data Breach

Data Breach Hack [Video]

Data breach Posted by: Margaret Rouse Personal Health Information, Personally Identifiable Information, Trade Secrets, Intellectual Property A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. Data breaches may involve personal health information (PHI), personally identifiable information (PII), […]

Print Friendly, PDF & Email
Continue Reading
data

Data Protection Privacy [Video]

What is Data Protection? Individuals, as citizens and consumers need to have the means to exercise their right to privacy and protect themselves and their information from abuse. This is particularly the case when it comes to our personal information. Data protection is about safeguarding our fundamental right to privacy, which is enshrined in international and regional […]

Print Friendly, PDF & Email
Continue Reading
piracy

Internet Piracy [Video]

34 Startling Internet Piracy Statistics Have you ever noticed how easy it is to commit piracy on the Internet today? From bootleg movies to P2P file sharing sites, sometimes piracy happens without intention. On the other hand, there are a lot of pirated files that are viewed and shared on a daily basis on purpose. […]

Print Friendly, PDF & Email
Continue Reading
scams

Work At Home Scams [Video]

FBI Work at Home Scams Job One: Do Not Take the Bait Everyone’s seen them—seductive work-at-home opportunities hyped in flyers tacked to telephone poles, in newspaper classifieds, in your e-mail, and all over the web, promising you hundreds or thousands of dollars a week for typing, stuffing envelopes, processing medical billing, etc. And it’s just […]

Print Friendly, PDF & Email
Continue Reading
Social Engineering

Social Engineering [Video]

Social Engineering Attacking the Weakest Link in the Security Chain By Solange Deschatres It’s happened to major corporations, and even the U.S. Department of Defense–falling victim to data breaches that resulted from attackers exploiting employees or company vendors. Unfortunately, along with exposing millions of identities these attacks also reveal what is often the weakest link […]

Print Friendly, PDF & Email
Continue Reading
Darknet

DarkNet Tor [Video]

Darknet threats The increasing use of technology and the Internet in all aspects of daily life puts everyday citizens at risk of becoming targets of cybercriminals. As society comes to rely more and more on the Internet, the dangers posed by different types of cybercrime have become very real threats. These threats come in a […]

Print Friendly, PDF & Email
Continue Reading

ICFO Archives

Internet Crime Fighters Org (ICFO) Archives Our posts and comments contain thousands of links and take up considerable blog space; so we have found it necessary to take all archive files offline This action has been taken to maintain the desired performance of our blog’s loading, page size, etc These archives are a valued resource for research […]

Print Friendly, PDF & Email
Continue Reading