In Brief

November 2007
Network World;11/5/2007, Vol. 24 Issue 43, p14
Trade Publication
The article offers news briefs related to computer software. Intego has identified the first fake codec Trojan malware for the Apple Macintosh. According to a survey conducted by Managed Objects, 54% of information technology (IT) managers said that their teams did enough to prevent outages. Meanwhile, the U.S. House of Representatives passed the Spy Act that would give the Federal Trade Commission (FTC) authority to fine spyware vendors for hijacking computers.


Related Articles

  • D.C. spyware discussion focuses debate. Dix, John // Network World;4/11/2005, Vol. 22 Issue 14, p46 

    This article focuses on the confusion surrounding the definition of spyware in the U.S. Agreeing on exactly what constitutes spyware is one of the chief problems Congress and others have had in figuring out a cohesive strategy for fighting back. Spyware, according to a report from the Federal...

  • Industry Comment: Spyware: spying into the New Year.  // MarketWatch: Global Round-up;Dec2005, Vol. 4 Issue 12, p172 

    The article presents information related to the spyware infection of computers. The prevalence of spyware by the end of 2005 will bring the message that spyware is a real threat that needs to be addressed. If this message is understood and acted upon, 2006 could bring some serious and...

  • It's IT time again. Bellavance, Christian // CA Magazine;Sep2008, Vol. 141 Issue 7, p1 

    The article discusses various reports published within the issue, including one by Andr�e Lavigne on top 10 IT technology issues, one by Yan Barcelo on the awareness of spyware and spams, and one by Jim Carroll on the proposed amendments to Canadian copyright law on digital products.

  • Adding 5 to an impressive list. Flint, Josh // Prairie Farmer;Mar2011, p16 

    The article announces awards given to farmers in the U.S. including David Bliss, Ken Greene, and Jim Purlee who received the Master Farmer Award from the periodical "Prairie Farmer."

  • An antidote to spyware. Garfinkel, Simson // eWeek;5/9/2005, Vol. 22 Issue 19, p36 

    The article focuses on the effect of legislation related to the spyware software on the computer software vendors in the U.S. According to the author, instead of engaging in a war of words, a cleaner solution would be to require software vendors to document the behaviors in their software that...

  • KÖTÃœCÃœL VE CASUS YAZILIMLAR: KAPSAMLI BÄ°R ARAÅžTIRMA. Canbek, Gürol; Sağiroğlu, Şeref // Journal of the Faculty of Engineering & Architecture of Gazi Uni;Mar2007, Vol. 22 Issue 1, p121 

    As information technologies being developed and becoming widespread, daily routines and works have switched to electronic media and made life easier. As a result, the importance of information and computer security and threats encountered has increased in diversity as well as in quantity. New...

  • Threat Stats.  // SC Magazine: For IT Security Professionals (15476693);Feb2011, Vol. 22 Issue 2, p11 

    Several charts and graphs are presented that offer information on threats to information technology (IT) security as of February 2011 including malware vertical encounter rate, top five attacks used by foreign hackers, and top 10 spyware threats.

  • TECHNOLOGY: briefs. Pacheco, Dennis Costa // Caribbean Business;4/5/2007, Vol. 35 Issue 13, p35 

    The article presents technology-related news briefs. The study conducted by the Webroot State of Internet Security revealed many global businesses suffering from business disruptions due to malware, while another study revealed the increasing number of phishing attacks as of the first two months...

  • Making spyware pay.  // Accountancy;Jun2006, Vol. 137 Issue 1354, p67 

    The article reports that a U.S. court ruling is making spyware publishing a less profitable business venture. A New Hampshire U.S. District Court fined Sanford Wallace and his Smartbot.net company $4.1 million in a case brought by the United States Federal Trade Commission. OptinTrade, a company...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics