TITLE

New research predicts digital Armageddon

PUB. DATE
February 2005
SOURCE
MarketWatch: Technology;February 2005, Vol. 4 Issue 2, p23
SOURCE TYPE
Market Research Report
DOC. TYPE
Article
ABSTRACT
Reports on a survey aimed to collect predictions on how the Internet will affect society in the next decade in the U.S. Indications showing a wide agreement among expert respondents that at least one devastating attack will occur on the networked information infrastructure; Contentions over the plausibility of an attack; Concern among security experts over the advancement of worm writers in creating more powerful and destructive worms.
ACCESSION #
17640669

 

Related Articles

  • New research predicts digital Armageddon.  // MarketWatch: Global Round-up;February 2005, Vol. 4 Issue 2, p180 

    Reports on a survey aimed to collect predictions on how the Internet will affect society in the next decade in the U.S. Indications showing a wide agreement among expert respondents that at least one devastating attack will occur on the networked information infrastructure; Contentions over the...

  • Cyber-Extortion Evolves. O'Rourke, Morgan // Risk Management (00355593);Apr2004, Vol. 51 Issue 4, p10 

    This article deals with the emergence of new Internet extortion schemes in the U.S. as of April 2004. While widely publicized, the proliferation of electronic mail viruses and worms is not the only cyber crime threat that businesses should be concerned about when it comes to information...

  • ID Theft: Keep Your Information to Yourself. Perry, Phillip // Rural Telecommunications;Mar/Apr2004, Vol. 23 Issue 2, p62 

    Presents tips to protect information on computers from identity theft. Ways to block the attack of computer hackers; Advice to reduce overall computer security risks; Information on computer virus and trojan horse software.

  • A Compelling Argument For Automated Code Testing. Schmidt, Howard A. // Software World;Jul2008, Vol. 39 Issue 4, p14 

    The article discusses the importance of automated code testing to software companies in Great Britain. Due to the rising cases of internet fraud, malware, computer hacking and computer viruses, companies are looking for ways to address and mitigate the detrimental effects of such events. It...

  • Crime Watch. Mayne, Mark // SC Magazine: For IT Security Professionals (UK Edition);Aug2006, p30 

    The article offers advice from several computer security experts on dealing with cyber criminals. The experts looked at some of the security issues and trend in the threat landscape and what worries them most about the future. Jon Callas of PGP Corp. sees the rise in Internet crimes to be...

  • Return of the Web mob. Naraine, Ryan // eWeek;4/10/2006, Vol. 23 Issue 15, p11 

    The article focuses on the resurgence of computer hackers in the U.S. This new breed of hackers are equipped with more sophisticated and advanced technology to disrupt the Internet. Skilled hackers steal corporate data including credit card and bank accounts. Some hackers use their ability in a...

  • Taking back the Net. Kirkpatrick, David; Tkaczyk, Christopher // Fortune International (Europe);9/29/2003, Vol. 148 Issue 6, p73 

    As every computer user knows, hackers, spammers, and others are threatening the Internet. Merrill Lynch, the Washington Post Company, and other giants have found that roughly 60% of all e-mail their employees receive is unwanted and often fraudulent--a costly waste of time. Consumers are being...

  • Taking back the Net. Kirkpatrick, David; Tkaczyk, Christopher // Fortune;9/29/2003, Vol. 148 Issue 6, p117 

    As every computer user knows, hackers, spammers, and others are threatening the Internet. Merrill Lynch, the Washington Post Company, and other giants have found that roughly 60% of all e-mail their employees receive is unwanted and often fraudulent--a costly waste of time. Consumers are being...

  • Net dangers still lurk. Kelly, Benedict // Finweek;5/1/2008, p63 

    The article focuses on the security issues of interactive web applications. According to the author, the development of more web applications poses a risk of attacks from computer hackers. He adds that attacks now are more concentrated on gaining information on specific industries. Furthermore,...

Share

Read the Article

Courtesy of NEW JERSEY STATE LIBRARY

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics