fraud / Politics / Electronic voting / Information society

Security Evaluation of the Sequoia Voting System Public Report Computer Security Group Department of Computer Science University of California, Santa Barbara

Add to Reading List

Source URL: www.mapcruzin.com

Language: English - Date: 2014-08-26 21:04:18
83Cyberwarfare / Rogue software / Comodo Group / Malware / Rogue security software / Melih Abdulhayoğlu / Vulnerability / Spyware / Microsoft Security Essentials / System software / Antivirus software / Computer security

computer FRAUD & SECURITY ISSNSeptemberwww.computerfraudandsecurity.com

Add to Reading List

Source URL: www.comodo.com

Language: English - Date: 2011-11-10 11:53:34
84Cyberwarfare / Auditing / Software testing / Vulnerability / Information security / Fraud deterrence / Security / Data security / Computer security

Internal Business Security Handbook

Add to Reading List

Source URL: www.dsdni.gov.uk

Language: English - Date: 2006-01-06 08:57:53
85Internet / Computing / Nokia / Internet privacy / Internet fraud / Push email / Email address harvesting / Email / Computer-mediated communication / Spamming

Call No. call +

Add to Reading List

Source URL: www.rupertgrafkoks.byethost6.com

Language: English - Date: 2013-10-25 16:38:20
86Computer network security / Device fingerprint / Internet fraud / Fingerprint / JavaScript / Google Chrome / HTTP cookie / Hash function / Public key fingerprint / Software / Computing / Internet privacy

PriVaricator: Deceiving Fingerprinters with Little White Lies Nick Nikiforakis, Wouter Joosen KU Leuven Abstract

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2014-02-28 20:20:56
87ERP software / Microsoft / Microsoft Dynamics GP / Computer network security / Password / Microsoft Dynamics / Dexterity programming language / Microsoft SQL Server / Penetration test / Business / Accounting software / Business software

Cash is King: Who’s Wearing Your Crown? Accounting Systems Fraud in the Digital Age Tom Eston – SecureState Brett Kimmell, CPA – SecureState

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-12-06 14:09:49
88Software testing / Security / Penetration test / OWASP / Vulnerability / Threat / Computer security / Cyberwarfare / Computer network security

Cash is King Who’s Wearing Your Crown? Accounting Systems Fraud in the Digital Age Tom Eston and Brett Kimmell Agenda

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-12-06 14:09:35
89Graphics software / Statistics / Business / Deception / Predictive analytics / Hugin / Insurance fraud / Fraud / Computer-aided audit tools / Crimes / Insurance / Business intelligence

The HUGIN FRAUD DETECTION MANAGEMENT (FDM) Solution

Add to Reading List

Source URL: download.hugin.com

Language: English - Date: 2012-06-12 09:50:44
90Crimes / Deception / Ethics / Computer-aided audit tools / Information technology audit / Fraud / Internal audit / Accountancy / Risk / Auditing

Ministry of Social Development: Preventing, detecting, and investigating benefit fraud

Add to Reading List

Source URL: oag.govt.nz

Language: English - Date: 2014-04-29 00:45:24
UPDATE