A recent Scientific American article describes how easy it is to steal somebody's identity. It uses blog entries, password reset mechanisms, and simple detective work. Make no mistake. You are not secure if you are not a blogger -- this is simply an account of what could be done.
What you always wanted to know about malware (but were afraid to ask)Next Post
When friendly 'from' names become enemies
Over the past year, our resume experts and career consultants have helped numerous IT professionals put...
If you enjoy a sharply-worded insult, read on. This slideshow’s for you.
The source code behind proprietary software doesn’t always remain hidden forever. Here are a number of...
The design team working on C# are examining data management, performance, and reliability for the next...
The content could give a lift to Google in mobile search
The cluster-management software helps boost availability in the AWS cloud
Problem compounded by the fact that most countries do not have e-waste recycling facilities