Crime Security

Revenge Porn

Revenge Porn [Video]

Warning: Adult third-party content may offend some readers Protect Victims: #EndRevengePorn Now! Have you ever seen an embarrassing photo of yourself? You know the type, a notification pops up on Facebook and the picture you see makes you cringe. Now imagine getting a notification that includes your name, but this time when you open it […]

Continue Reading
video

ICFO’s Selected Videos

Increasing Internet Cyber Crime Awareness Selected Media and Videos  Click for  Caring Sharing Business Child Family ICFO Media – Coming Soon Internet Cyber Crime Security Social Media Mood Music (I love the baby image) Thanks for viewing our Selected Media and Videos Help Support Our Work Like and Share on our Facebook page

Continue Reading
clicking

STOP Clicking Links [Video]

STOP Clicking and Sharing Until You Have Read This or if you prefer “Think Before You Start Clicking” What is Clickbaiting? Alternatively referred to as link bait, clickbait or click bait is a term used to describe a type of hyperlink on a web page that entices a visitor to click to continue reading an article. […]

Continue Reading
cyber crime

Internet Crime Security [Video]

Internet Cyber Crime The FBI is the lead federal agency for investigating cyber attacks by criminals, overseas adversaries, and terrorists. The threat is incredibly serious—and growing. Cyber intrusions are becoming more commonplace, more dangerous, and more sophisticated. Our nation’s critical infrastructure, including both private and public sector networks, are targeted by adversaries. American companies are […]

Continue Reading
threat

Cyber Threat Attack [Video]

Cyber Threat Source Descriptions Cyber threats to a control system refer to persons who attempt unauthorized access to a control system device and/or network using a data communications pathway. This access can be directed from within an organization by trusted users or from remote locations by unknown persons using the Internet. Threats to control systems […]

Continue Reading
threats

Business Threats Online [Video]

Business Threats Online – Assess Your Risk Smaller businesses have become bigger targets for cybercriminals because the bad guys know that they have fewer defense resources than large enterprises. If cybercriminals can breach a small business and steal credentials (banking accounts, email access, etc.) they can use that information to steal money directly, create attacks […]

Continue Reading
internet

Chilrens’s Internet Risk vs Benefits

Parents of young children believe ‘risks of the internet outweigh the benefits’ The majority of parents of young children (under eight) surveyed in a Webwise parenting report in relation to internet use do not believe the benefits of the internet for their children outweigh the risks. While almost three quarters of parents of children under […]

Continue Reading
data Breach

Data Breach Hack [Video]

Data breach Posted by: Margaret Rouse Personal Health Information, Personally Identifiable Information, Trade Secrets, Intellectual Property A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. Data breaches may involve personal health information (PHI), personally identifiable information (PII), […]

Continue Reading
data

Data Protection Privacy [Video]

What is Data Protection? Individuals, as citizens and consumers need to have the means to exercise their right to privacy and protect themselves and their information from abuse. This is particularly the case when it comes to our personal information. Data protection is about safeguarding our fundamental right to privacy, which is enshrined in international and regional […]

Continue Reading
piracy

Internet Piracy [Video]

34 Startling Internet Piracy Statistics Have you ever noticed how easy it is to commit piracy on the Internet today? From bootleg movies to P2P file sharing sites, sometimes piracy happens without intention. On the other hand, there are a lot of pirated files that are viewed and shared on a daily basis on purpose. […]

Continue Reading