Here are just a handful of the big stories that CNN and other news organizations won't be able to fully cover over the next two to three years: An economic rebound spurred by renewed investments and new developments in technology. An Internet available to more people in more far-flung parts of the U...
Can you recall the five worst phishing scams to grace your e-mail in-box? Can you spot a genuine e-mail from your financial institution or government agency? Don't feel too technologically challenged if your answer is no to either -- or both -- of these questions. Even security experts are hard-pres...
Other than perhaps the medical and legal industries, no field relies on jargon more than computer technology. Take, for instance, the use of words borrowed from other lexicons -- terms such as "virus, "Trojan," "intrusion prevention system," "spyware," and "attack vector." You might well hear these...
It always pays to be suspicious when unsolicited e-mails arrive, and on Friday new evidence underscored the point: A malicious e-mail purportedly from Microsoft actually serves up a worm dubbed "Grum." The e-mail, which claims to come from [email protected] and reads "Internet Explorer 7 Downloads...
A new computer virus targeting antivirus vendor Symantec's security software has hit a division of at least one big U.S. corporation this week and is still considered a threat to other networks. The virus, which has reportedly infested CNN and its parent company Turner Broadcasting System, is the la...
Three computer researchers created a stir Wednesday when they released a paper at a conference in Pisa, Italy, describing how to infect Radio Frequency Identification tags with a computer virus, but the likelihood of a digital disease rampaging through the world's supply chains is slim, at least for...
Summer is behind us, but recent memories of credit card processing breaches are still haunting security-conscious consumers, safety-minded merchants and bustling banks. While CardSystems Solutions made media headlines in June after a computer virus captured the private information of millions of con...
It used to be that the Hollywood portrayal of a computer virus writer -- the teenage, late night pizza-eating, underachieving genius who gets a kick out of taking down the White House Web site -- was fairly accurate. But today's malicious code creator has a variety of ways to disrupt and trespass on...
The U.S. Federal Bureau of Investigation today warned the public to avoid falling victim to an ongoing mass e-mail scheme wherein computer users receive unsolicited e-mails purportedly sent by the FBI. "These e-mails did not come from the FBI. Recipients of this or similar solicitations should know ...
Spamhaus, an authoritative force against the unwanted e-mail that accounts for more than half of all mail sent on the Internet, sounded an alarm this week over the problem of Internet service provider (ISP) e-mail relays being used by spammers. The so-called "proxy" spam -- which is sent by machines...
Accessibility of service
Convenience in any situation
Cost-effectiveness
Eco-friendliness
No need for parking
Safe ride when having too much fun
Enter your Username and Password to sign in.