This book presents the latest research on the challenges and solutions affecting the equilibrium between freedom of speech, freedom of information, information security and the right to informational privacy. Given the complexity of the topics addressed, the book shows how old legal and ethical frameworks may need to be not only updated, but also supplemented and complemented by new conceptual solutions. Neither a conservative attitude (“more of the same”) nor a revolutionary zeal (“never seen before”) is likely to lead to satisfactory solutions. Instead, more reflection and better conceptual design are needed, not least to harmonise different perspectives and legal frameworks internationally. The focus of the book is on how we may reconcile high levels of information security with robust degrees of informational privacy, also in connection with recent challenges presented by phenomena such as “big data” and security scandals, as well as new legislation initiatives, such as those concerning “the right to be forgotten” and the use of personal data in biomedical research. The book seeks to offer analyses and solutions of the new tensions, in order to build a fair, shareable and sustainable balance in this vital area of human interactions.
'Professor Chang s very thoughtful and impressively researched study of cybercrime in the greater China region is an invaluable contribution to the information and analyses available in this area. It not only provides important, and heretofore unavailable data, about the incidence and nature of cybercrime in this region, it also offers insightful suggestions into how this problem can most effectively be controlled. It belongs in the library of anyone interested in this area.'
– Susan Brenner, University of Dayton, US
'East Asia is a heartland of the variegated scams of the cybercrime problem. Yao Chung Chang's book is an innovative application of routine activity theory and regulatory theory to cybercrime prevention across the cybergulf between China and Taiwan. The long march through the scams and across the Taiwan Strait is fascinating. Chang leads us to ponder a wiki cybercrime prevention strategy that might work in such treacherous waters.'
– John Braithwaite, Australian National University
Continue reading “Cybercrime in the Greater China Region: Regulatory Responses and Crime Prevention Across the Taiwan Strait”
The Tableau T35u USB 3.0 Forensic IDE/SATA Bridge supports write-blocked, forensic acquisitions of both SATA and IDE storage devices through a fast USB 3.0 host connection. The T35u offers forensic examiners the ease of use, reliability, and imaging speed necessary to image today's larger and faster hard-disk drives – in both lab or field environments.
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use “social engineering” to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including:
- A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines
- Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems
- Two convicts who joined forces to become hackers inside a Texas prison
- A “Robin Hood” hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access
With riveting “you are there” descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.
There is a Threat Lurking Online with the Power to Destroy Your Finances, Steal Your Personal Data, and Endanger Your Life.
In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies-and countless viruses, phishing, and spyware attacks-he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere.
Continue reading “Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door”