MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Home Theater
April 1, 2010
Mark Fleischmann
Smart Meters Maybe Not So Smart Security holes may let hackers steal your juice. mark for My Articles similar articles
InternetNews
February 5, 2010
SQL Injections Led to 60% of UK Data Breaches Malicious hackers are relying on growing numbers of increasingly complex SQL attacks to get at companies' data. mark for My Articles similar articles
InternetNews
July 26, 2010
Microsoft Updates Bug Reporting Process Extending an olive branch to security researchers, Microsoft says it will provide new mechanisms to make it easier to report vulnerabilities. mark for My Articles similar articles
Real Estate Portfolio
Mar/Apr 2002
Scott Laliberte
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... mark for My Articles similar articles
Bank Systems & Technology
September 15, 2007
Sharon Gaudin
Number Of Hackers Attacking Banks Jumps 81% Hackers no longer need to be technical wizards to set up an operation to steal people's banking information and then rob their accounts. mark for My Articles similar articles
InternetNews
September 21, 2010
Microsoft Rushes to Fix Windows Server Flaw Researchers discover a hole in Microsoft's implementation of the Advanced Encryption Standard. mark for My Articles similar articles
InternetNews
January 14, 2010
McAfee Fingers Microsoft IE Flaw in Google Attack McAfee's researchers say 'Operation Aurora' used a zero-day vulnerability in Microsoft's browser software to penetrate Google's networks. mark for My Articles similar articles
PC World
May 2001
Kim Zetter
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... mark for My Articles similar articles
BusinessWeek
November 19, 2009
Aaron Ricadela
Can Adobe Beat Back the Hackers? As its software becomes a major means of attack, security experts wonder if it can fight hard enough mark for My Articles similar articles
Registered Rep.
May 24, 2011
Lauren Barack
Cyber-Hackers: Faster, Better Equipped Than You Security should be the responsibility of all employees - not just the chief technology officer, or the principal of an advisory firm. mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
InternetNews
April 20, 2010
Hackers Breached Google's Password Hub: Report New report cites source close to investigation claiming that hackers in China were able to compromise the password service that acts as gateway to Google's Web products and services. mark for My Articles similar articles
InternetNews
November 16, 2006
Sean Michael Kerner
Automated Patching Helping Zero-Day Exploits Latest SANS Institute top 20 list puts IE and Office squarely in hackers cross hairs. Are efforts to protect them fueling the rise? mark for My Articles similar articles
Inc.
March 2007
What We're Worrying About These days, computer security threats are coming from all directions. Here's what is keeping entrepreneurs up at night, according to a recent survey by the research firm Forrester. mark for My Articles similar articles
BusinessWeek
August 22, 2005
Grow & Hamm
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. mark for My Articles similar articles
Salon.com
October 27, 2000
Andrew Leonard
Who cracked Microsoft? Many free-software hackers make no attempt to hide their hatred of Bill Gates -- could they be the culprits? mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
InternetNews
December 28, 2010
Security 2010: The Year in Review Stuxnet, embarrassing data leaks and sophisticated phishing attacks dominated the data security landscape in 2010. mark for My Articles similar articles
Fast Company
December 2000
Astrid Sandoval
VP of Hacker Relations Job Titles of the Future: Even in the free-for-all world of open-source software, you've got to have some order -- and some orderlies, people who serve as intermediaries between the programmers (otherwise known as hackers) and the companies that use their software... mark for My Articles similar articles
InternetNews
February 25, 2010
Malware Thrives Despite Improved Security: IBM Security researchers at IBM's X-Force find 6,601 new software vulnerabilities in 2009, down 11 percent from last, but that hasn't stopped hackers and phishers from finding new ways to rip off consumers. mark for My Articles similar articles
Macworld
June 2001
Mel Beckman
Who's There Firewall Advisor 1.0 Firewall-log analyzer watches your back... mark for My Articles similar articles
Fast Company
Neal Ungerleider
95% Of Android Phones Could Be Hacked With Just One Text Android users, beware: Security researchers have discovered that 95% of Android phones are vulnerable to attack through the dispatch of just one text message. mark for My Articles similar articles
National Defense
August 2012
Eric Beidel
Companies Rush to Tailor Products to New Cyber-Attacks The cybersecurity marketplace is flooded with products that tout the ability to keep networks and computers safe from intruders. mark for My Articles similar articles
InternetNews
March 30, 2010
Microsoft Says IE's Defenses Not Unbeatable Microsoft touts 'defense in depth' as an effective deterrent after a white hat hacker last week demonstrated a complete takeover of Windows 7 running Internet Explorer 8. mark for My Articles similar articles
PC World
November 2004
Harry McCracken
Is This Any Way to Fix Security Holes? How today's software patching process actually helps hackers do their job. mark for My Articles similar articles
InternetNews
April 2, 2007
Michael Hickins
Game On: Microsoft to Issue Emergency Patch Microsoft is issuing the patch in advance of its usual Patch Tuesday schedule to counter role-play game hackers. mark for My Articles similar articles
InternetNews
July 7, 2010
Hackers Snipe Back in Microsoft Security Row Bruised by Microsoft's criticism dismissing the work of third-party security researchers, a band of hackers has begun a campaign to publish proof-of-concept vulnerabilities in the software giant's products. mark for My Articles similar articles
BusinessWeek
August 13, 2009
Joel Schectman
Computer Hacking Made Easy Botnet attacks like the one that took down Twitter are becoming so easy and cheap, almost anyone can do it. mark for My Articles similar articles
InternetNews
February 24, 2010
Cyber Attacks Hit 75% of Enterprises in 2009 Symantec's latest report has more unsettling news for IT security administrators. mark for My Articles similar articles
PC Magazine
September 26, 2008
Corinne Iozzio
The 10 Most Mysterious Cyber Crimes The best criminal hacker is the one that isn't caught or even identified. These are 10 of the most infamous unsolved computer crimes (that we know about). mark for My Articles similar articles
PC World
August 3, 2002
Andrew Brandt
Reality Douses DefCon Camaraderie Nation's new security priorities put new risks, greater penalties on cybercrime. mark for My Articles similar articles
InternetNews
August 6, 2010
Adobe Hurries Patch for PDF Security Flaw The vulnerability in Adobe Reader could give hackers control of a user's computer. mark for My Articles similar articles
InternetNews
December 13, 2010
Data Breach Exposes Wisconsin Students' Data The University of Wisconsin became the latest U.S. college to endure a major data breach this year, putting the personal information of 60,000-plus former students and staff members at risk. mark for My Articles similar articles
InternetNews
October 13, 2010
Latest Scheme Could Unravel Online Identity In an alarming new study, researchers outline the sophisticated new ways that hackers could use pattern analysis and stealth observation to create "rick identity profiles." mark for My Articles similar articles
The Motley Fool
June 27, 2011
Tim Beyers
Your Tech Portfolio Has Been Hacked! And that's a good thing. Has the world turned upside down? Hackers who've made headlines for torturing tech companies are turning to honest work. mark for My Articles similar articles
Salon.com
February 6, 2001
Andrew Leonard
Hunting the wild hacker Work should be play, says a new book that sets forth the emerging ethical code of free-software programmers... mark for My Articles similar articles
InternetNews
March 21, 2005
Tim Gray
California University Computer System Hacked Attackers gain access to private student data. mark for My Articles similar articles
BusinessWeek
February 25, 2010
Breaching the Walls Dealing with cyber-attacks costs companies and governments billions of dollars a year and threatens national and economic security. Here are some recent incidents. mark for My Articles similar articles
InternetNews
April 8, 2010
Massive Cyber Spy Ring Seen Operating in China New report details the activities of the "Shadow network," a sophisticated group of cyber criminals traced back to China, prompting denial from a state official. mark for My Articles similar articles
Fast Company
Daniel Terdiman
AP Report: U.S. Power Grid Subject To Repeated Foreign Hacks The U.S. power grid is subject to being hacked from abroad, and foreign hackers have gained remote access to American power operations about a dozen times over the last decade. mark for My Articles similar articles
The Motley Fool
January 6, 2010
Tim Beyers
Adobe: Now More Popular Than Microsoft Adobe's technologies could become as much a target for hackers as Microsoft's Office suite, BusinessWeek reports. mark for My Articles similar articles
InternetNews
March 25, 2010
Symantec: China Is Tops in Targeted Malware Symantec's latest report pinpoints China as the leading source of malware tailored to hoodwink execs in specific industries. mark for My Articles similar articles
National Defense
March 2015
Stew Magnuson
Researchers Uncover New Vulnerability For Computers Used in Public Places Security experts are discovering computers and smartphones being used in public places are vulnerable to hackers even if they are not connected to the Internet. mark for My Articles similar articles
InternetNews
February 4, 2010
Firewall Mishap Puts Iowa Workers' Data at Risk More than 80,000 people affiliated with the Hawkeye State's casino and racing industry were victimized by a cyber attack that most likely originated in China. mark for My Articles similar articles
CRM
October 1, 2005
Marshall Lager
The Hot Skinny on Hackers What do they know, and how do they find out? A recent "hackers convention" revealed some of their secrets. mark for My Articles similar articles
Bank Technology News
April 2001
Maria Bruno
Hackers Steal 1 Million Card Numbers Teams of Russian and Ukrainian hackers stole more than 1 million credit card numbers from 40 American e-businesses in recent months, according to the Federal Bureau of Investigation... mark for My Articles similar articles
InternetNews
May 18, 2010
Microsoft Talks Up Modeling Advancements Company pushes new technical computing initiative aimed at making modeling easier for engineers, analysts and researchers. mark for My Articles similar articles
InternetNews
October 6, 2006
Ed Sutherland
Microsoft Plans Nearly Dozen Patches Critical vulnerabilities in Microsoft's Windows operating system and the widely-used Office application suite are part of 11 patches slated to be released next week, according to a Microsoft. mark for My Articles similar articles
T.H.E. Journal
February 2009
John K. Waters
IT Security: Target: The Web No longer focused on the network, hackers have a bull's eye now trained squarely on web-based applications. What, if anything, can school districts do to thwart them? mark for My Articles similar articles
InternetNews
January 15, 2009
Richard Adhikari
Hackers to Take Aim at the Cloud, Virtualization Malware authors and hackers are looking to take advantage of the newest developments in enterprise technology. mark for My Articles similar articles