MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Internet / Social Issues

Magazine articles on the internet's impact on society, privacy, spam, hacking, scams, regulation.
Old Articles: <Older 1251-1260 Newer>
T.H.E. Journal
August 2004
Ribble & Bailey
Monitoring Technology Misuse & Abuse Over the last two years, it has become evident that a behavior pattern of misuse and abuse with respect to technology is beginning to emerge in our society. Here is a five-step plan for creating a digital citizenship program in your school. mark for My Articles 9 similar articles
T.H.E. Journal
August 2004
Kelly Martin
Unmasking Spyware Today's Internet threats often arrive so quietly that they're undetectable, allowing he malicious code more time to identify and extract additional sensitive information, including passwords, decryption keys and keystrokes. mark for My Articles 330 similar articles
T.H.E. Journal
August 2004
Geoffry Fletcher
Securing High-Tech Classrooms There is a variety of approaches to security in educational institutions. Americans need to vote for a president who will not only support educational communications safety, but who will appoint Sepreme Court Justices who will uphold the policy. mark for My Articles 64 similar articles
T.H.E. Journal
August 2004
Survey: Students Continue to Access Inappropriate Content at School Arecent national survey of 200 educators provides some interesting findings regarding the amount of inappropriate content accessed by students on school computers. mark for My Articles 160 similar articles
InternetNews
August 9, 2004
Ryan Naraine
Critical Bug Found in AOL's AIM A specially crafted AIM away message could put users at risk of PC takeover. mark for My Articles 171 similar articles
InternetNews
August 6, 2004
Susan Kuchinskas
Bob Parsons, Founder and CEO, Go Daddy Go Daddy boss analyzes the future of DNS and ICANN and manages to throw in a proposal to end spam. mark for My Articles 279 similar articles
InternetNews
August 6, 2004
Roy Mark
Trojan Horse Charges PDAs First known backdoor attack on handhelds probably written by Russian virus coder. mark for My Articles 355 similar articles
Bank Systems & Technology
August 5, 2004
Thomas Claburn
MasterCard Goes Fishing For Phishers MasterCard will use NameProtect's technology to detect online scams as they unfold and, in conjunction with law-enforcement organizations, shut them down. mark for My Articles 206 similar articles
Bank Systems & Technology
August 4, 2004
Antone Gonsalves
Corporate Losses from Internet-Based Attacks Average $2 Million Companies that suffer business disruptions from Internet-based attacks are losing an average of $2 million in revenue. mark for My Articles 78 similar articles
Reason
September 2004
Marc C. Johnson
Chatroom Revolutionaries Iran's dissidents and exiles discover the Web and are sending encrypted and compressed documents via U.S.-based free e-mail accounts, a tactic also used by organized criminals, terrorists, spies, journalists, and even businessmen. mark for My Articles 166 similar articles
<Older 1251-1260 Newer>    Return to current articles.