MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Internet / Social Issues

Magazine articles on the internet's impact on society, privacy, spam, hacking, scams, regulation.
Old Articles: <Older 1861-1870 Newer>
PC World
January 2006
Andrew Brandt
Privacy Watch: More Criminals Use Keystroke Loggers A computer security firm reports that the array of software programs that cybercrooks use to record every character a user types has grown significantly in recent months. mark for My Articles 66 similar articles
InternetNews
December 7, 2005
Roy Mark
Consumers Whistling Past the Security Graveyard Less than 20 percent of American home computers are adequately protected against viruses, spyware, hackers and other security threats. Nevertheless, an overwhelming majority of users believe they are safe from an attack. mark for My Articles 467 similar articles
PC Magazine
November 30, 2005
Jane Pinckard
Trojan Invades PSPs In early October, Symantec Security Response experts identified Trojan.PSPBrick, the first Trojan horse that targets Sony PlayStation Portable systems, as a Category 1 threat. mark for My Articles 230 similar articles
BusinessWeek
December 12, 2005
Jessi Hempel
The MySpace Generation The MySpace generation live online. They buy online. They play online. Their power is growing. mark for My Articles 92 similar articles
BusinessWeek
December 12, 2005
Jon Fine
Modern (Sigh) Media Maturity Traditional media's old structure is not built for control. mark for My Articles 51 similar articles
BusinessWeek
December 12, 2005
Jessi Hempel
Protecting Your Kids From Cyber-Predators Tips for parents as their teenagers venture into online social networks. mark for My Articles 169 similar articles
BusinessWeek
December 12, 2005
Keeping Kids Safe Online Here are some Web sites that can offer teens and parents valuable tips for eluding cyber-predators. mark for My Articles 58 similar articles
BusinessWeek
December 12, 2005
The Networked Life of a 21-Year-Old Super-plugged-in Gen Y'er Paula Lehman provides some lessons for an older colleague about navigating in the always-connected world. mark for My Articles 93 similar articles
InternetNews
December 1, 2005
Sean Michael Kerner
Backup Software Under Attack A SANS report on top security vulnerabilities finds that backup and recovery software has become a favorite target of hackers. mark for My Articles 300 similar articles
Wired
December 2005
Annalee Newitz
Don't Call It Spyware Three years ago Gator (now Claria) was considered a parasite and a scourge. Today it's a rising star - selling virtually the same product. How a pop-up pariah won the adware wars. mark for My Articles 71 similar articles
<Older 1861-1870 Newer>    Return to current articles.