Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Internet / Social Issues

Magazine articles on the internet's impact on society, privacy, spam, hacking, scams, regulation.
Old Articles: <Older 2861-2870 Newer>
The Motley Fool
August 26, 2009
Tim Beyers
This IPO Won't Happen Soon A major security flaw still plagues Twitter. mark for My Articles 530 similar articles
August 24, 2009
Brendan I. Koerner
Mr. Know-It-All on Spam Among Friends, Blog Contests, Naked Babies Sending mass e-mails is the equivalent of sending spam... The legalities of holding contests on your blog... Posting pictures of your child's bath time on Facebook... mark for My Articles 128 similar articles
August 20, 2009
Facebook Hit by Cross-Site Request Forgery Attack As Facebook's popularity continues to rise, it is becoming an increasingly attractive target for security researchers and vulnerability disclosures. mark for My Articles 404 similar articles
Information Today
July 30, 2009
Information Overload Awareness Day Coming on Aug. 12 The featured keynote speaker is John Seely Brown, co-chairman, the Deloitte Center for Edge Innovation and former chief scientist, Xerox. mark for My Articles 16 similar articles
Bank Systems & Technology
August 18, 2009
Maria Bruno-Britz
Long Arm of the Law IDs Heartland Hackers An American and two Russians are charged with one of the largest cyber crimes ever. mark for My Articles 84 similar articles
August 18, 2009
Smartphone Users Surf Sans Security Despite being aware of the potential risks of mobile Internet use, smartphone owners don't take security seriously. mark for My Articles 761 similar articles
HBS Working Knowledge
August 17, 2009
John Quelch
Quantifying the Economic Impact of the Internet How can we quantify the economic impact of the Internet? A recent study we prepared with Hamilton Consultants for the Interactive Advertising Bureau uses three methods to value the contribution of the advertising-supported Internet to the U.S. economy. mark for My Articles 56 similar articles
August 14, 2009
Twitter Used as Botnet Control As bot herders learn to exploit legitimate sites, researchers warn that IT managers will need to monitor social media closely. mark for My Articles 162 similar articles
National Defense
September 2009
Grace V. Jean
In The Fight Against Cybercrime, Weapons Have Short Shelf Lives Even the latest innovations to protect U.S. networks are not enough to counter cybercrimes. mark for My Articles 58 similar articles
August 13, 2009
Joel Schectman
Computer Hacking Made Easy Botnet attacks like the one that took down Twitter are becoming so easy and cheap, almost anyone can do it. mark for My Articles 170 similar articles
<Older 2861-2870 Newer>    Return to current articles.