Resources

Here the following are some of the important and significant resources which throw various lights on various facets aspects pertaining to protection and preservation of cyber security:

  1. The Current State of Cybercrime 2014

  2. McAfee Labs 2014 Threats Predictions

  3. Security Threat Report 2014

  4. TREND MICRO | TrendLabs 1Q 2014 Security Roundup

  5. RSA Monthly Online Fraud Report- 2014

  6. Security Threat Report 2014

  7. Security Threat Report 2013

  8. Fortinet 2013 Cybercrime Report

  9. 2013 Norton Report

  10. Freedom on Net Report 2013

  11. The 2013 eCommerce Cyber Crime Report

  12. THE CURRENT STATE OF CYBERCRIME 2013

  13. 2013 Cost of Cyber Crime Study: United States

  14. PRINCIPLES OF CYBERCRIME (2013)

  15. 2013 Data Breaches Investigations Report

  16. Cybercrime Exposed- Mc Afee

  17. STATISTICS OF CYBER CRIME IN INDIA: AN OVERVIEW

  18. THE ECONOMIC IMPACT OF CYBERCRIME AND CYBER ESPIONAGE

  19. Key findings from the 2013 US State of Cybercrime Survey

  20. Cyber crime: A review of the evidence – Summary of key findings and implications (2013)

  21. Cybercriminals Target Android Platforms (2013)

  22. Juniper networks Mobile threat Center third annual Mobile threats report: MarCh 2012 through March 2013

  23. EUROPEAN MOBILE INSIGHTS : 2012 NORTON CYBERCRIME REPORT

  24. The Economic Impact of Cybercrime and Cyber Espionage

  25. 2012 NORTON CYBERCRIME REPORT

  26. C Y B E R C R I M E & S E C U R I T Y SURVEY REPORT 2012

  27. 2013 Internet Crime Report

  28. A Multidisciplinary Conference on Cyberterrorism Report

  29. Cisco 2014 Annual Security Report

  30. Cyber Crime and Security Survey Report 2012-Australia

  31. DIGITAL LIFE IN 2025-PEW RESEARCH CENTER

  32. Domain name report april 2014

  33. Google’s Economic Impact Report 2012

  34. IAB Internet Advertising Revenue Report FY 2013

  35. IAMAI Annual Report 2012-13.

  36. India Mobile Internet-2013-Avendus Report

  37. Iranian Internet Infrastructure and Policy Report

  38. Ofcom Report on Internet Safety

  39. Organized Crime Enablers

  40. RBI-Report on Internet Banking

  41. StatCounter-Internet-Wars-Report

  42. The State of the Internet-Akamai

  43. THE WORLD INTERNET PROJECT- INTERNATIONAL REPORT

  44. 2014 Internet Security Threat Report, Volume 19

  45. Symantec Intelligence Report: September 2014

  46. Security 2015: Targeted attacks to become more widespread

  47. Cybersecurity law finds a cradle in US-China cybercrime truce

  48. Risk managers face tangled mass of cyber security laws

  49. To Fix Cybersecurity Law, Ask More Questions

  50. China’s cybersecurity law — trouble for businesses

  51. Law and order: Where cybersecurity and law enforcement intersect

  52. US cybersecurity bill wades into difficult waters of privacy

  53. What You Need to Know About Germany’s Cybersecurity Law

  54. Cyber security: Security awareness can’t be just a one off

  55. Report: What is the U.S. Government’s Role in Cybersecurity?

  56. Cyber security measure blocked in Senate

  57. FTC’s Authority in Cybersecurity Cases Resoundingly Confirmed

  58. Another Post 9/11 Police State Law: The Cybersecurity Information Sharing Act (CISA) Targets Fundamental Civil Liberties

  59. Car Hacking Cases Force Automakers to Create Their Own Cyber-Security Group

  60. Virus targeting banking, personal information prowling Indian cyberspace

  61. US Army website hacked as Obama demands cyber lawData Breach Calls US Cybersecurity Into Question

  62. Hacking Linked to China Exposes Millions of U.S. Workers

  63. Cybersecurity Firm Says It Found Spyware on Government Network in April

  64. India, US to Bolster Cyber Security Partnership, Combat Crime

  65. Security Short Take: Blame for IRS data breach laid on cybersecurity cuts

  66. Several Cyber Security Layers are Needed: Pro’s React to Carphone Warehouse Data Breach