TITLE

ID Theft: Keep Your Information to Yourself

AUTHOR(S)
Perry, Phillip
PUB. DATE
March 2004
SOURCE
Rural Telecommunications;Mar/Apr2004, Vol. 23 Issue 2, p62
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Presents tips to protect information on computers from identity theft. Ways to block the attack of computer hackers; Advice to reduce overall computer security risks; Information on computer virus and trojan horse software.
ACCESSION #
12688920

 

Related Articles

  • A Compelling Argument For Automated Code Testing. Schmidt, Howard A. // Software World;Jul2008, Vol. 39 Issue 4, p14 

    The article discusses the importance of automated code testing to software companies in Great Britain. Due to the rising cases of internet fraud, malware, computer hacking and computer viruses, companies are looking for ways to address and mitigate the detrimental effects of such events. It...

  • New research predicts digital Armageddon.  // MarketWatch: Technology;February 2005, Vol. 4 Issue 2, p23 

    Reports on a survey aimed to collect predictions on how the Internet will affect society in the next decade in the U.S. Indications showing a wide agreement among expert respondents that at least one devastating attack will occur on the networked information infrastructure; Contentions over the...

  • Crime Watch. Mayne, Mark // SC Magazine: For IT Security Professionals (UK Edition);Aug2006, p30 

    The article offers advice from several computer security experts on dealing with cyber criminals. The experts looked at some of the security issues and trend in the threat landscape and what worries them most about the future. Jon Callas of PGP Corp. sees the rise in Internet crimes to be...

  • New research predicts digital Armageddon.  // MarketWatch: Global Round-up;February 2005, Vol. 4 Issue 2, p180 

    Reports on a survey aimed to collect predictions on how the Internet will affect society in the next decade in the U.S. Indications showing a wide agreement among expert respondents that at least one devastating attack will occur on the networked information infrastructure; Contentions over the...

  • Today's Attackers Can Find the Needle. Mimoso, Michael S.; Savage, Marcia // Information Security;Jun2006, Vol. 9 Issue 6, p24 

    This article discusses the type of for-profit crime plaguing the Internet. Today's hackers want customer data and intellectual property and they also want to infiltrate government agencies. Stealth technology that are being used by attackers include rootkits which are bundled in spyware. Ways to...

  • An Usage-Centric Botnet Taxonomy. Czosseck, Christian; Podins, Karlis // Proceedings of the European Conference on Information Warfare & ;2011, p65 

    Botnets have been a recognized threat to computer security for several years. On the timeline of malware development, they can be seen as the latest evolutionary step. Criminals have taken advantage of this new technol-ogy and cyber crime has grown to become a serious and sophisticated problem...

  • Microsoft to rush WMF patch.  // eWeek;1/9/2006, Vol. 23 Issue 2, p29 

    This article focuses on the announcement made by Microsoft Corp., that it is releasing a fix for a critical and previously unknown security vulnerability in a Windows component used to render Windows Metafile (WMF) graphics files. The company wants to test a patch as early as possible for a...

  • Cyber-Extortion Evolves. O'Rourke, Morgan // Risk Management (00355593);Apr2004, Vol. 51 Issue 4, p10 

    This article deals with the emergence of new Internet extortion schemes in the U.S. as of April 2004. While widely publicized, the proliferation of electronic mail viruses and worms is not the only cyber crime threat that businesses should be concerned about when it comes to information...

  • Top Ten Viruses In October 2005.  // Software World;Nov2005, Vol. 36 Issue 6, p26 

    The article presents the top ten viruses occurring October 2005 from the report of Sophos Inc. The report, which was compiled from the global network monitoring stations of Sophos, revealed that October has seen the biggest increase in virus numbers since its record began. The Netsky-P, worm...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics