Old Articles: <Older 2531-2540 Newer> |
|
PC Magazine July 4, 2008 Lisa Zyga |
A Safety Net for Disaster Relief The Web can be an invaluable resource for aiding others and finding help in the big storm. |
Wired August 2008 Clive Thompson |
Clive Thompson on Real-World Social Networks vs. Facebook 'Friends' New research shows that problems can be solved online with the help of someone you barely know, but offline problems are solved better face-to-face working with a team of people you trust. |
Wired July 21, 2008 Jonathan Stevenson |
Tackling al Qaeda Where It Thrives -- Online America's current counterterrorism measures can do no more than tenuously contain a threat whose radical ideology spreads like a virus through cyberspace. |
PC Magazine July 21, 2008 David A. Karp |
Sending E-Mail in a Spam-Hysterical World The classic spam stream of porn and Nigerian scams has evolved into a torrent of nonsensical missives laced with malware. Here's why this spells trouble for your outgoing messages. |
Wall Street & Technology June 23, 2008 Melanie Rodier |
SOA Threatens Security With customers accessing systems themselves through Internet banking and other self-serving channels, core systems are vulnerable to security threats. |
Wall Street & Technology June 19, 2008 Cory Levine |
Stopping ID Theft With Biometrics Accenture recommends the use of biometric solutions -- specifically, fingerprint readers -- to prevent identity theft. |
IEEE Spectrum July 2008 Mark Anderson |
Crimeware Pays Adware, phishing, and spam are a strange -- and big -- business |
IEEE Spectrum July 2008 Robert W. Lucky |
Zero Privacy Almost a decade ago Scott McNealy, chairman and cofounder of Sun Microsystems, famously told reporters, "you have zero privacy anyway. Get over it." |
Fast Company July 2008 Adam L. Penenberg |
The Black Market Code Industry Inside the shadowy underworld where rogue employees sell holes in their companies' software. The buyers: security firms, mobsters, and -- surprise -- the U.S. government. |
Fast Company July 2008 |
The Email Trail Missives between a hacker and a would-be buyer. |
<Older 2531-2540 Newer> Return to current articles. |