April 1, 1996 |
Shakespeare wrote, in Othello: "Who steals my purse steals trash. . . . But he that filches from me my good name robs me of that which not enriches him, and makes me poor indeed." In cyberspace, it's getting harder to hang onto one's good name. Phil Agre, a professor of communications at UC San Diego, manages an Internet listserv, or subscription e-mail service, called Red Rock Eaters.
May 30, 2011
Egged on by French President Nicolas Sarkozy, the leaders of the Group of 8 nations announced Friday that the Internet was too important for governments to leave ungoverned. Cyberspace needs a legal framework that promotes human rights, the rule of law, privacy, security and the protection of intellectual property, they declared, and they pledged to work on one. Good luck with that. The declaration reflects the wrongheaded wish of many foreign leaders to tame the Net, particularly freewheeling Web-based businesses and online speech.
April 28, 1996 |
Anne works at a university in Scotland. Brooke, in Los Angeles, is preparing to attend law school this fall. The two have never met face to face, but in some ways they are closer than sisters. Rape, and the filthy feeling it inflicted on them, has been their bond, the Internet their refuge. "We talk daily, Monday through Friday," Brooke says. "We are working it out together on a friend-friend basis."
CALIFORNIA | LOCAL
July 8, 1997
So the Supreme Court says it's OK to inundate kiddie cyberspace with porn--and the Los Angeles Police Department brass denies the vice squad the privilege of ogling pinups (July 2). Said brass, if it has nothing better to do, should be promoted to three-wheelers to paper felonious criminals whose parking meters have expired. ANTHONY J. BRADISSE Los Angeles
October 23, 2011 |
Earlier this month, researchers discovered a cunning strain of malware, dubbed the Lurid Downloader, that has been systematically and silently stealing data from carefully targeted government computers in 61 countries. The discovery was made by Trend Micro, a Tokyo-based computer security company, which identified the invader as a version of a well-known strain of malware that exploits vulnerabilities in the popular programs Adobe Reader and Microsoft Office. It inserts itself into a computer's core, and then phones home to a remote operator who moves continually from domain to domain on the Internet to avoid detection.
October 23, 2013 |
Live by the tweet, die by the Twitter sword. That's Jofi Joseph's fate. But he's not the first - and he certainly won't be the last - to perish from the wounds of 140-character cuts. Joseph, most recently a director in the nonproliferation section of the White House's national security staff, was fired after being unmasked as the lamebrain behind the Twitter handle @natsecwonk. And just what irked his bosses? Perhaps tweets like this one, saved by the website the Daily Beast, which smartly anticipated writing the tweeter's Twitter obit someday: “I'm a fan of Obama, but his continuing reliance and dependence upon a vacuous cipher like Valerie Jarrett concerns me.” “Was Huma Abedin wearing beer goggles the night she met Anthony Wiener?