To combat identity theft, protect computer
Having a triple-threat combination of protective software on your computer greatly reduces your chances of identity theft, according to a study led by a Michigan State University criminologist.
Having a triple-threat combination of protective software on your computer greatly reduces your chances of identity theft, according to a study led by a Michigan State University criminologist.
Software
Mar 19, 2012
0
0
(AP) -- The computer networks of a San Francisco community college have been infected with software viruses that illegally transmitted personal data from students and employees overseas, school officials said Friday.
Internet
Jan 14, 2012
0
0
Wenliang Du, professor of computer science in the L.C. Smith College of Engineering and Computer Science (LCS), has had his paper accepted to be presented at the 27th Annual Computer Security Applications Conference, on potential ...
Software
Oct 13, 2011
0
0
Google has advised users of its online services in Iran to change their passwords following the theft of Internet security certificates from a Dutch company.
Internet
Sep 9, 2011
0
0
Although most Facebook users claim to be very uncomfortable with how third-party apps use their personal information, their actual behavior doesnt reflect this concern, a new study by School of Information researchers ...
Internet
Jul 22, 2011
1
0
(AP) -- Sony Pictures said Thursday it is investigating a statement from hackers claiming to have stolen more than 1 million pieces of user information.
Business
Jun 2, 2011
0
0
(AP) -- Top executives from Sony and online marketing firm Epsilon told lawmakers Thursday that they support federal legislation that would require companies to promptly notify consumers if their personal information is ...
Business
Jun 2, 2011
0
0
(AP) -- Executives from Sony and online marketing firm Epsilon will go before lawmakers on Thursday to try to explain recent data breaches at their companies that have exposed email addresses, credit card numbers and other ...
Business
Jun 2, 2011
0
0
(PhysOrg.com) -- Long considered the shining example of computer security, Apple Macintosh computers are becoming serious targets of cyberattacks, according to Indiana University Center for Applied Cybersecurity Research ...
Software
May 25, 2011
0
0
China had more than 900 million mobile phone subscribers at the end of April with nearly two-thirds of the world's most populous nation using cellular technology, the government said Tuesday.
Telecom
May 24, 2011
1
0