Computer Crime Research Center

News

RSS
March 15, 2023
Cybercrime Losses Exceeded $10 Billion in 2022: FBI
February 24, 2023
Cybercrime seen as drawback to cashless economy
February 22, 2023
Nigeria: HP Highlights Top Cybercrime Trends in 2023, Cautions Organisations
February 21, 2023
Cybercrime on the rise
February 20, 2023
Cybercrime menace: 500,000 Sim cards blocked in Mewat since January 2022
January 10, 2023
UN Cybercrime Convention must be revised to include human rights safeguards
December 19, 2022
Over 16 lakh cybercrime incidents reported in India
December 19, 2022
Cybercrime Unit asks allies to monitor hate speech abroad
December 06, 2022
Cybercrime - How to Tackle
December 06, 2022
FortiGuard Labs contributes to INTERPOL Multinational Cybercrime Suppression Operation in Africa
November 30, 2022
Cybercrime police stations proposed in10 districts of Himachal Pradesh
November 30, 2022
INTERPOL and AFRIPOL collaborate in joint action against cybercrime
November 15, 2022
Australia Declares War on Cybercrime Syndicates

Articles

RSS

What is steganography and how does it differ from cryptography?

by : JOSH LAKESPECIALIST IN SECURITY, PRIVACY AND ENCRYPTION Aug 26, 2020

Steganography is the study and practice of concealing communication. It plays a different role to cryptography, with its own unique applications and strengths...

Russian Activists Take On The Fight Against An Online Suicide Game

Mar 11, 2019

A group of young activists backed by the Kremlin and known for their efforts in cracking down on homosexuality in Russia has taken on a new cause: curbing a wave of teen “suicide games” on the internet. “It is important for us to make...

Why Cybercrime Is So Hard to Investigate

by : Kristina Davis, San Diego Union-Tribune Dec 29, 2015

Cyber crime is so prevalent that cyber investigations are now handled by nearly every law enforcement agency...

Analytics

ANALYSING CYBERCRIME UNDERGROUND ECONOMY USING DATA ANALYTICS

Nov 02, 2021

Given the rapid acceleration of digital hazards, little work has been carried out into the subject's institutions or procedures that could help to guide scientists and specialists in Information Systems that handle digital security...

Distance Learning Systems and their information security

by : Sergii Kavun, Ivan Sorbat, Irina Sorbat Aug 30, 2013

The article studies the problems of improving the degree of information security in the distance learning systems (DLS) at the expense of using innovative methods and technologies of information security systems (ISS). In this article are also...

Cybercriminals Reinvent Methods of Malicious Attacks

Jul 11, 2008

Trend Micro Incorporated (TSE: 4704), a global leader in Internet content security, reported on July 7 that cybercriminals are not only leveraging new technologies to propagate cybercrime, but are also reinventing forms of social engineering to cleverly...

Interviews

CyberEast Activities

Nov 02, 2021

On the work of a Cybercrime Investigator with the State Security Service of the Republic of Azerbaijan..

The Kind of Cybercrime Interpol Expects at the Summer Olympics

by : Robert McMillan, IDG News Service May 01, 2008

With cybercrime now a global phenomenon, perhaps it will take a global police organization to keep it in check...

Copyright © 2001-2013 Computer Crime Research Center
CCRC logo