With the evolution of the Internet, the big kid in class who used to steal your lunch money has evolved into a new kind of bully -- one who hacks your e-mail, sends you threatening messages and sabotages your computer.
When hackers take over computers to do their Internet bidding, they create zombie computers. Allegedly, one hacker under investigation used a single computer to control a network of more than 1.5 million zombie computers.
In "Live Free or Die Hard," Detective John McLane fights a group that carries out attacks using the Internet. Is it really possible for hackers to cause economic or physical devastation in the United States?
Logic bombs can cripple a company's computer system and either reveal or destroy sensitive information. It's often a tool used by angry employees -- in the IT world, it has a reputation of being associated with "disgruntled employee syndrome."
Most people associate phishing with e-mail messages imitating banks or other businesses in an attempt to scam victims into revealing personal information. But e-mail messages are only one small piece of a phishing scam.
According to recent estimates, more than two-thirds of all PCs are infected with some kind of spyware. These programs track your Web habits and more. Is your computer doomed, or can you get rid of spyware?
The growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live and work. But doing business online means there's a whole lot of information that we don't want other people to see. That's where encry
If George Orwell's book "1984" creeped you out, you'll want to read the facts about the FBI's Operation Carnivore. It gave agents the permission and technology to access to the online and e-mail activities of suspected criminals.