Some data thieves break into PCs electronically from remote locations, while others walk right in the front door during business hours. This program addresses the vulnerability of data stored on hard drives, on file servers, on removable media, and ...
Identity theft has become a major and common type of fraudulent crime worldwide. Whether it involves forging documents or stealing personal information, identity theft is not limited by borders and it affects people of all walks of life. In this epi...
The Internet offers vast possibilities for learning, making a living, and having fun - but it can also destroy reputations, empty bank accounts, and ruin lives. This program cautions students about potential hazards to their computers - not to menti...
Bouncing between Canada and the U.S., Sc@mmed exposes an urgent problem of global proportions: phishing, the illegal gathering of others’ personal information online in order to steal all their money—and even their identities. Through the cautio...
This alarming program reveals the daily battle between the Internet’s outlaws and the hackers who oppose them by warding off system attacks, training IT professionals and police officers, and watching cyberspace for signs of imminent infowar. Thro...
Joe Adams will update a number of Cyber Range activities, including its use in academic courses, a new set of Range hardware at Northern Michigan University, and a Red Team/Blue Team exercise recently conducted in Grand Rapids and Ann Arbor.