August 22, 2008, 1:27 PM — A recent Scientific American article describes how easy it is to steal somebody's identity. It uses blog entries, password reset mechanisms, and simple detective work. Make no mistake. You are not secure if you are not a blogger -- this is simply an account of what could be done.
The Most
-
Microsoft's Security Essentials isn't the best antivirus program, according to Microsoft
2 comments
-
AMD pushes forward with new video cards and a few surprises
2 comments
-
Change Microsoft Office 2013's default search engine from Bing to Google
2 comments
-
See - and hear - what it was like to surf the web 20 years ago
1 comment
-
Valve completes its trifecta of announcements with the Steam Controller
1 comment
October is...
Unified Communications Month
Unified Communications Month
BY THE NUMBERS: UC&C
HOW-TO: Look alive and professional in Web meetings
TIP: Use your cell phone as a WiFi VOIP phone
TOOLBOX: Six alternative tools for small business collaboration
CASE STUDY: Enterprise social network moves ad agency into the future
SecurityWhite Papers & Webcasts
White Paper
5 Steps for Building a Secure Cloud
Webcast On Demand
Containerization Options: How to Choose the Best DLP Solution for Your Organization
Sponsor: BlackBerry
White Paper
Cutting Complexity - Simplifying Security
See more White Papers | Webcasts
Answers - Powered by ITworld
ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.


















