MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Internet / Social Issues

Magazine articles on the internet's impact on society, privacy, spam, hacking, scams, regulation.
Old Articles: <Older 2301-2310 Newer>
IEEE Spectrum
May 2007
Robert W. Lucky
Who Are You? In all this confusion and obfuscation about identity, the question arises: On the Internet, who are you? Whether you like it or not, you are creating a resume on the Net -- one that will stay with you for a long time. mark for My Articles 83 similar articles
InternetNews
April 27, 2007
Andy Patrizio
Spammers Are Due For A Surprise Unspam knows where you are. Here comes the lawsuit. mark for My Articles 286 similar articles
Bank Technology News
April 2007
Rebecca Sausner
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. mark for My Articles 375 similar articles
Bank Technology News
April 2007
Rebecca Sausner
The Taiwan Scenario The issue of China's cyber-warfare capabilities is intricately linked to the political status of Taiwan. mark for My Articles 123 similar articles
Bank Technology News
April 2007
Holly Sraeel
In the U.S., Privacy Isn't Always Convenient, Or Wanted While banks nationwide wrestle to comply with state privacy and breach notification laws, the TJX phenomenon brings the issue of consumer privacy into sharper focus: If Americans are inconvenienced in any way, they'll forgo privacy. mark for My Articles 540 similar articles
Bank Technology News
April 2007
Michael Dumiak
Security: Malware Grows Up, Gets Hard To Stop Malware is now coming in a variety of new strains, making it more difficult to locate and repel. mark for My Articles 109 similar articles
InternetNews
April 27, 2007
Andy Patrizio
Spammers Find New Ways Around Filters Image-based spammers now use image hosting to get around image filters. mark for My Articles 430 similar articles
Bio-IT World
April 2007
Christopher Frenz
The Case for Security in Bioinformatics Should developers or distributors of bioinformatics applications be required to make security considerations an essential element of their development or hosting process? While there have been no reports of widespread abuse of scientific computing resources to date, the potential does exist. mark for My Articles 10 similar articles
InternetNews
April 20, 2007
Nicholas Carlson
Teens Are Protecting Themselves Online What, you thought the kids driving YouTube, MySpace, and Facebook wouldn't understand how to work privacy preferences? mark for My Articles 335 similar articles
InternetNews
April 20, 2007
Roy Mark
Google-DoubleClick Raise Red Privacy Flags Online privacy groups filed a complaint with the Federal Trade Commission today seeking to block Google's $3.1 billion bid for online advertising firm DoubleClick unless the world's largest search engine agrees to greater consumer privacy protections. mark for My Articles 1678 similar articles
<Older 2301-2310 Newer>    Return to current articles.