Monday, June 27, 2011

Can You be Cyber-Stalked? The 30-Minute Google Challenge | PCWorld

A blog here, a screen name there, an old social-networking profile or two--the more you use the Web for work and play, the easier it is for others to dig up dirt on you. And while you may not worry much about a few errant comments or tags, you'd surprised at how complete a portrait someone can paint of you with a few quick Google queries. Read more

Thursday, June 23, 2011

So, You're Being Sued for Piracy | PCWorld

Hollywood may have stopped its massive litigation campaigns against illegal file swappers in 2008, but the piracy lawsuits are still flying. Now teams of lawyers working for certain small businesses are going after illegal file swappers. These businesses, often referred to as "copyright trolls," are attempting to turn the threat of suing pirates into a profitable cottage industry. Read more

Monday, June 20, 2011

Facebook Photo Tagging: A Privacy Guide | PCWorld

Privacy advocates are up in arms over Facebook's new facial recognition technology that helps your friends tag you in photos on Facebook, but is it really a privacy nightmare? The biggest problem with the new feature is that, once again, Facebook has opted-in all users by default, instead of allowing you to choose whether you want to Facebook digitally scanning your face. The European Union's privacy watchdogs are now looking into the matter to see whether it runs afoul of privacy rules. Security firm Sophos said the facial recognition feature "feels like Facebook is eroding the online privacy of its users by stealth."

Tuesday, June 14, 2011

Seeking Address: Why Cyber Attacks Are So Difficult to Trace Back to Hackers: Scientific American

Cyber attacks may not be a new phenomenon but the recent successes scored against high-profile targets including CitiGroup, Google, RSA and government contractors such as Lockheed Martin underscore the targets' current failure to block security threats enabled by the Internet. Malicious hackers use the very same technology that enables online banking, entertainment and myriad other communication services to attack these very applications, steal user data, and then cover their own tracks. Read more

Monday, June 6, 2011

How to Buy a Tablet | PCWorld

As more tablets come to market, be prepared to be wowed by the power that some of these slates are capable of. But also be prepared to be disappointed: The tablets already on the market, or coming soon, have a slew of gotchas--especially the lower-cost models you may see advertised at rock-bottom prices. Read more

Wednesday, June 1, 2011

10 hidden features in Windows 8 | ITworld

Microsoft CEO Steve Ballmer finally confirmed what tech pundits knew all along: the next generation of Windows will be out in 2012. In the meantime, Microsoft is half-way done with Windows 8 -- it's in the Milestone 3 stage right now -- and is prepping up the first beta for this September's "Windows Developer Conference" in Anaheim, California.

But you don't have to wait until then to get a look at some of Windows 8's best new features. IT World closely examined a pre-beta leak and dug up 10 great features and improvements you can look forward to. While these pre-beta builds have been covered left and right, they've chosen to focus on the lesser-known, but noteworthy improvements.

Read more