MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Internet / Social Issues

Magazine articles on the internet's impact on society, privacy, spam, hacking, scams, regulation.
Old Articles: <Older 2041-2050 Newer>
InternetNews
June 2, 2006
Sean Michael Kerner
Firefox Fixes By The Dozen Mozilla has updated its flagship FireFox browser to version 1.5.0.4 and, in the process, fixed no less than 12 flaws. mark for My Articles 501 similar articles
CRM
June 1, 2006
Jessica Sebor
How Many Clicks Does a Click Fraud Make? As invalid click percentage projections oscillate, it is important for advertisers to stay focused on fraud identification and filtration. mark for My Articles 534 similar articles
Searcher
June 2006
Piper & Ramos
A Failure to Communicate: Politics, Scams, and Information Flow During Hurricane Katrina The Katrina disaster was exacerbated by poor communications. Some help was provided by the Internet, but it was also a breeding round for Katrina-related scams. mark for My Articles 474 similar articles
InternetNews
May 31, 2006
Andy Patrizio
Keylogger Masquerades As Microsoft Alert Would-be identity thieves have turned loose another sneaky means for stealing users' personal information. It comes in the form of a fraudulent e-mail pretending to be from Microsoft that suckers users into installing a key logger. mark for My Articles 198 similar articles
InternetNews
May 31, 2006
Sean Michael Kerner
Windows Live OneCare Takes Retail Leap Microsoft's first retail attempt to enter the antivirus, anti-spyware marketplace, Windows Live OneCare, is now on store shelves. mark for My Articles 111 similar articles
InternetNews
May 26, 2006
Beware of 'Badware' Academic organizations' watchlist spotlights four examples of malicious software. mark for My Articles 123 similar articles
InternetNews
May 26, 2006
Tim Scannell
Jamie de Guerre, Director, Partner Programs, Cloudmark Spam isn't going anywhere, and Jamie de Guerre's company is tracking its trails through our inboxes. mark for My Articles 585 similar articles
Parameters
Summer 2006
Audrey Kurth Cronin
Cyber-Mobilization: The New Levee en Masse The U.S. needs a counter-mobilization. So-called information warfare and public diplomacy do not capture the extent of this shift. Putting today's developments within their historical context, the U.S. should get beyond its cultural myopia and turn more attention to analyzing and influencing the means and ends of popular mobilization. mark for My Articles 88 similar articles
InternetNews
May 22, 2006
Roy Mark
Thieves Bag Data on 26.5M Vets Personal data on more than 26 million veterans is at risk of identity theft after a Department of Veterans Affairs' employee's home was burglarized and the data stolen. mark for My Articles 177 similar articles
InternetNews
May 22, 2006
Ed Sutherland
Word Attack Hails From China Security researchers warn Microsoft Word zero-day exploit is aimed at government e-mail systems. mark for My Articles 284 similar articles
<Older 2041-2050 Newer>    Return to current articles.