Searched for: subject%3A%22Cybercrime%22
(1 - 13 of 13)
document
van de Kleij, R. (author), van't Hoff—De Goede, S. (author), van de Weijer, S. (author), Leukfeldt, R. (author)
People tend to disclose personal identifiable information (PII) that could be used by cybercriminals against them. Often persuasion techniques are used by cybercriminals to trick people to disclose PII. This research investigates whether people can be made less susceptible to persuasion by reciprocation (i.e., making people feel obligated to...
article 2023
document
Bijmans, H.L.J. (author), Booij, T.M. (author), Schwedersky1, A. (author), Nedgabat, A.B. (author), van Wegberg, R. (author)
Off-the-shelf, easy-to-deploy phishing kits are believed to lower the threshold for criminal entrepreneurs going phishing. That is, the practice of harvesting user credentials by tricking victims into disclosing these on fraudulent websites. But, how do these kits impact the phishing landscape? And, how often are they used? We leverage the use...
conference paper 2021
document
Booij, T.M. (author), Verburgh, T. (author), Falconieri, F. (author), van Wegberg, R.S. (author)
Dark net markets are a competitive environment. As these anonymous markets enable criminals to trade illicit goods or services, this causes vendors to operate under pseudonyms, rather than real-world identities. The constant battle between market admins and law enforcement makes the typical lifespan of a market two years. When a market...
conference paper 2021
document
Nair, V.V. (author), van Staalduinen, M. (author), Oosterman, D.T. (author)
The rapid rise of the Dark Web and supportive technologies has served as the backbone facilitating online illegal activity worldwide. These illegal activities supported by anonymisation technologies such as Tor has made it increasingly elusive to law enforcement agencies. Despite several successful law enforcement operations, illegal activity on...
conference paper 2021
document
van Wegberg, R.S. (author), Oerlemans, J.J. (author), van Deventer, M.O. (author)
Purpose: This paper aims to shed light into money laundering using bitcoin. Digital payment methods are increasingly used by criminals to launder money obtained through cybercrime. As many forms of cybercrime are motivated by profit, a solid cash-out strategy is required to ensure that crime proceeds end up with the criminals themselves without...
article 2018
document
van Wegberg, R.S. (author), Klievink, A.J. (author), van Eeten, M.J.G. (author)
Fraud with online payment services is an ongoing problem, with significant financial-economic and societal impact. One of the main modus operandi is financial malware that compromises consumer and corporate devices, thereby potentially undermining the security of critical financial systems. Recent research into the underground economy has shown...
article 2017
document
Bouma, H. (author), Raaijmakers, S.A. (author), Halma, A.H.R. (author), Wedemeijer, H. (author)
Many threats in the real world can be related to activity of persons on the internet. Internet surveillance aims to predict and prevent attacks and to assist in finding suspects based on information from the web. However, the amount of data on the internet rapidly increases and it is time consuming to monitor many websites. In this paper, we...
conference paper 2012
document
Luiijf, H.A.M. (author), TNO Defensie en Veiligheid (author)
public lecture 2010
document
TNO Defensie en Veiligheid (author), Luiijf, H.A.M. (author)
article 2009
document
TNO Defensie en Veiligheid (author), Luiijf, H.A.M. (author)
On June 4th, 2009, the third Dutch Process Control Security Event took place in Amsterdam. The event, organised by the Dutch National Infrastructure against Cybercrime (NICC), attracted both Dutch process control experts and members of the European SCADA and Control Systems Information Exchange (EuroSCSIE). A set of plenary sessions and parallel...
article 2009
document
TNO Defensie en Veiligheid (author), Luiijf, H.A.M. (author)
The European Commission has started the Coordination Action Parsifal as well as another Specific Targeted Research Project for the critical financial infrastructure (CFI).
article 2009
document
TNO Defensie en Veiligheid (author), Luiijf, H.A.M. (author)
Opsporing en vervolging van cybercrime? Heel belangrijk, maar niet dé oplossing voor het probleem. Voorkómen is beter! De sectoren die zijn aangesloten op het Informatieknooppunt Cybercrime hebben de (informatie)beveiliging van procescontrolesystemen (PCS), waaronder SCADA, als uitdaging opgepakt. Deze publicatie maakt duidelijk waarom het...
other 2009
document
Luiijf, H.A.M. (author), TNO Fysisch en Elektronisch Laboratorium (author)
Society is on the verge of a new era: the information age. Economical changes, a new way of looking at services and new types of conflict are forecasted. Some glimpses of these changes were noticed during the Persian Gulf War. Government decision units, organisations, society and critical industries become more and more inter-networked. They...
conference paper 1999
Searched for: subject%3A%22Cybercrime%22
(1 - 13 of 13)