Computer Crime Research Center

News

RSS
August 21, 2024
Cybercrime cases spike in Nepal
June 13, 2024
Cybercrime suspects often young, increasingly armed: Dutch police
June 13, 2024
Long jail terms for Chinese cybercrime gang in Zambia
January 25, 2024
No Consensus on Proposed Global Cybercrime Treaty
January 24, 2024
The cost of cybercrime to reach over $12tn by 2025
January 10, 2024
The Rising Threat of AI-Enabled Cybercrimes: A Warning from NSA and FBI
January 10, 2024
World Economic Forum: Extreme weather, AI, cybercrime greatest global risks in 2024
December 05, 2023
InterCOP (International Cyber Offender Prevention Network)
November 20, 2023
Armenia signs second additional Protocol to Cybercrime Convention
November 04, 2023
Unraveling cybercrime network’s underground operations
October 02, 2023
ShadowSyndicate Cybercrime gang has used 7 ransomware families over the past year
September 28, 2023
Fight cybercrime with tech education
September 27, 2023
Cyber crime fears present massive opportunities for the industry: PwC’s Jim Bichard

Articles

RSS

UN: Cybercrime Convention still poses human rights concerns

Jan 24, 2024

Joint Statement on the Proposed Cybercrime Treaty Ahead of the Concluding Session...

Notorious phishing platform shut down, arrests in international police operation

by : Bernardo Pillot, INTERPOL’s Assistant Director of Cybercrime Operations Aug 12, 2023

SINGAPORE ??“ A notorious ‘phishing-as-a-service’ (PaaS) platform known as ‘16shop' has been shut down in a global investigation coordinated by INTERPOL, with Indonesian authorities arresting its operator and one of its facilitators, with...

What is steganography and how does it differ from cryptography?

by : JOSH LAKESPECIALIST IN SECURITY, PRIVACY AND ENCRYPTION Aug 26, 2020

Steganography is the study and practice of concealing communication. It plays a different role to cryptography, with its own unique applications and strengths...

Analytics

ANALYSING CYBERCRIME UNDERGROUND ECONOMY USING DATA ANALYTICS

Nov 02, 2021

Given the rapid acceleration of digital hazards, little work has been carried out into the subject's institutions or procedures that could help to guide scientists and specialists in Information Systems that handle digital security...

Distance Learning Systems and their information security

by : Sergii Kavun, Ivan Sorbat, Irina Sorbat Aug 30, 2013

The article studies the problems of improving the degree of information security in the distance learning systems (DLS) at the expense of using innovative methods and technologies of information security systems (ISS). In this article are also...

Cybercriminals Reinvent Methods of Malicious Attacks

Jul 11, 2008

Trend Micro Incorporated (TSE: 4704), a global leader in Internet content security, reported on July 7 that cybercriminals are not only leveraging new technologies to propagate cybercrime, but are also reinventing forms of social engineering to cleverly...

Interviews

CyberEast Activities

Nov 02, 2021

On the work of a Cybercrime Investigator with the State Security Service of the Republic of Azerbaijan..

The Kind of Cybercrime Interpol Expects at the Summer Olympics

by : Robert McMillan, IDG News Service May 01, 2008

With cybercrime now a global phenomenon, perhaps it will take a global police organization to keep it in check...

Copyright © 2001-2024 Computer Crime Research Center
CCRC logo