COMPUTER & INTERNET SECURITY

Computer surveillance and security covers a wide range of ways to keep you and your information safe. Learn about firewalls, zombie computers, hackers and workplace surveillance.

Featured

How E-mail Scams Work

E-mail scams are often well-disguised and can be very dangerous. Check out some examples of e-mail scams in this article.

1-10 of 43
  • 10 Worst Computer Viruses of All Time
    10 Worst Computer Viruses of All Time

    Most computer-savvy people know about viruses and how to prevent an infection. But what are some of the most destructive viruses of all time, the record-smasher server-crashers? See more »

  • Can the government see what Web sites I visit?
    Can the government see what Web sites I visit?

    The United States government is pretty much on your side when it comes to Internet browsing freedom. But some circumstances merit Big Brother's watchful eyes. See more »

  • Can the government take away my laptop?
    Can the government take away my laptop?

    People traveling to the United States have grown accustomed to tight security. But can the government really take your laptop and keep it indefinitely? See more »

  • Could a single hacker crash a country's network?
    Could a single hacker crash a country's network?

    What does it take to cripple a nation? Someone with solid computer skills, for a start. Nefarious hackers wield a lot of power with a few keystrokes, and the United States is taking action. See more »

  • Could hackers devastate the U.S. economy?
    Could hackers devastate the U.S. economy?

    In "Live Free or Die Hard," Detective John McLane fights a group that carries out attacks using the Internet. Is it really possible for hackers to cause economic or physical devastation in the United States? See more »

  • Digital Fingerprinting: Test Your Knowledge of Online Forensics
    Digital Fingerprinting: Test Your Knowledge of Online Forensics

    No, this quiz isn't about scanning fingerprints -- it's about Web technologies used to prevent copyright infringement and track your online identity. See how much you know. See more »

  • How Anonymous Works
    How Anonymous Works

    You've probably heard of the hacktivist group known as Anonymous, but do you really know what motivates the group’s actions or how members organize their initiatives? See more »

  • How Carnivore Worked
    How Carnivore Worked

    If George Orwell's book "1984" creeped you out, you'll want to read the facts about the FBI's Operation Carnivore. It gave agents the permission and technology to access to the online and e-mail activities of suspected criminals. See more »

  • How CISPA Works
    How CISPA Works

    CISPA is a proposed cybersecurity bill that has fervent supporters and opponents. What makes some people feel it's a dangerous piece of legislation, and what are its potential benefits? See more »

  • How Computer Forensics Works
    How Computer Forensics Works

    Could your e-mail be used against you in a court of law? Maybe. Computer forensics searches, preserves and analyzes information on computer systems for potential evidence in a trial. See more »

1-10 of 43

More To Explore

  • MOST POPULAR

  • Most Watched

Don't Miss