The click-wrap conundrum

Tuesday, 25 October 2005, 8:05 AM EST

Suppose you are setting up a website to deliver the latest software, product, or service. Before the site goes live, you go to your lawyer (of course you do, don't you?) who reviews your online privacy policy, your online security policy, and your policy regarding collecting information from or about children. Your lawyer reviews the site overall for anything that might be considered or interpreted a fraudulent or deceptive practice. Of course, if it were up to lawyers, the only content on the Internet would be in the form of disclaimers.

By Mark Rasch at SecurityFocus.

[ Read more ]




Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //