| Old Articles: <Older 1331-1340 Newer> |
 |
InternetNews September 30, 2004 Susan Kuchinskas |
Calif. Gov. Signs Anti-Spyware Bill The bill privacy groups called 'unenforceable' is now state law.  |
InternetNews September 30, 2004 Roy Mark |
Senate Panel Delays Induce Act Vote Again Controversial legislation directed at P2P copyright infringement stalls for third consecutive week.  |
InternetNews September 29, 2004 Ryan Naraine |
Large Scale IM Virus Attack Feared The first signs of a large-scale virus attack are spotted on newsgroups regarding a Windows flaw in the way JPEG images are processed.  |
InternetNews September 29, 2004 Roy Mark |
House Toughens Penalties on P2Ps Bill calls for criminal penalties of up to five years for willfully distributing copyrighted works.  |
InternetNews September 28, 2004 Ryan Naraine |
Amazon.com, Microsoft Go After Phishers Online superstore Amazon.com has teamed up with Microsoft to sue a Canadian spamming ring that allegedly spoofed Hotmail and Amazon.com e-mail addresses to trick consumers.  |
InternetNews September 28, 2004 Roy Mark |
New Induce Act Prompts Old Complaints Critics claim the bill will open digital music player makers to copyright infringement liability.  |
The Motley Fool September 28, 2004 Rich Duprey |
From Spam to SPIT VoIP spam, also known as SPIT, for SPam over Internet Telephony, doesn't actually exist yet. But that hasn't prevented privately held Qovia from patenting technology to block it.  |
BusinessWeek October 4, 2004 Toddi Gutner |
What's Lurking in Your PC? Because it's so new and still evolving, many computer users don't understand spyware. Here's a quick tutorial to bring you up to date on this insidious problem.  |
InternetNews September 24, 2004 Sean Michael Kerner |
Redmond Aims, Fires at Spammers' Accomplices Latest suit in Microsoft's spam fight takes aim at claims of bulletproof hosts for spammers.  |
InternetNews September 24, 2004 Ryan Naraine |
Scanner Tool Released To Thwart JPEG Attack Microsoft's detection tool can be used to identify vulnerable versions of the GDI libraries that handle JPEG processing.  |
| <Older 1331-1340 Newer> Return to current articles. |