News & Commentary
Content tagged with Cybersecurity posted in May 2008
Online Hate Activity Rises, Extremists Using Web 2.0 Technologies
News  |  5/27/2008  | 
A report by the Simon Wiesenthal Center highlights how extremists have turned to YouTube, Facebook, online games, and Second Life to recruit new members.
Apple iTunes Customers Targeted By Phishers
News  |  5/20/2008  | 
Anyone paying any attention at all should be able to detect the difference between "kurvemageren.com" and "apple.com," security experts report.
Senator Lieberman Wants Terrorist Videos Removed From YouTube
News  |  5/19/2008  | 
Islamic terrorist organizations use YouTube to distribute propaganda, attract followers, and provide weapons training, the senator said in a letter.
DARPA Plans Cyberwar 'Matrix'
News  |  5/8/2008  | 
The agency's National Cyber Range for cyberwar simulation would be similar to Star Trek's holodeck or a Snow Crash-style Metaverse.
Hackers Join Social Network Craze With 'House Of Hackers'
News  |  5/7/2008  | 
GnuCitizen's site promotes exchanging ideas through elite circles and tiger/red teams, but frowns on all criminal activities.


The Agile Archive
The Agile Archive
When it comes to managing data, donít look at backup and archiving systems as burdens and cost centers. A well-designed archive can enhance data protection and restores, ease search and e-discovery efforts, and save money by intelligently moving data from expensive primary storage systems.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Government, May 2014
NIST's cyber-security framework gives critical-infrastructure operators a new tool to assess readiness. But will operators put this voluntary framework to work?
Video
Slideshows
Twitter Feed
Audio Interviews
Archived Audio Interviews
GE is a leader in combining connected devices and advanced analytics in pursuit of practical goals like less downtime, lower operating costs, and higher throughput. At GIO Power & Water, CIO Jim Fowler is part of the team exploring how to apply these techniques to some of the world's essential infrastructure, from power plants to water treatment systems. Join us, and bring your questions, as we talk about what's ahead.