Cybercrime research to be presented at APWG conference

The Anti-Phishing Working Group (APWG) will hold its 8th annual summit in San Francisco, next week, with 15 papers on cybercrime to be presented by industry and academic researchers.
The APWG was created to bring organizations and industries together to stand against cyber-crime and those involved are very excited about this year’s conference and about the research that has been done.
Program Co-Chair Dr. Tyler Moore said, “Fighting e-crime requires more than a purely technical approach, and this year's program reflects that: in addition to papers from computer scientists, we will hear the perspectives of economists, criminologists and political scientists. The breadth of topics presented is also great. Topics include underground markets, malware, counterfeit goods, Money Laundering Money Laundering Money laundering is a blanket term to describe the process by which criminals disguise the original ownership and proceeds of criminal conduct by making such proceeds appear to be derived from a legitimate source.Money laundering is an issue that traverses countless industries and sectors, which includes the financial services space. Though criminal money may be successfully laundered without the assistance of the financial sector, billions of dollars’ worth of criminally derived money are laund Money laundering is a blanket term to describe the process by which criminals disguise the original ownership and proceeds of criminal conduct by making such proceeds appear to be derived from a legitimate source.Money laundering is an issue that traverses countless industries and sectors, which includes the financial services space. Though criminal money may be successfully laundered without the assistance of the financial sector, billions of dollars’ worth of criminally derived money are laund Read this Term with digital currencies, online dating crimes, and of course, Phishing Phishing Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno Read this Term.”
In order to get a taste of what is to be presented at the conference, you may browse the abstracts (summaries) that have been made available by APWG.
Image courtesy of Flickr
The Anti-Phishing Working Group (APWG) will hold its 8th annual summit in San Francisco, next week, with 15 papers on cybercrime to be presented by industry and academic researchers.
The APWG was created to bring organizations and industries together to stand against cyber-crime and those involved are very excited about this year’s conference and about the research that has been done.
Program Co-Chair Dr. Tyler Moore said, “Fighting e-crime requires more than a purely technical approach, and this year's program reflects that: in addition to papers from computer scientists, we will hear the perspectives of economists, criminologists and political scientists. The breadth of topics presented is also great. Topics include underground markets, malware, counterfeit goods, Money Laundering Money Laundering Money laundering is a blanket term to describe the process by which criminals disguise the original ownership and proceeds of criminal conduct by making such proceeds appear to be derived from a legitimate source.Money laundering is an issue that traverses countless industries and sectors, which includes the financial services space. Though criminal money may be successfully laundered without the assistance of the financial sector, billions of dollars’ worth of criminally derived money are laund Money laundering is a blanket term to describe the process by which criminals disguise the original ownership and proceeds of criminal conduct by making such proceeds appear to be derived from a legitimate source.Money laundering is an issue that traverses countless industries and sectors, which includes the financial services space. Though criminal money may be successfully laundered without the assistance of the financial sector, billions of dollars’ worth of criminally derived money are laund Read this Term with digital currencies, online dating crimes, and of course, Phishing Phishing Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno Read this Term.”
In order to get a taste of what is to be presented at the conference, you may browse the abstracts (summaries) that have been made available by APWG.
Image courtesy of Flickr