Cyber criminals exploit top social eventsTop socially visible events of the first quarter of 2012 gave cyber criminals new social-engineering campaign material, equipping them to penetrate and infect users and networks in order to access victim’s data, a report said. Li More… |
Cyber crime using business models, says CiscoInternet criminals are increasingly operating like successful businesses, borrowing some of the best strategies from companies and forming partnerships with one another for profits, says a report. A 2009 mid-year security report from Cisco More… |