[TechRepublic] Cyber-delinquency: Laws that turn kids into criminals

IT Security

TechRepublic Member | February 07, 2012

Juvenile cyber-delinquency: Laws that are turning kids into criminals

Deb Shinder considers the problem of juvenile delinquency when it concerns kids and computers. Do we need a better strategy for dealing with juvenile cybercrime? Take the opinion poll. Read more

Resource of the day

Seven Steps for Building Security in the Cloud from the Ground Up

The cloud is awesome, but it isn't always secure. There's something you can do about it though. Take the seven steps for building security in the cloud. Which seven steps? The ones in this white paper.


Why are websites getting your mobile-phone number?

Are mobile-service providers leaking data into traffic destined for web servers? That's what a research analyst set out to prove. Read more

The three types of online attackers

Patrick Lambert describes the three main groups of attackers that security specialists are guarding against. Read more

Infographic: Kim Dotcom and the Megaupload story

While Megaupload's attorney tries to negotiate a deal with the government to preserve users' legitimate hosted files, check out this snapshot of Kim Dotcom fun facts and figures. Read more

VeriSign repeatedly hacked in 2010

Verisign was repeatedly attacked in 2010 but the extent of what was stolen is unknown, and the company didn't even own up to it until late 2011. Read more

Additional TechRepublic resources

 

Five pieces of scamware to watch out for

From fake antivirus apps to uninvited toolbars, scamware can bog down your users' PCs -- and sometimes do a whole lot worse. Read more

Use BrowserID for email address validation

If handling email address verification sounds like too much hard work, then BrowserID could be the registration solution that you are after. Read more

Featured multimedia

 

10 flawed products that are really bad

Certain well-known software and hardware products simply aren't very good — in fact some are barely usable, says Jack Wallen. View on site


Featured Webcast

Live Webcast: Fast and Efficient Business Security Strategies

Check out this webcast to learn more about fast and efficient business security strategies. You're in the midst of an arms race, make sure you win it.


Today's recommended downloads

Improved Cooling Strategies for IT Wiring Closets (APC by Schneider Electric)

Implementing and Expanding a Virtualized Environment (Intel Corporation)

The Benefits of Remote Monitoring and Management (LabTech Software)

Accelerating Innovation and Savings with R&D Cloud (Intel Corporation)

Securing the Cloud with Intel Trusted Execution Technology Usage Models (Intel Corporation)


Connect with TechRepublic

TechRepublic Facebook Fan Page

Follow TechRepublic on Twitter

10 things you have to know to be computer literate

Many of your users are coasting along without adequate computer knowledge. Help them close the gap by sharing this list of essential skills.



TechRepublic newsletters

 

Get product reviews, tech news analysis, tips, and more in the following TechRepublic newsletters. Automatically sign up today!

TechRepublic Australia Wrapper

Web Designer

The Enterprise Cloud

Tablets in the Enterprise

Google in the Enterprise

App Builder

10 Things




Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is techsubscriptionss@cesabarre.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2012 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

No comments:

Post a Comment