Computer Crime Presentations and Training by Michael …
Computer and Internet-Related Crime - Kolkata Police
However, most users can simply do a full backup of all of their data files(e.g., wordprocessing documents, e-mail, downloaded documents, photographs, etc.)once or twice a month.
If the only threat was a computer virus or attack by a hacker,it would be adequate to store all of the backup media in thesame room as the computer.
Hackers steal directly from banks in 'new era' of cyber crime
The worm released into the Internet by Robert Morris in Nov 1988seems to have jolted most computer professionals into realizingthat ethics and law are essential to the computer profession.
How to Stop Hackers From Taking Over Your Computer | Time
Kevin Mitnick: A self-proclaimed "hacker poster boy," Mitnick went through a highly publicized pursuit by authorities. His mischief was hyped by the media but his actual offenses may be less notable than his notoriety suggests. The Department of Justice describes him as "the most wanted computer criminal in United States history." His exploits were detailed in two movies: Freedom Downtime and Takedown.
McAfee is the leader in internet security and virus detection
Painter, 42, was recently named deputy chief of the Justice Department's computer crime and intellectual property section, one of the fastest-growing areas of the department.
Cyber Threat Source Descriptions | ICS-CERT
Computer crime is increasing, but views diverge about which problems--from high-profile vandalism such as last year's "Love Bug" e-mail virus, to profit-seeking hackers, to insider theft of corporate secrets--cause the most damage.