[TechRepublic] Cyber-delinquency: Laws that turn kids into criminals

IT Security

TechRepublic Member | February 07, 2012

Juvenile cyber-delinquency: Laws that are turning kids into criminals

Deb Shinder considers the problem of juvenile delinquency when it concerns kids and computers. Do we need a better strategy for dealing with juvenile cybercrime? Take the opinion poll. Read more

Resource of the day

Boost Web Application Performance for a Better User Experience

Join this webcast with American Modern Insurance Group to discover the best strategies for improving the Web-user experience and learn how creating a Performance Center of Excellence can ensure optimal Web application performance.


Why are websites getting your mobile-phone number?

Are mobile-service providers leaking data into traffic destined for web servers? That's what a research analyst set out to prove. Read more

The three types of online attackers

Patrick Lambert describes the three main groups of attackers that security specialists are guarding against. Read more

Infographic: Kim Dotcom and the Megaupload story

While Megaupload's attorney tries to negotiate a deal with the government to preserve users' legitimate hosted files, check out this snapshot of Kim Dotcom fun facts and figures. Read more

VeriSign repeatedly hacked in 2010

Verisign was repeatedly attacked in 2010 but the extent of what was stolen is unknown, and the company didn't even own up to it until late 2011. Read more

Additional TechRepublic resources

 

Five pieces of scamware to watch out for

From fake antivirus apps to uninvited toolbars, scamware can bog down your users' PCs -- and sometimes do a whole lot worse. Read more

Use BrowserID for email address validation

If handling email address verification sounds like too much hard work, then BrowserID could be the registration solution that you are after. Read more

Featured multimedia

 

10 flawed products that are really bad

Certain well-known software and hardware products simply aren't very good — in fact some are barely usable, says Jack Wallen. View on site


Featured Webcast

Live Webcast: Fast and Efficient Business Security Strategies

Check out this webcast to learn more about fast and efficient business security strategies. You're in the midst of an arms race, make sure you win it.


Today's recommended downloads

Intel Cloud Technologies: Powering Tomorrow's Cloud (Intel Corporation)

Remote Monitoring and Management Made Simple, Scalable and Affordable (LabTech Software)

Meeting Intense Performance Demands in Cloud Environments (Intel Corporation)

Seven Steps for Building Security in the Cloud from the Ground Up (Intel Corporation)

Live Webcast: 3 Simple Steps to Better Patch Security (Sophos)


Connect with TechRepublic

TechRepublic Facebook Fan Page

Follow TechRepublic on Twitter

10 things you have to know to be computer literate

Many of your users are coasting along without adequate computer knowledge. Help them close the gap by sharing this list of essential skills.



TechRepublic newsletters

 

Get product reviews, tech news analysis, tips, and more in the following TechRepublic newsletters. Automatically sign up today!

TechRepublic Australia Wrapper

Web Designer

The Enterprise Cloud

Tablets in the Enterprise

Google in the Enterprise

App Builder

10 Things




Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is laoanganon@gmail.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2012 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

No comments:

Post a Comment