MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Internet / Social Issues

Magazine articles on the internet's impact on society, privacy, spam, hacking, scams, regulation.
Old Articles: <Older 3451-3460 Newer>
Fast Company
Jul/Aug 2013
Robert Safian
From The Editor: Paradoxes Of The Digital Age Every business exec and innovator I know seems to be grappling with the same problem: How much should I connect? How can I keep up with the swirl of the Twittersphere without losing what little private space I have? mark for My Articles 4 similar articles
Registered Rep.
May 13, 2013
Lauren Barack
Baby Boomers Driving the Technology Wave Forget "next-gen." The real push for an online component to the financial advisory business is coming from the older generation, and the change is happening faster than you thought. mark for My Articles 548 similar articles
National Defense
July 2013
Yasmin Tadjdeh
Cyberspies Can Destroy, Corrupt Data as Easily as They Snoop If hackers can steal a company's top-secret data, they can just as easily destroy a company's network, experts said recently. mark for My Articles 15 similar articles
National Defense
June 2013
Valerie Insinna
Defense Department Infrastructure Still Vulnerable to Cyber-Attacks, Critics Say The Defense Department knows how to fight a kinetic war with bullets, bombs and boots on the ground, but it is still figuring out what a cyberwar would look like and how it would be fought. mark for My Articles 395 similar articles
National Defense
June 2013
Stew Magnuson
Defense Industrial Base Wary of Cybersecurity Laws That hackers are intent on stealing U.S. trade secrets -- particularly those pertaining to the military -- is a given. That the United States is capable of responding to this threat remains to be seen. mark for My Articles 133 similar articles
Fast Company
June 2013
Reader Poll: Are You Internet-Addicted? The American Psychiatric Association is wondering about all that time you spend online. mark for My Articles 12 similar articles
Fast Company
June 2013
From MIT To WikiLeaks: A Brief History Of Hacking A survey of news about hacking and hackers, both good and bad, from the 1950s to the present. mark for My Articles 52 similar articles
National Defense
June 2013
Valerie Insinna
Personal Devices Pose Challenge for Defense Department Security The proliferation of smartphones has caused a dramatic shift in how hackers target the Defense Department and its industrial base, cybersecurity company officials said. mark for My Articles 32 similar articles
National Defense
June 2013
Tim Larkins
Threats and Opportunities Growing in Cybersecurity The federal government will spend about $10 billion on cybersecurity in fiscal year 2013. That number could grow to $13 billion in fiscal year 2014. mark for My Articles 130 similar articles
CRM
May 2013
Marshall Lager
We're All Connected For better or worse, everything digital is out there. mark for My Articles 26 similar articles
<Older 3451-3460 Newer>    Return to current articles.