Widgetized Section

Go to Admin » Appearance » Widgets » and move Gabfire Widget: Social into that MastheadOverlay zone

Home » Archives by category » SECURITY INFORMATICS » Computational Criminology

All about the criminal rats behind Spora ransomware.

All about the criminal rats behind Spora ransomware.

Nowadays, ransomware has become the most dangerous type of criminal malware. Most of the new families are prepared by amateurs (script-kiddies) and they are distributed on a small scale. Inside…

Futuristic crime scene technology is here now.

Futuristic crime scene technology is here now.

When a homemade pressure-cooker bomb exploded in a dumpster in the Chelsea section of Manhattan in mid-September, police officers, FBI agents, and bomb techs isolated the crime scene, interviewed witnesses,…

Desmentido a difamación de Rebelion.org, Victor Bjorgan no fue apartado de Canal 5.

Es totalmente falso que en aquella ocasión (25 de Marzo, 1994) Bjorgan sostuvo: “Fasano se metió con la política”, ni que existiera intención de censurar al Dr. Federico Fasano.  Además,…

ECaTS is the first universal 911

ECaTS is the first universal 911

ECaTS is an acronym for Emergency Call Tracking System. ECaTS is the first universal 911 Call Reporting System that leverages the ubiquitous nature of the Internet to provide secure, real-time…

Brazil: Cybercrime in 2015.

Brazil: Cybercrime in 2015.

Short News by Victor Björgan .- Brazilian cybercriminals mostly operate on the surface web via public forums and apps, largely due to the cybercriminals’ disregard for law enforcement and law…

U.S. Senate passed Cybersecurity Information Sharing Act – CISA bill.

U.S. Senate passed Cybersecurity Information Sharing Act – CISA bill.

Senate votes in favor of bill critics including Edward Snowden say will allow the government to collect sensitive personal data unchecked. Robyn Greene of the New America Foundation characterized the…

Cyberdefense: U.S. Defense looking for help in the private sector.

Cyberdefense: U.S. Defense looking for help in the private sector.

The U.S. is continuing to build its cyber force with hopes of eventually gaining over 6,000 civilian and military personnel and 133 teams. While not quite there yet, the military…

Cloud computing is a risky business.

Cloud computing is a risky business.

Many people feel that Cloud computing has been around for quite a long time, and intrusion into such technology is far from innovative. To them, it appears that instead of storing…

New statistical model predict violence and potential areas of conflict in Liberia.

New statistical model predict violence and potential areas of conflict in Liberia.

Computers have long been used to identify potential areas of conflict, but a new model being used in Liberia means that violence can now be predicted on a grassroots level.…

Washington DC: hub for cyber security technology companies.

Washington DC: hub for cyber security technology companies.

Many U.S. companies  wants to buy  software that fortifies their networks and fends off hackers from cyber-attacks like those that afflicted  big-name businesses, including Target, JPMorgan Chase, Home Depot, Citigroup and…

Page 1 of 512345