| Old Articles: <Older 1491-1500 Newer> |
 |
PC World February 2005 Tom Spring |
The (Movie) Empire Strikes Back Spooked by powerful PCs and broadband pipes that make it ever easier to copy and share films, the movie industry is expanding its legal and legislative offensive against perceived threats.  |
PC World February 2005 Lincoln Spector |
Has Someone Made Off With My Online Identity? How to tell if you're the victim of online identity theft... Use the free Password Safe utility to manage your passwords... Add text of your choice to the taskbar...  |
PC World February 2005 Stuart J. Johnson |
Protect Your Browser From Attack Ads Get the latest hotfix for IE 6 and plug holes in Java and Skype's VoIP software.  |
InternetNews January 18, 2005 Jim Wagner |
Panix.com Hijacking Causes Panic The domain transfer policy at an Australian registrar reveals a loophole that was used to hijack an ISP's domain over the weekend.  |
InternetNews January 18, 2005 Sean Michael Kerner |
Another Worm Hits Online Tsunami Relief Multiple security firms today are reporting the discovery of the worm. It usually has the subject line "Tsunami Donation! Please help" and includes an attachment named tsunami.exe.  |
The Motley Fool January 18, 2005 Selena Maranjian |
Don't Give Away Your Identity! Disguised con artists want your personal information -- and you may be offering it to them.  |
PC Magazine January 12, 2005 Dennis Fisher |
Scammers Exploit Anti-Phishing Weapon Phishing scammers continue to claim victims, recently damaging the reputa- tion of the most promising technology deployed to thwart them.  |
PC Magazine January 12, 2005 Larry Seltzer |
Bogus Security Warnings When a warning pops up unexpectedly as you're surfing, take your time before responding.  |
InternetNews January 14, 2005 Roy Mark |
Big Spam Bust, Texas Style State files multi-million dollar lawsuit against two of the nation's largest e-mail operators.  |
InternetNews January 13, 2005 Jim Wagner |
T-Mobile Investigating Alleged Hacker The Secret Service has joined T-Mobile to find out the damage caused by a network breach.  |
| <Older 1491-1500 Newer> Return to current articles. |