[TechRepublic] Cyber-delinquency: Laws that turn kids into criminals

IT Security

TechRepublic Member | February 07, 2012

Juvenile cyber-delinquency: Laws that are turning kids into criminals

Deb Shinder considers the problem of juvenile delinquency when it concerns kids and computers. Do we need a better strategy for dealing with juvenile cybercrime? Take the opinion poll. Read more

Resource of the day

Amway Is Assured of Quick Recovery of its Active Directory Forest with Quest

For some businesses, their active directory is a life blood. In order to protect it, you'll need to make sure your active directory is safe. Check out this case study of Amway to see how they handled their active directory safety.


Why are websites getting your mobile-phone number?

Are mobile-service providers leaking data into traffic destined for web servers? That's what a research analyst set out to prove. Read more

The three types of online attackers

Patrick Lambert describes the three main groups of attackers that security specialists are guarding against. Read more

Infographic: Kim Dotcom and the Megaupload story

While Megaupload's attorney tries to negotiate a deal with the government to preserve users' legitimate hosted files, check out this snapshot of Kim Dotcom fun facts and figures. Read more

VeriSign repeatedly hacked in 2010

Verisign was repeatedly attacked in 2010 but the extent of what was stolen is unknown, and the company didn't even own up to it until late 2011. Read more

Additional TechRepublic resources

 

Five pieces of scamware to watch out for

From fake antivirus apps to uninvited toolbars, scamware can bog down your users' PCs -- and sometimes do a whole lot worse. Read more

Use BrowserID for email address validation

If handling email address verification sounds like too much hard work, then BrowserID could be the registration solution that you are after. Read more

Featured multimedia

 

10 flawed products that are really bad

Certain well-known software and hardware products simply aren't very good — in fact some are barely usable, says Jack Wallen. View on site


Featured Webcast

Live Webcast: 3 Simple Steps to Better Patch Security

For better patch security, you'll need to take some precautions and know how to react when the time comes. For help with that, check out this live webcast from TechRepublic.


Today's recommended downloads

Live Webcast: Fast and Efficient Business Security Strategies (GFI Software)

Netshelter CX Enclosure - Product Demonstration (APC by Schneider Electric)

Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms (Intel Corporation)

Improved Cooling Strategies for IT Wiring Closets (APC by Schneider Electric)

The Future of Cloud Computing Planning Guide (Intel Corporation)


Connect with TechRepublic

TechRepublic Facebook Fan Page

Follow TechRepublic on Twitter

10 things you have to know to be computer literate

Many of your users are coasting along without adequate computer knowledge. Help them close the gap by sharing this list of essential skills.



TechRepublic newsletters

 

Get product reviews, tech news analysis, tips, and more in the following TechRepublic newsletters. Automatically sign up today!

TechRepublic Australia Wrapper

Web Designer

The Enterprise Cloud

Tablets in the Enterprise

Google in the Enterprise

App Builder

10 Things




Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is ceasar@cesabarre.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2012 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

No comments:

Post a Comment