Measuring the changing cost of cybercrime
In 2012 we presented the first systematic study of the costs of cybercrime. In this paper, we
report what has changed in the seven years since. The period has seen major platform …
report what has changed in the seven years since. The period has seen major platform …
Abuse reporting and the fight against cybercrime
Cybercriminal activity has exploded in the past decade, with diverse threats ranging from
phishing attacks to botnets and drive-by-downloads afflicting millions of computers …
phishing attacks to botnets and drive-by-downloads afflicting millions of computers …
Bots, cops, and corporations: on the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime
B Dupont - Crime, law and social change, 2017 - Springer
Botnets currently pose the most serious threat to the digital ecosystem, providing an
infrastructure that enables bank fraud, distributed denial of service attacks (DDoS), and click …
infrastructure that enables bank fraud, distributed denial of service attacks (DDoS), and click …
[PDF][PDF] Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.
With the rise of IoT botnets, the remediation of infected devices has become a critical task.
As over 87% of these devices reside in broadband networks, this task will fall primarily to …
As over 87% of these devices reside in broadband networks, this task will fall primarily to …
Mitigating Malware Threats at Small Medium Enterprise (SME) Organisation: A Review and Framework
MMA Mutalib, Z Zainol… - 2021 6th IEEE International …, 2021 - ieeexplore.ieee.org
Malware threat poses consequences, damage, and impact to businesses, resulting in
financial losses, operation interruption and reputation damage. The cybercriminal takes …
financial losses, operation interruption and reputation damage. The cybercriminal takes …
Private active cyber defense and (international) cyber security—pushing the line?
D Broeders - Journal of Cybersecurity, 2021 - academic.oup.com
Abstract Private sector Active Cyber Defence (ACD) lies on the intersection of domestic
security and international security and is a recurring subject, often under the more …
security and international security and is a recurring subject, often under the more …
Can isps help mitigate iot malware? a longitudinal study of broadband isp security efforts
For the mitigation of compromised Internet of Things (IoT) devices we rely on Internet
Service Providers (ISPs) and their users. Given that devices are in the hands of their …
Service Providers (ISPs) and their users. Given that devices are in the hands of their …
Who gets the boot? analyzing victimization by ddos-as-a-service
A lot of research has been devoted to understanding the technical properties of amplification
DDoS attacks and the emergence of the DDoS-as-a-service economy, especially the so …
DDoS attacks and the emergence of the DDoS-as-a-service economy, especially the so …
Let me out! Evaluating the effectiveness of quarantining compromised users in walled gardens
In the fight to clean up malware-infected machines, notifications from Internet Service
Providers (ISPs) to their customers play a crucial role. Since stand-alone notifications are …
Providers (ISPs) to their customers play a crucial role. Since stand-alone notifications are …
[HTML][HTML] Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure {IoT}
Access control configurations are gatekeepers to block unwelcome access to sensitive data.
Unfortunately, system administrators (sysadmins) sometimes over-grant permissions when …
Unfortunately, system administrators (sysadmins) sometimes over-grant permissions when …