MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Internet / Social Issues

Magazine articles on the internet's impact on society, privacy, spam, hacking, scams, regulation.
Old Articles: <Older 2561-2570 Newer>
InternetNews
September 29, 2008
Richard Adhikari
Microsoft, Wash. State Sue Over 'Scareware' Those annoying pop-up ads are the target of a flurry of new lawsuits by the state's Attorney General and Microsoft. mark for My Articles 21 similar articles
Popular Mechanics
September 26, 2008
S.E. Kramer
Eagle Eye's Paranoid Thrills Ditch Real R&D for Fake Spy Tech In this weekend's new thriller Eagle Eye, the lives of Jerry Shaw (Shia LaBeouf) and Rachel Holloman (Michelle Monaghan) are hijacked by, well, a voice -- an ominous and omniscient villainess that's equal parts Inspector Gadget and GPS voiceover. mark for My Articles
PC Magazine
August 20, 2008
Matthew D. Sarrel
There's a Bot in Your PC Aiding the rise of blended threats around the world, botnets are digging in and using your network as a base of operations. mark for My Articles 220 similar articles
PC Magazine
September 26, 2008
Corinne Iozzio
The 10 Most Mysterious Cyber Crimes The best criminal hacker is the one that isn't caught or even identified. These are 10 of the most infamous unsolved computer crimes (that we know about). mark for My Articles 133 similar articles
InternetNews
September 24, 2008
Andy Patrizio
Who's to Blame for Bill O'Reilly Hack? Other than the hackers, it looks like no one else bears responsibility - unless the popular radio and TV personality's Web site host can be proven negligent. mark for My Articles 40 similar articles
InternetNews
September 23, 2008
Andy Patrizio
First Palin, Now Bill O'Reilly Gets Hacked As the FBI focuses in on a Tennessee suspect in the hack on Gov. Sarah Palin's e-mail account, Fox News commentator gets hacked out of spite. mark for My Articles 42 similar articles
PC Magazine
September 23, 2008
Matthew D. Sarrel
A Day in the Life of a Web 2.0 Hacker They harvest data about you, your family, your friends, and your work directly from the Web apps you use and the sites you visit. Here's how they do it. mark for My Articles 286 similar articles
Wired
September 22, 2008
Cliff Kuang
Burning Question: How Much Computer Security Is Enough? What do you really need to protect your computer? Less than you think. mark for My Articles 49 similar articles
Wired
Kristina Shevory
Ellen Miller: Make Washington More Like the Web The ideal of transparency and participation hasn't yet infiltrated another messy democracy -- the US government. mark for My Articles 20 similar articles
HBS Working Knowledge
September 22, 2008
Sarah Jane Gilbert
The Silo Lives! Analyzing Coordination and Communication in Multiunit Companies A new Harvard Business School working paper looks inside the communications "black box" of a large company to understand who talks to whom. mark for My Articles 59 similar articles
<Older 2561-2570 Newer>    Return to current articles.