MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Internet / Social Issues

Magazine articles on the internet's impact on society, privacy, spam, hacking, scams, regulation.
Old Articles: <Older 1631-1640 Newer>
Financial Planning
May 1, 2005
Ed McCarthy
Road Warriors Advisers who travel frequently count on the latest technology to keep them connected to clients. Wireless data security is an important but frequently overlooked issue. Digital cellular and BlackBerry transmissions are considered secure, but Wi-Fi and Bluetooth have several vulnerabilities. mark for My Articles 476 similar articles
Fast Company
May 2005
Shoshana Zuboff
America's Productivity Secret? You. The much-touted self-service economy is actually a brilliantly concealed strategy to outsource American jobs. The 54 million "average Internet users" are already giving up 70 minutes each day with their families and about 25 minutes of sleep. mark for My Articles
Information Today
May 2005
Phillip Britt
Protecting Private Information In addition to the separation of security duties, the culture of the company may be one of the most important aspects in protecting sensitive information. mark for My Articles 167 similar articles
Searcher
May 2005
Miguel Ramos
Tsunami Blogs Respond to Disaster Evolving from personal, journal-style entries, blogs have addressed politics, war reportage, and, now, humanitarian aid efforts. Here is a description of blogs about the December 2004 tsunami that are focused on aid and information. mark for My Articles 421 similar articles
CRM
May 2, 2005
Denis Pombriant
Enlisting CRM to Fight Spyware Malicious applications are challenging the Internet's integrity as a business tool. mark for My Articles 166 similar articles
CFO
May 1, 2005
John Goff
New Holes for Hackers Are businesses prepared for the digital demons about to be unleashed by smart phones and PDAs? mark for My Articles 286 similar articles
InternetNews
April 28, 2005
Tim Gray
New York Sues Internet Marketing Firm New York's Attorney General alleges that California's Intermix Media is installing spyware on PCs. mark for My Articles 110 similar articles
PC Magazine
April 20, 2005
Karen Jones
Pharming Your Identity Identity theft is on the rise, and phishing--e-mail scams disguised as legitimate correspondence--has risen to epidemic proportions. Now, phishing's newest mutation, called "pharming," poses a more insidious threat. mark for My Articles 75 similar articles
PC Magazine
April 20, 2005
Larry Seltzer
Rootkits: The Ultimate Stealth Attack These underhanded programs go to great lengths to conceal themselves. Luckily, help is on the way. mark for My Articles 53 similar articles
InternetNews
April 27, 2005
Tim Gray
Google Typo Crashes Systems Spyware authors and phishing fraudsters have taken advantage of misspellings of google.com to infect computers with trojans and adware. mark for My Articles 144 similar articles
<Older 1631-1640 Newer>    Return to current articles.