Browse by Topic

FTC Testifies on Protecting Children Online

The Federal Trade Commission today told a House Subcommittee that it is committed to protecting children online, and that the agency recently proposed changes to the Children’s Online Privacy Protection (COPPA) Rule to make sure the Rule keeps pace with fast-changing technology.

Kicking Off National Cyber Security Awareness Month

Today’s modern world is more interconnected than ever before. Everything from online shopping to social networking to providing basic utilities requires the reliability and security of the Internet.

Kicking Off National Cyber Security Awareness Month

Today’s modern world is more interconnected than ever before. Everything from online shopping to social networking to providing basic utilities requires the reliability and security of the Internet.

Kicking Off National Cyber Security Awareness Month

Today’s modern world is more interconnected than ever before. Everything from online shopping to social networking to providing basic utilities requires the reliability and security of the Internet.

Kicking Off National Cyber Security Awareness Month

Today’s modern world is more interconnected than ever before. Everything from online shopping to social networking to providing basic utilities requires the reliability and security of the Internet.

Kicking Off National Cyber Security Awareness Month

Today’s modern world is more interconnected than ever before. Everything from online shopping to social networking to providing basic utilities requires the reliability and security of the Internet.

Kicking Off National Cyber Security Awareness Month

Today’s modern world is more interconnected than ever before. Everything from online shopping to social networking to providing basic utilities requires the reliability and security of the Internet.

Commerce and Homeland Security Departments Request Information About Botnet Notifications

Hackers use software programs to search the internet for computers that aren’t protected by up-to-date security software. When they find unprotected computers, they try to install malware that allows them to control the computers remotely. Many thousands of these computers linked together make up a “botnet,“ a network controlled by hackers to steal people’s personal information or send spam. Millions of home computers are part of botnets.

Commerce and Homeland Security Departments Request Information About Botnet Notifications

Hackers use software programs to search the internet for computers that aren’t protected by up-to-date security software. When they find unprotected computers, they try to install malware that allows them to control the computers remotely. Many thousands of these computers linked together make up a “botnet,“ a network controlled by hackers to steal people’s personal information or send spam. Millions of home computers are part of botnets.

Commerce and Homeland Security Departments Request Information About Botnet Notifications

Hackers use software programs to search the internet for computers that aren’t protected by up-to-date security software. When they find unprotected computers, they try to install malware that allows them to control the computers remotely. Many thousands of these computers linked together make up a “botnet,“ a network controlled by hackers to steal people’s personal information or send spam. Millions of home computers are part of botnets.

Pages