Article Query: Online Security
August 26, 2011

There has been a lot of discussion lately concerning Internet security and privacy, spurred on by what seems like an almost daily occurrence of web site hacking and the loss of confidential data.  Medical facilities, private industry, and governments alike struggle to come to grips with new methods of cyber crime and cyber terrorism.  While [...]

June 28, 2011

Microsoft is advising customers to reinstall if their desktop OS becomes infected with a new rootkit that hides in the PC boot sector.  This new variant of a Trojan Microsoft calls “Popureb” can infect the system at such a deep level that the only way to remove the malware is to reinstall Windows, Chun Feng, an [...]

June 18, 2011

Microsoft announced on Thursday the findings of a survey which revealed that over 7000 Windows home and business customers in several countries–including the United States, United Kingdom, Ireland, and Canada–have been targeted by a phone phishing scam.  According to Microsoft, “the scam works by criminals posing as computer security engineers and calling people at home [...]

June 17, 2011

For many of us in the technology field the preventative measures we take to keep ourselves and our systems safe online can become second nature.  We become comfortable with the drill, so comfortable, in fact, we sometimes forget that not everyone may have the resources and technical information that we have at our disposal.  Keeping this in [...]

January 24, 2009

We’re learning this week that we have officially passed the one billion number in terms of people using the Internet. Eric Schonfeld writes in his article on TechCrunch that the number is probably higher than that. One billion is a staggering number, even though it makes up only 15 to 22 percent of the world’s [...]

January 12, 2009

Identity Theft is a crime in which an impostor obtains key pieces of personal identifiable information such as Social Security numbers and driver’s license numbers and uses them for their own personal gain. It can start with lost or stolen wallets, pilfered mail, or even the use of a credit card at the local mall. [...]