Old Articles: <Older 3281-3290 Newer> |
|
Fast Company February 2011 April Rabkin |
The Facebooks of China China's fake Facebooks started as mere copycats but now drive innovation in advertising and gaming. They've also built something unique in their country: a place where people can find love, speak out, and be whoever they want to be. |
National Defense February 2011 Lawrence P. Farrell Jr. |
To Improve Cyber-Security, U.S. Needs Cohesive Public-Private Partnership NDIA member companies recently put together a white paper on the necessity to better acquire and field cyber-capabilities. |
InternetNews January 12, 2011 |
U.S. Leads Pack in Spam Traffic in 4Q PCs and mobile devices in the U.S. accounted for nearly one in five spam messages in the fourth quarter, according to security software vendor Sophos. |
InternetNews January 11, 2011 |
ID Theft Scam Targets Coke Fans Here's the latest in a long line of smash-and-grab phishing campaigns is using the soda giant as a lure to steal people's personal information. |
InternetNews January 10, 2011 |
PayPal Fends Off Latest Phishing Campaign An unsolicited email attempts to con users into returning a form with their PayPal account login and password information. |
InternetNews January 10, 2011 Kenneth Corbin |
DoJ Seeks Wikileaks Account Info From Twitter In the midst of an ongoing criminal investigation into the publication of leaked documents on Wikileaks, the Department of Justice has asked Twitter for information about the accounts of users involved with the whistleblower website. |
InternetNews January 7, 2011 |
Piracy Flaw Taints Apple Mac App Store Debut Apple took its highly touted Mac App Store live this week, but within a day, complaints began to surface that loose security left the door open to pirates looking to filch content. |
BusinessWeek January 6, 2011 Sara Forden |
The Geek Who's Policing Your Privacy Princeton's Ed Felten advises the FTC on regulating Web marketers |
InternetNews January 3, 2011 |
Fuzzer Finds IE Vulnerabilities A Google researcher makes his "cross fuzz" tool for identifying browser vulnerabilities publicly available. |
PC Magazine January 1, 2011 Larry Seltzer |
Computer Security: How It Looks for 2011 Here are what security vendors predict for 2011. |
<Older 3281-3290 Newer> Return to current articles. |