Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Internet / Social Issues

Magazine articles on the internet's impact on society, privacy, spam, hacking, scams, regulation.
Old Articles: <Older 3071-3080 Newer>
April 8, 2010
Massive Cyber Spy Ring Seen Operating in China New report details the activities of the "Shadow network," a sophisticated group of cyber criminals traced back to China, prompting denial from a state official. mark for My Articles 138 similar articles
National Defense
May 2010
Stew Magnuson
Russian Cyberthief Case Illustrates Security Risks For U.S. Corporations While the federal government and Congress are making a push to toughen up the nation's defenses in cyberspace, most of the vulnerabilities that thieves and spies are exploiting through the Internet are in the private sector. mark for My Articles 14 similar articles
April 6, 2010
Vietnam Dismisses Google's Malware Allegations Vietnamese official calls claims by Google and McAfee of a widespread cyber attack against dissident activists "groundless," while China issues a similar denial of an unrelated report of cyber crime in that country. mark for My Articles 64 similar articles
April 5, 2010
Facebook Scam Takes Aim at Whole Foods Fans Scammers target Facebook fans of Whole Foods Market grocery store, promising a $500 gift card, but they're really out to swipe users' personal information. mark for My Articles 485 similar articles
April 5, 2010
Security Experts: 'Malware Like a Sniper' A panel of security experts had some grim news on the state of security. How does IT prepare for what's coming? mark for My Articles 20 similar articles
April 2, 2010
Mozilla Rushes Out Fix for Firefox Hack When white hat hackers point out flaws in your product, it's for your own good and you should take advantage of it before the bad guys do. mark for My Articles 374 similar articles
April 2, 2010
Report Tracks the Latest Trends in Cybercrime Sophisticated campaign tracking and dramatically increased use of social networking technologies were two of the top trends in cybercrime in 2009. mark for My Articles 198 similar articles
Popular Mechanics
April 2, 2010
Seth Porges
The iPad Etiquette Handbook When the heck will it be appropriate to whip one of these babies out? In other words: What will be proper iPad-iquitte? mark for My Articles 57 similar articles
Home Theater
April 1, 2010
Mark Fleischmann
Smart Meters Maybe Not So Smart Security holes may let hackers steal your juice. mark for My Articles 149 similar articles
IEEE Spectrum
April 2010
Mark Anderson
Torturing the Secret out of a Secure Chip A trick for subverting secure transactions and their power supply is publicized so the bad guys can't exploit it mark for My Articles 20 similar articles
<Older 3071-3080 Newer>    Return to current articles.