Quantcast
Channel: The Americas Post » Computational Criminology
Browsing all 44 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Athens Cyber Security Conference, Dr. Thuraisingham´s “Data Mining for...

Dr. Bhavani Thuraisingham and our Publisher Victor Bjørgan during EISIC 2011, European Intelligence & Security Informatics Conference on Counterterrorism and Criminology. On September 12th, and...

View Article



Image may be NSFW.
Clik here to view.

EISIC, Dr. Nasrullah Memon and Computational Criminology: Early Warning...

Dr.Nasrullah Memon, Program Chair of EISIC 2011 in exclusive interview with TheAmericasPost.com On the occasion of the EISIC (September 12-14,2011) held in Athens, we interviewed the Program Chair of...

View Article

Image may be NSFW.
Clik here to view.

Joe Parry says: In Intelligence Infographics ” a good sketch is better than a...

Security: Joe Parry from Cambridge Intelligence and Victor Bjorgan, CEO og Global Security Services LLC and Publisher of TheAmericasPost.com, during the EISIC 2011 Conference. How should we communicate...

View Article

Image may be NSFW.
Clik here to view.

US Homeland Security hacking into gaming consoles

The Americas Post - Suddenly on-line game titles like "Modern Warfare" take on a whole new meaning Forensic experts report that pedophiles are increasingly using gaming systems to prey upon children,...

View Article

Image may be NSFW.
Clik here to view.

Cyberthreat is real and demands immediate action, says Pentagon to U.S....

Lieutenant General Keith B. Alexander, Director of National Security Agency Frustration has grown on Capitol Hill, in no small part due to explicit warnings about the growing cyberthreat from the...

View Article


Image may be NSFW.
Clik here to view.

Security experts advise Java software due to dangerous security flaw.

java logo Computer users are being advised by security experts to disable Oracle Corp.’s widely used Java software after a security flaw was discovered that they say hackers are exploiting to attack...

View Article

Image may be NSFW.
Clik here to view.

U.S. is losing the global cyber war.

The Americas Security News.- Michael J. "Mike" Rogers The chairman of the House Intelligence Committee Rep. Mike Rogers (R., Mich.), said Sunday that recent reports about Chinese hacking show the U.S....

View Article

Image may be NSFW.
Clik here to view.

KPMG study says 67 percent of company data loss resulted from external hacking.

The Americas security News.- KPMG study about cyber threats reveals big. According to a study made by KPMG , 67 percent of data loss resulted from external hacking, while the insider threat is...

View Article


Image may be NSFW.
Clik here to view.

Text Mining vital against terrorists.

  United States President Barack H. Obama United States President Barack Obama  in California on Friday  defended the National Security Agency´s stockpiling of phone call logs of U.S. residents and...

View Article


Image may be NSFW.
Clik here to view.

FBI gather info on suspects by using hacking techniques.

Law-enforcement officials in the U.S. Federal Bureau of Investigations FBI, are expanding the use of tools routinely used by computer hackers to gather information on suspects, including spyware...

View Article

Image may be NSFW.
Clik here to view.

Private encryption program shut down.

America security News.- Mike Janke “We knew USG would come after us”. That’s why Silent Circle CEO Michael Janke tells magazine TechCrunch his company shut down its Silent Mail encrypted email service....

View Article

Image may be NSFW.
Clik here to view.

The FBI’s iGuardian portal is in place.

America security News.- FBI active in the digital globe. An online web portal launched by the U.S.  Federal Bureau of Investigations FBI to gather information about cyber threats from companies, could...

View Article

Image may be NSFW.
Clik here to view.

NSA also focusing on cracking encryption tech.

The Americas Security News. Computer-screen-data Is of public konwledge that National Security Agency -NSA- Prism program taken up by US government is being used to monitor almost all suspitious...

View Article


Image may be NSFW.
Clik here to view.

Biometrics: german hackers allegedly bypassed Apple´s new touch ID...

touchid A group of hackers in Germany -The Chaos Computer Club-  said they have bypassed the biometric security on Apple’s new Touch ID fingerprint sensor in the  iPhone 5S  by photographing an iPhone...

View Article

Image may be NSFW.
Clik here to view.

Eastern European Cybermafia´s scam of the week involves you with child porn.

Stay away from unsafe areas on the Internet like gambling and porn sites. Here is how the lock screen looks Child porn is both illegal and immoral. Getting caught viewing child porn is a huge deal and...

View Article


Image may be NSFW.
Clik here to view.

Cybersecurity defense market growing through 2016.

America Security News.- Cyber Security Defense sector-specific solutions are driving growth in the cybersecurity market and will continue to do so through 2016. According to a Research and Markets...

View Article

Image may be NSFW.
Clik here to view.

Following Snowden: ANONYMOUS stealed information of 100,000 U.S. employees.

    Following Snowden... Hackers associated with Anonymous launched a year-long campaign to break into multiple government agency networks and steal the personal information of over 100,000 employees,...

View Article


Image may be NSFW.
Clik here to view.

Global Market Report shows findings on Big Data, Aviation Security, Safe...

Homeland Security Public Safety Market 2010-2022 The findings of the Report 2014-2022 of the Global Homeland Security & Public Safety Market include:   Big Data: The HLS & Public safety related...

View Article

Image may be NSFW.
Clik here to view.

Predictions 2014, more Android Malware, deep web, network transparency,...

Malware alert! BANGALORE, INDIA: Fortinet – a global leader in high-performance network security – today revealed FortiGuard Labs’ 2014 security predictions, highlighting 5 threats to watch out for...

View Article

Image may be NSFW.
Clik here to view.

SIGINT victory: NSA and GCHQ unlock online encryption from big internet...

America Security News.- This network diagram, from a GCHQ pilot program, shows how the british sigint agency proposed a system to identify encrypted traffic from its internet cable-tapping programs and...

View Article
Browsing all 44 articles
Browse latest View live




Latest Images