| Old Articles: <Older 1261-1270 Newer> |
 |
PC Magazine September 7, 2004 Sebastian Rupley |
Images Too Graphic for the Net? Men and women strongly disagree about allowing gruesome photos on the Internet.  |
PC World September 2004 Andrew Brandt |
Privacy Watch: Two Passwords Double Your Privacy 'Two-factor authentication' is the computer equivalent of the security provided by a safety deposit box: Neither you nor the bank alone can open the box; both parties need to use their keys at the same time.  |
PC World September 2004 Steve Bass |
A Two-Pronged Spyware Defense Keep the torrent of snooping software off your PC -- before and after it strikes.  |
InternetNews August 13, 2004 Sean Michael Kerner |
DomainKeys Set to Send Mail We lock our homes and businesses with keys to protect against unwanted intrusion. So why not our e-mail?  |
InternetNews August 12, 2004 Ryan Naraine |
Widcomm Bluetooth a Virus Risk A security research firm has discovered a serious vulnerability in Widcomm's widely deployed Bluetooth Connectivity Software that could lead to wireless delivery of malicious worms and viruses.  |
InternetNews August 10, 2004 Ryan Naraine |
MS Exchange 5.5 Spoofing Flaw Fixed Moderately critical vulnerability puts users at risk of cross-site scripting and spoofing attacks.  |
InternetNews August 10, 2004 Ryan Naraine |
Apple Plugs OS X Vulnerabilities Mac OS X Panther users at risk of sensitive data leakage, DoS attacks and system access.  |
InternetNews August 10, 2004 Roy Mark |
FTC Settles with Pop-up Ad Operators Scheme involved exploiting Windows Messenger Service to barrage consumers with ads.  |
Search Engine Watch August 10, 2004 Chris Sherman |
Yahoo Offers Anti-Spyware App Tired of those unwelcome pests that invade your computer without permission? Banish intrusive spyware and tracking cookies with Yahoo's newly upgraded toolbar.  |
T.H.E. Journal August 2004 Ozkan & Gunay |
Minimizing Security Vulnerabilities in High-Tech Classrooms Emerging technologies are quickly becoming part of our daily learning and teaching endeavors in academia, however only a few students, faculty members and administrators are aware of the risks and vulnerabilities that exist in their network operating systems.  |
| <Older 1261-1270 Newer> Return to current articles. |