MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
April 5, 2004
Sharon Gaudin
Plan to Counterattack Hackers Draws More Fire Now that Symbiot, Inc. has released information on its plans to enable companies to counterattack digital threats, some security analysts have stepped up their concerns that it could cause more problems than it solves. mark for My Articles similar articles
InternetNews
January 14, 2004
Sharon Gaudin
Last Year's Security Problems May Balloon in 2004 If 2003 was the worst year in history for viruses and spam, hold onto your hat. This year, according to security experts, is setting up to see the malicious problems that appeared last year grow and fester into major security problems for 2004. mark for My Articles similar articles
InternetNews
May 26, 2006
Tim Scannell
Jamie de Guerre, Director, Partner Programs, Cloudmark Spam isn't going anywhere, and Jamie de Guerre's company is tracking its trails through our inboxes. mark for My Articles similar articles
InternetNews
December 23, 2003
Sharon Gaudin
2003 'Worst Year Ever' for Viruses, Worms In no other year have computer viruses and worms wreaked so much havoc and caused so much damage as in this past year, according to security analysts. mark for My Articles similar articles
InternetNews
March 18, 2004
Colin C. Haley
ISP Gets Tough With 'Zombie' Customers Comcast pushes its broadband customers with virus-infested spam zombies to clean up their act -- or else. mark for My Articles similar articles
The Motley Fool
June 13, 2011
Arunava De
Are Hackers the Next Threat to Your Portfolio? Before you respond to a malicious attack on one of your investments in your portfolios, measure the impact that such an attack can have on the company. mark for My Articles similar articles
InternetNews
July 8, 2009
Alex Goldman
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
The Motley Fool
July 13, 2009
Rich Smith
Welcome! You've Got Hackers! Someone threw a cyber war this week. It's great to know that the government is spending billions hardening the IT system against more competent attackers, but what we really need here is a solution to the real problem: Identifying who the attackers are. mark for My Articles similar articles
InternetNews
August 10, 2009
Cyberattacks' Aftershocks Hit the Web Twitter and Facebook have since bounced back from the the spam and the denial-of-service storm that hit them late last week, but the aftereffects continue to be felt across the Internet. mark for My Articles similar articles
InternetNews
December 3, 2004
Tim Gray
Lycos Europe Pulls Spam-Fighting Screensaver Earlier this week, Lycos Europe launched an aggressive campaign targeting spam-related Web sites. The UK-based company took the offensive when it released a "screensaver that spams the spammers." mark for My Articles similar articles
CIO
November 1, 2005
Matt Villano
Seeing No Evil CIOs are growing increasingly frustrated at the laissez-faire attitude of many ISPs toward security. Is it time to consider regulating the ISP industry? mark for My Articles similar articles
CIO
July 15, 2005
Grant Gross
To Stop Hacker Attacks, Don't Rely on ISPs In a mock trail, a jury of IT security professionals decided that it should be an owner's responsibility, not an ISPs, to protect against viruses and worms. mark for My Articles similar articles
PC Magazine
December 9, 2003
Leon Erlanger
Top Five Myths About Safe Surfing Don't let a false sense of security put you in danger. mark for My Articles similar articles
BusinessWeek
August 13, 2009
Joel Schectman
Computer Hacking Made Easy Botnet attacks like the one that took down Twitter are becoming so easy and cheap, almost anyone can do it. mark for My Articles similar articles
InternetNews
August 7, 2009
Facebook, Twitter Attacks Aimed for One User An anti-Russian blogger with profiles on a number of sites may have been the intended target of yesterday's attack. mark for My Articles similar articles
CIO
February 15, 2004
John Edwards
E-Mail Alert! Companies discuss taking a centralized approach to e-mail threat management. mark for My Articles similar articles
InternetNews
August 6, 2009
Twitter, Facebook Hit in Denial-of-Service Attacks Social media phenoms Twitter and Facebook this morning suffered bouts of downtime - with each blaming a denial-of-service (DDoS) attack for its woes. mark for My Articles similar articles
InternetNews
August 6, 2009
Twitter Goes Down in Denial-of-Service Attack Microblogging service Twitter this morning suffered downtime due to what company officials described as a denial-of-service attack. mark for My Articles similar articles
T.H.E. Journal
December 2002
Vincent Weafer
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous. mark for My Articles similar articles
InternetNews
January 29, 2004
Zachary Rodgers
'MyDoom' Variant Blocking Ad Servers Virus could result in under-delivery of online campaigns. mark for My Articles similar articles
Science News
April 25, 2009
Science Past From The Issue Of April 25, 1959 There appears to be a strong link between the behavior of a man with regard to his business and social activities and his chances of being a victim of a heart attack. mark for My Articles similar articles