|
|
|
Laura Mayer Lux, Dra., Jaime Vera Vega, Dr.
Pág. 221 - 256
El artículo analiza el delito de espionaje informático, con énfasis en su concepto y delimitación. Con dicha finalidad, parte examinando brevemente su injusto en relación con los demás delitos informáticos stricto sensu. Luego, estudia su sentido y alcan...
ver más
|
|
|
|
|
|
|
Shayan Taheri, Milad Salem and Jiann-Shiun Yuan
The advancements in the Internet has enabled connecting more devices into this technology every day. The emergence of the Internet of Things has aggregated this growth. Lack of security in an IoT world makes these devices hot targets for cyber criminals ...
ver más
|
|
|
|
|
|
|
Gaute Wangen
The recent emergence of the targeted use of malware in cyber espionage versus industry requires a systematic review for better understanding of its impact and mechanism. This paper proposes a basic taxonomy to document major cyber espionage incidents, de...
ver más
|
|
|
|
|
|
|
Boldizsár Bencsáth, Gábor Pék, Levente Buttyán and Márk Félegyházi
Stuxnet was the first targeted malware that received worldwide attention for causing physical damage in an industrial infrastructure seemingly isolated from the online world. Stuxnet was a powerful targeted cyber-attack, and soon other malware samples we...
ver más
|
|
|
|