Security risks from instant messaging networks and spam-clogged e-mail inboxes are forcing corporations to finds ways to either limit employee access or clamp down with improved security. Financial firms have an added burden. They must treat instant messages the same as e-mail communication and ensu...
Few analyst reports hit home as squarely as the recent Jupiter Research study on cookie deletion struck at the heart of the Web analytics industry. Released in March, the report said 39 percent of Web users acknowledged deleting cookies -- code stored on a user's hard drive so that a site they click...
In the highly competitive cellular marketplace, carriers are always on the lookout for an edge, a way to differentiate their services from their competitors' offerings. Somewhat surprisingly, for more than a decade, Nextel Inc. has been able to use one enhanced service, Push-to-Talk (PTT), not only ...
On April 27, President George Bush signed a copyright bill that aims to legalize technology that allows users to automatically skip over or mute objectionable content in movie DVDs. Contained in DVD players and other devices, the filtering technology allows parents to prevent their children from see...
Consumers and enterprise IT managers have to become more vigilant about spyware and adware infections to stay ahead of new threats. However, greater awareness of security issues since last year has tipped the scales slightly against intruders. That's a lesson to be learned from an analysis of data c...
Philadelphia might be known as the city of brotherly love but what it's generating with its experiment with government-sponsored wireless broadband access is far from that emotion. Last fall, the city aired its intentions to make itself a gigantic WiFi hotspot, a project with a projected price tag o...
As wireless technology gains popularity, network security issues continue to multiply. However, wireless connectivity isn't the only major concern for IT managers; corporate workers pose heightened threats from within enterprise structures. One of the most productive -- and abused -- communication t...
Fall River, Mass., is an old textile town sprawled along the hills on the banks of the Taunton river, its salad days more than a century behind it. Although located only some 50 miles south of Boston and its high-tech "Golden Horseshoe," Fall River has never been associated with the phrase "state of...
Computer security, until now, was a matter of bolting on third-party hardware products or adding on software to screen out unauthorized users. Not so any more. Keyboard-bound passwords, smart cards and dongles are becoming a thing of the past. These staples of the old school of computer security are...
Well, we have yet another definition to add to our technology lexicon: click hijacking. With the advent of powerful and profitable search engines, like Google, Internet schemers have come up with yet another way to illegally make a buck. This article looks at this new phenomenon, what gave rise to ...
Ban
Regulate
Maintain status quo
Undecided
Enter your Username and Password to sign in.