INFORMATION

Site Map - Cybercrime

Protecting Against Cyberthreats

- Threats to the infrastructure are both real and growing. These insiders discuss the nature of the threat and what can be done to mitigate it.

Computer Crime

- An employee who downloaded confidential documents before going to a competitor did not violate the Computer Fraud and Abuse Act. The law, ruled the court, applies to those who access data without authorization.

Cyber Warfare: Techniques, Tactics, and Tools for Security Practitioners

- Apparently aimed at a military audience, this book offers concepts and examples largely from the U.S. military.

Protecting Against Cyberthreats

- Threats to the infrastructure are both real and growing. These insiders discuss the nature of the threat and what can be done to mitigate it.

Experts Weigh In On 2013 Cyberthreats

- From Anonymous to the Department of Homeland Security, security experts weigh in on cyberthreats to look out for in 2013. They include Java, privacy violations, DDoS attacks, and mobile malware.

Cybercrime

- The rates of cybercrime attacks on U.S. companies have risen since 2010, according to a study conducted by the Ponemon Institute and sponsored by HP. Read the study here.

Federal Cybersecurity Perspective: Interview with Laura Mather, Ph.D.

- An interview with Dr. Laura Mather, cofounder and chief visionary of Silver Tail Systems.  

Cybersecurity

- A bill (H.R. 2096) that would mandate government cybersecurity efforts has been approved by the House of Representatives. It is currently pending in the Senate Committee on Commerce, Science, and Transportation.

Morning Security Brief: Canadian Cybersecurity, Tsunami Debris Has Scientists on Alert, TWIC Extensions Approved, and More

- Secret memos reveal Canada's cybersecurity concerns. Scientists worry that organisms carried over on debris from Japan’s tsunami last year could disrupt West Coast ecosystems. The Committee on Homeland Security extends the validity of TWIC cards.

Electronic Devices

- The Symantec Honey Stick Project lost smartphones on purpose to see what people did when they found them. The finders searched personal and business data on the phones.

2011 Internet Crime Report Released

- Internet users were scammed out of more than $485 million in 2011, according to the latest data released by the Internet Crime Complain Center on Thursday.

The Security Management Digital Edition

- In this issue: ♦ Associate Editor Laura Spadanuta explores high-rise evacuations. ♦ Associate Editor Ann Longmore-Etheridge reports on recommendations from the DHS Advisory Council’s Southwest Border Task Force Report. ♦ Technofile Editor John Wagley reviews the pitfalls of allowing employees to use their own devices. ♦ And Homeland Security Editor Matthew Harwood presents a multimedia update on the use of self-propelled semi-submersibles in drug trafficking.

Facebook Taps Sophos to Help Expand User Protection Against Malware

- Facebook and the data protection company Sophos are teaming up to make it easier for users to protect themselves from malicious links on the social networking site.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.