MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Internet / Social Issues

Magazine articles on the internet's impact on society, privacy, spam, hacking, scams, regulation.
Old Articles: <Older 3431-3440 Newer>
IEEE Spectrum
December 2012
Tam Harbert
New King of Security Algorithms Crowned A five-year hunt for a new cryptographic hash scheme leads to the discovery that the old one was really good mark for My Articles 5 similar articles
IEEE Spectrum
December 2012
Ko et al.
Understanding Cloud Failures An analysis of 172 incidents reveal new categories of problems mark for My Articles 513 similar articles
National Defense
December 2012
Emilio Iasiello
Identifying Cyber-Attackers to Require High-Tech Sleuthing Skills The White House released in May 2011 the first "International Strategy for Cyberspace." This policy document promotes the U.S. vision for the future of the Internet and the nation's role in shaping that plan. mark for My Articles 6 similar articles
CIO
October 30, 2012
Lucian Constantin
Lack of Abuse Detection Allows Cloud Computing Instances to Be Used Like Botnets, Study Says Some cloud providers don't detect attacks launched from their networks, researchers say mark for My Articles 714 similar articles
CIO
September 18, 2012
Jeff Vance
Free Mobile Apps Put Your BYOD Strategies at Risk When it comes to the BYOD trend, CIOs worry over their lack of control of mobile apps. However, it's not only about rogue mobile apps packing malware that trouble them. IT leaders are also concerned by the risks posed by malware-free mobile apps. mark for My Articles 446 similar articles
National Defense
November 2012
Valerie Insinna
States to Ramp Up Cybersecurity Information Sharing Cybersecurity has long been seen as a federal domain, but an initiative announced by the National Governors Association seeks to shift the discussion to the state level. mark for My Articles 104 similar articles
Chemistry World
October 10, 2012
Maria Burke
Illegal medicines seized in worldwide operation During the nine-day operation, coordinated by INTERPOL and involving 100 countries, around 18,000 illegal online pharmacy websites were shut down and 79 people were arrested. mark for My Articles 77 similar articles
CIO
September 17, 2012
Tom Kaneshige
CIOs Look Ahead: Millennials, Consumer Tech and the Future The newest wave of workers, known as Millennials, are demanding technology freedom and a blurring of the work-life line through social media and personal mobile devices. Here's how CIOs can give Millennials what they want without relinquishing control. mark for My Articles 46 similar articles
IEEE Spectrum
October 2012
Tam Harbert
Internet Giants Adopt New Lobbying Tactics Google and Facebook are spending heavily on traditional lobbying firms, even as they marshal their users to influence the U.S. Congress mark for My Articles 43 similar articles
IEEE Spectrum
October 2012
Paul McFedries
From Surf to Serf Digital sharecroppers, unite! Just like the farm laborers of old who worked the land but didn't own it, digital sharecroppers grow the product that earns Web 2.0 companies their profits, but they relinquish ownership. mark for My Articles 19 similar articles
<Older 3431-3440 Newer>    Return to current articles.