Hackers and cybercrime prevention - Computer Weekly

Shimomura out-hacked Mitnick to bring him down. Shortly after finding out about the intrusion, he rallied a team and got to work finding Mitnick. Using Mitnick's cell phone, they tracked him near Raleigh-Durham International Airport. The article, "SDSC Computer Experts Help FBI Capture Computer Terrorist" recounts how Shimomura pinpointed Mitnick's location. Armed with a technician from the phone company, Shimomura "used a cellular frequency direction-finding antenna hooked up to a laptop to narrow the search to an apartment complex." Mitnick was arrested shortly thereafter. Following the pursuit, Shimomura wrote a book about the incident with journalist John Markoff, which was later turned into a movie.

Computer Crime Presentations and Training by Michael …

This hacker was the first juvenile to be prosecutedby the U.S. Government for computer crime.

Computer and Internet-Related Crime - Kolkata Police

However, most users can simply do a full backup of all of their data files(e.g., wordprocessing documents, e-mail, downloaded documents, photographs, etc.)once or twice a month.

If the only threat was a computer virus or attack by a hacker,it would be adequate to store all of the backup media in thesame room as the computer.

Hackers steal directly from banks in 'new era' of cyber crime

The worm released into the Internet by Robert Morris in Nov 1988seems to have jolted most computer professionals into realizingthat ethics and law are essential to the computer profession.

Conventional local area networks in the 1980s requiredcoaxial cable to be strung between computers and printers on the network.

How to Stop Hackers From Taking Over Your Computer | Time

Kevin Mitnick: A self-proclaimed "hacker poster boy," Mitnick went through a highly publicized pursuit by authorities. His mischief was hyped by the media but his actual offenses may be less notable than his notoriety suggests. The Department of Justice describes him as "the most wanted computer criminal in United States history." His exploits were detailed in two movies: Freedom Downtime and Takedown.

McAfee is the leader in internet security and virus detection

Painter, 42, was recently named deputy chief of the Justice Department's computer crime and intellectual property section, one of the fastest-growing areas of the department.

Cyber Threat Source Descriptions | ICS-CERT

Computer crime is increasing, but views diverge about which problems--from high-profile vandalism such as last year's "Love Bug" e-mail virus, to profit-seeking hackers, to insider theft of corporate secrets--cause the most damage.

To successfully use a remote computer, any user (including criminals) musthave both a valid user name and valid password.

Is Computer Hacking a Crime? | It Still Works | Giving …

Recent cases point to an interest in identity fraud by organizations as diverse as a Long Beach chapter of the Crips, the Armenian Power gang and the prison-based Mexican Mafia, according to law enforcement officials and fraud experts.

Many hackers run programs that randomly search the Internet andprobe ports on computers that are connected to the Internet.

Computer and Internet-Related Crime – Kolkata Police

Mitnick had a bit of hacking experience before committing the offenses that made him famous. He started out exploiting the Los Angeles bus punch card system to get free rides. Then, like Apple co-founder Steve Wozniak, dabbled in phone phreaking. Although there were numerous offenses, Mitnick was ultimately convicted for breaking into the Digital Equipment Corporation's computer network and stealing software.

Here’s the First Guy Computer Hackers Call When …

Chris Painter, who has prosecuted a number of high-profile hacking cases in Los Angeles, has been named to a top computer crime-fighting post with the Justice Department in Washington.