| Old Articles: <Older 1631-1640 Newer> |
 |
Financial Planning May 1, 2005 Ed McCarthy |
Road Warriors Advisers who travel frequently count on the latest technology to keep them connected to clients. Wireless data security is an important but frequently overlooked issue. Digital cellular and BlackBerry transmissions are considered secure, but Wi-Fi and Bluetooth have several vulnerabilities.  |
Fast Company May 2005 Shoshana Zuboff |
America's Productivity Secret? You. The much-touted self-service economy is actually a brilliantly concealed strategy to outsource American jobs. The 54 million "average Internet users" are already giving up 70 minutes each day with their families and about 25 minutes of sleep.  |
Information Today May 2005 Phillip Britt |
Protecting Private Information In addition to the separation of security duties, the culture of the company may be one of the most important aspects in protecting sensitive information.  |
Searcher May 2005 Miguel Ramos |
Tsunami Blogs Respond to Disaster Evolving from personal, journal-style entries, blogs have addressed politics, war reportage, and, now, humanitarian aid efforts. Here is a description of blogs about the December 2004 tsunami that are focused on aid and information.  |
CRM May 2, 2005 Denis Pombriant |
Enlisting CRM to Fight Spyware Malicious applications are challenging the Internet's integrity as a business tool.  |
CFO May 1, 2005 John Goff |
New Holes for Hackers Are businesses prepared for the digital demons about to be unleashed by smart phones and PDAs?  |
InternetNews April 28, 2005 Tim Gray |
New York Sues Internet Marketing Firm New York's Attorney General alleges that California's Intermix Media is installing spyware on PCs.  |
PC Magazine April 20, 2005 Karen Jones |
Pharming Your Identity Identity theft is on the rise, and phishing--e-mail scams disguised as legitimate correspondence--has risen to epidemic proportions. Now, phishing's newest mutation, called "pharming," poses a more insidious threat.  |
PC Magazine April 20, 2005 Larry Seltzer |
Rootkits: The Ultimate Stealth Attack These underhanded programs go to great lengths to conceal themselves. Luckily, help is on the way.  |
InternetNews April 27, 2005 Tim Gray |
Google Typo Crashes Systems Spyware authors and phishing fraudsters have taken advantage of misspellings of google.com to infect computers with trojans and adware.  |
| <Older 1631-1640 Newer> Return to current articles. |