Hackers and cybercrime prevention - Computer Weekly
Shimomura out-hacked Mitnick to bring him down. Shortly after finding out about the intrusion, he rallied a team and got to work finding Mitnick. Using Mitnick's cell phone, they tracked him near Raleigh-Durham International Airport. The article, "SDSC Computer Experts Help FBI Capture Computer Terrorist" recounts how Shimomura pinpointed Mitnick's location. Armed with a technician from the phone company, Shimomura "used a cellular frequency direction-finding antenna hooked up to a laptop to narrow the search to an apartment complex." Mitnick was arrested shortly thereafter. Following the pursuit, Shimomura wrote a book about the incident with journalist John Markoff, which was later turned into a movie.
Computer Crime Presentations and Training by Michael …

Computer and Internet-Related Crime - Kolkata Police
However, most users can simply do a full backup of all of their data files(e.g., wordprocessing documents, e-mail, downloaded documents, photographs, etc.)once or twice a month.
If the only threat was a computer virus or attack by a hacker,it would be adequate to store all of the backup media in thesame room as the computer.
Hackers steal directly from banks in 'new era' of cyber crime
The worm released into the Internet by Robert Morris in Nov 1988seems to have jolted most computer professionals into realizingthat ethics and law are essential to the computer profession.

How to Stop Hackers From Taking Over Your Computer | Time
Kevin Mitnick: A self-proclaimed "hacker poster boy," Mitnick went through a highly publicized pursuit by authorities. His mischief was hyped by the media but his actual offenses may be less notable than his notoriety suggests. The Department of Justice describes him as "the most wanted computer criminal in United States history." His exploits were detailed in two movies: Freedom Downtime and Takedown.
McAfee is the leader in internet security and virus detection
Painter, 42, was recently named deputy chief of the Justice Department's computer crime and intellectual property section, one of the fastest-growing areas of the department.
Cyber Threat Source Descriptions | ICS-CERT
Computer crime is increasing, but views diverge about which problems--from high-profile vandalism such as last year's "Love Bug" e-mail virus, to profit-seeking hackers, to insider theft of corporate secrets--cause the most damage.