MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Internet / Social Issues

Magazine articles on the internet's impact on society, privacy, spam, hacking, scams, regulation.
Old Articles: <Older 1731-1740 Newer>
ifeminists
July 27, 2005
Wendy McElroy
On Campus, Only Some Free Speech Protected Even in a workplace, it is ridiculous to conclude that a one-time e-mail constitutes unlawful discrimination and harassment. It is especially ridiculous to apply such a policy to a working student at an institution of higher education that has a special responsibility to ensure academic freedom. mark for My Articles 15 similar articles
Entrepreneur
August 2005
Mike Hogan
It's a Trap! Pharming scams -- e-mails that try to scare you and your customers into giving up bank, PayPal or other sensitive information -- are lurking around every corner. Here's how they work, and how you can reduce your risk of being "pharmed." mark for My Articles 92 similar articles
Military & Aerospace Electronics
July 2005
Adam Kolawa
Reducing software security vulnerabilities through unit testing Buffer overflows are the most common type of attack to exploit military and aerospace systems, but common industry best practices -- like unit testing and coverage analysis -- can help prevent these attacks. mark for My Articles 120 similar articles
U.S. Banker
July 2005
Holly Sraeel
Want to Make a CEO Wince? Talk About Fraud. When bankers refer to fraud in public, it often comes off as if the theft does not involve a human being. Behind the financial losses and data breaches are people-on both sides of the problem. mark for My Articles 583 similar articles
InternetNews
July 21, 2005
Tim Gray
Worm Strikes The Wrong Chord It invades AOL's Instant Messenger under cover of Apple's iTunes. mark for My Articles 233 similar articles
InternetNews
July 21, 2005
Susan Kuchinskas
Waking Up to Warjacking Leeching off a neighbor's wireless connection seems pretty harmless. But it gets ugly when the leech uses that connection for activities that are illegal and/or reprehensible. mark for My Articles 141 similar articles
InternetNews
July 21, 2005
David Needle
Contrarians Spice Up Tech Conference The AlwaysOn Innovation Summit had a sharp edge, with experts giving talks piracy, creeping incrementalism, dangers of working with Hollywood and the death of television. mark for My Articles 21 similar articles
InternetNews
July 20, 2005
Susan Kuchinskas
Microsoft: CSI for the FTC Redmond crime-stoppers do forensics work to help the FTC charge X-rated spammers. mark for My Articles 337 similar articles
InternetNews
July 20, 2005
Tim Gray
Hackers Head to School in Droves Universities appear to be the new favorite target of hackers, as the University of Southern California becomes the latest to get hit. mark for My Articles 161 similar articles
InternetNews
July 19, 2005
Tim Gray
Download Politely Asks Spammers to Stop Security firm looks to clean up the information highway by sending an automated response to spammers. Some question the ethics of the approach. mark for My Articles 362 similar articles
<Older 1731-1740 Newer>    Return to current articles.