In today's world of warnings, dangers and the need for safety precautions, even surfing the Internet for business or pleasure is fraught with hazards. Despite the growing epidemic of spyware infections, many computer users remain unfazed by the call to arms in the fight for safer computing practices...
More and more digital devices are being put in homes as a result of consumers doing such things as moving audio files from PCs to home entertainment systems. In response to the upswing in demand for networked services in the home, the HomePlug Powerline Alliance is moving to make the technology to c...
Spyware, an intrusive malicious software -- or malware -- application that slips into computers via free downloads and visits to some Web sites, is quickly becoming the second most troublesome computer malady after virus infections. Spyware can track Web surfing habits and send the results to purvey...
Wireless carriers are finding online gaming via use of cell phones to be the latest cash cow to boost revenues. "Carriers have been surprised that wireless gaming is even more lucrative than ringtones," Ken Hyers, a senior analyst with market research firm In-Stat/MDR, told TechNewsWorld. Online gam...
In the wake of federal e-signature legislation that Congress approved nearly four years ago, the online financial world has seen dozens of Internet companies proffer solutions that promised tamper-proof electronic signatures. The recurring result was a steady stream of solutions that raised lots of ...
Software piracy is so widespread that it exists in homes, schools, businesses and government offices. According to the Business Software Alliance (BSA), an international association representing the leading software developers, software piracy is practiced by individual PC users as well as computer ...
Because they offer users network-access flexibility as they move from place to place, wireless LANs -- often called WLANs -- have gained significant acceptance. While the technology has proven to be a boon to maintenance technicians, salespersons and programmers, it has been a sometimes vexing secur...
Spyware is fast becoming the next generation of spam. It is software that installs onto a computer or local network, monitors computing habits and delivers the information to third parties. Usually, the user is unaware that the software exists on his or her computer. Much like spam, spyware is becom...
Cell phones are no longer used simply for voice communications; increasingly, they support text messaging, e-mail, Web surfing and even video transmissions. With this transformation has come the need for a more sophisticated mobile operating system. Half a dozen vendors, including Microsoft and Symb...
Crime is turning from a blue-collar to a white-collar profession. Rather than taking out guns and robbing convenience stores, criminals are performing "virtual robberies" where they use computer technology to steal a person's identity. From a criminal perspective, these crimes are simple to commit, ...
Ban
Regulate
Maintain status quo
Undecided
Enter your Username and Password to sign in.