COMPUTER & INTERNET SECURITY

Computer surveillance and security covers a wide range of ways to keep you and your information safe. Learn about firewalls, zombie computers, hackers and workplace surveillance.
FPO
Featured

What does the U.S. cybersecurity czar do?

In 2009, President Barack Obama created a White House position -- the cybersecurity czar -- to oversee the nation's computer network safety. With so many other federal agencies focused on the same task, what exactly does the cybersecurity czar's job entail?

1-10 of 44
  • 10 Worst Computer Viruses of All Time

    10 Worst Computer Viruses of All Time

    Most computer-savvy people know about viruses and how to prevent an infection. But what are some of the most destructive viruses of all time, the record-smasher server-crashers? See more »

  • Can the government see what Web sites I visit?

    Can the government see what Web sites I visit?

    The United States government is pretty much on your side when it comes to Internet browsing freedom. But some circumstances merit Big Brother's watchful eyes. See more »

  • Can the government take away my laptop?

    Can the government take away my laptop?

    People traveling to the United States have grown accustomed to tight security. But can the government really take your laptop and keep it indefinitely? See more »

  • Could a single hacker crash a country's network?

    Could a single hacker crash a country's network?

    What does it take to cripple a nation? Someone with solid computer skills, for a start. Nefarious hackers wield a lot of power with a few keystrokes, and the United States is taking action. See more »

  • Could hackers devastate the U.S. economy?

    Could hackers devastate the U.S. economy?

    In "Live Free or Die Hard," Detective John McLane fights a group that carries out attacks using the Internet. Is it really possible for hackers to cause economic or physical devastation in the United States? See more »

  • Digital Fingerprinting: Test Your Knowledge of Online Forensics

    Digital Fingerprinting: Test Your Knowledge of Online Forensics

    No, this quiz isn't about scanning fingerprints -- it's about Web technologies used to prevent copyright infringement and track your online identity. See how much you know. See more »

  • Exactly what is a zero-day vulnerability?

    Exactly what is a zero-day vulnerability?

    Viruses. Malware. Spyware. Add to the seemingly ever-growing list of things we have to worry about when dealing with computers one more factor: zero-day vulnerability. So just what the heck is it, and how does it put us at risk? See more »

  • How Anonymous Works

    How Anonymous Works

    You've probably heard of the hacktivist group known as Anonymous, but do you really know what motivates the group’s actions or how members organize their initiatives? See more »

  • How Carnivore Worked

    How Carnivore Worked

    If George Orwell's book "1984" creeped you out, you'll want to read the facts about the FBI's Operation Carnivore. It gave agents the permission and technology to access to the online and e-mail activities of suspected criminals. See more »

  • How CISPA Works

    How CISPA Works

    CISPA is a proposed cybersecurity bill that has fervent supporters and opponents. What makes some people feel it's a dangerous piece of legislation, and what are its potential benefits? See more »

1-10 of 44
More To Explore
Don't Miss