MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
IEEE Spectrum
November 2005
Lauren Aaronson
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. mark for My Articles similar articles
InternetNews
February 26, 2004
Sean Michael Kerner
Worms Continue to Wriggle, Wreak Havoc 'Zero-day' exploits and new styles of viruses send security firms scrambling to patch the latest holes in the network. mark for My Articles similar articles
InternetNews
January 24, 2006
Sean Michael Kerner
IBM: Users Are The Weak Link in Security IBM is warning in a new report that, though widespread virus outbreaks are on the decline, on the whole online attacks are expected to rise in 2006. The culprit? Highly targeted attacks that rely on naive users to help perpetrate cybercrimes. mark for My Articles similar articles
Popular Mechanics
April 17, 2008
Joe Pappalardo
Hack Attack on Tibet Groups Could Hint at China's Anti-U.S. Tactic As Buddhist monks in exile mourn fellow Tibetans killed in the recent conflict with China, U.S.-based nonprofit organizations are facing spam attacks, fake smear campaigns and other threats to digital privacy. mark for My Articles similar articles
InternetNews
January 9, 2004
Sean Michael Kerner
Fake Microsoft Service Pack is Xombe Trojan Another day, another virus. Unsuspecting Internet users were greeted Friday with an e-mail message purportedly from [email protected] to update their computers. Problem is, the message isn't from Microsoft and the patch is actually a back door Trojan. mark for My Articles similar articles
InternetNews
January 16, 2008
Andy Patrizio
A Particularly Nasty Week For Malware From Excel to the revitalized Storm worm to a severe banking Trojan, it's enough to make you nostalgic for the days of BBSes. mark for My Articles similar articles
InternetNews
September 22, 2005
David Needle
Beware, Bagle is Back Several anti-virus security sites have issued warnings that a variant of the infamous Bagle worm has shown up on the Internet, spreading via e-mails... Symantec agrees to acquire WholeSecurity... mark for My Articles similar articles
InternetNews
February 15, 2007
Andy Patrizio
Another Week, Another MS Word Exploit Emerges Microsoft is investigating new public reports of "very limited, targeted attacks" against Microsoft Word. mark for My Articles similar articles
InternetNews
July 27, 2004
Jim Wagner
More Gloom from MyDoom Virus The latest version of the virus is a vehicle for another Trojan horse, which attacks Microsoft.com... Symantec releases a removal tool. mark for My Articles similar articles
InternetNews
May 28, 2009
Alex Goldman
Flood of Fake Western Union E-mails Hide Trojan An influx of malware-laden spam, which started two weeks ago, continues today as hackers seek credit card and banking information. mark for My Articles similar articles
InternetNews
March 1, 2005
Jim Wagner
Fresh Bagle Attacks Under Way A wave of Bagle variants is slipping past anti-virus software and into computers. mark for My Articles similar articles
InternetNews
February 25, 2005
Sean Michael Kerner
Phishing Attacks Jump 42 Percent An anti-phishing group says scam e-mails that seek users' personal information increased sharply last month. The types of attacks are also expanding. The United States had the most phishing sites, with China and South Korea placing second and third, respectively. mark for My Articles similar articles
InternetNews
April 22, 2004
Sean Michael Kerner
Who's Taking the Bait: 'Phishing' Skyrockets Online security groups say the scamming technique used for identity theft is proliferating as fast as viruses, with attacks up over a thousand percent since September. mark for My Articles similar articles
PC Magazine
April 5, 2006
Robert Lemos
This Man Has a Virus Security software can do little about the most dangerous delivery mechanism of all: the user. mark for My Articles similar articles
PC Magazine
October 1, 2004
Neil J. Rubenking
Personal Firewall--Don't Surf Without It To gauge the effectiveness of two popular firewall packages, we took the gloves off and attacked the firewall process using techniques available to a malicious program. McAfee Personal Firewall Plus 6.0... Norton Personal Firewall 2005... mark for My Articles similar articles
InternetNews
October 31, 2005
Jim Wagner
Alert Sounds Alarm From Within Security vendor Alert Logic has launched a hosted subscription service that protects enterprise networks from internal attacks. mark for My Articles similar articles
InternetNews
May 25, 2005
Tim Gray
'Star Wars' Flavor Trojan Targets IM The new instant messaging threat is after Yahoo IM users. mark for My Articles similar articles
Information Today
February 2001
Marshall Breeding
A Prescription for Computer Health We finished the year with little to no damage to our computer systems. Read on to learn more about how to develop a successful strategy for computing in an increasingly dangerous world... mark for My Articles similar articles
PC World
August 5, 2002
Kim Zetter
Trojan Horse Technology Exploits IE Researchers show a tool that could admit hackers by pretending to be a trusted Microsoft application. mark for My Articles similar articles
PC World
September 1, 2000
Jeff Sengstack
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. mark for My Articles similar articles
T.H.E. Journal
December 2002
Vincent Weafer
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous. mark for My Articles similar articles
InternetNews
February 24, 2009
Richard Adhikari
Hackers Pounce on Excel Vulnerability Hackers have launched a new attack that uses a previously undiscovered flaw in Microsoft Excel to target business executives and government agencies. mark for My Articles similar articles
InternetNews
March 11, 2008
David Needle
Microsoft Targets Office Remote Execution Flaws Latest "Patch Tuesday" updates aim to shut the door on a slew of critical Office suite vulnerabilities. mark for My Articles similar articles
InternetNews
August 6, 2004
Roy Mark
Trojan Horse Charges PDAs First known backdoor attack on handhelds probably written by Russian virus coder. mark for My Articles similar articles
InternetNews
July 14, 2004
Ryan Naraine
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues. mark for My Articles similar articles
InternetNews
December 30, 2004
Tim Gray
Trojan Threatens XP Flaw may leave Windows XP vulnerable to attack. mark for My Articles similar articles
InternetNews
April 28, 2004
Ryan Naraine
Blaster Redux? SSL Worm Threat Rising Security experts have spotted the first signs of a Blaster-like worm circulating underground, prompting fears that major Internet disruptions could be less than a week away. mark for My Articles similar articles
InternetNews
July 28, 2004
Ryan Naraine
Microsoft: Out-of-Cycle Security Patch Coming Due out next week, the patch will fix a software flaw that led to the Download.Ject malware attack. mark for My Articles similar articles
InternetNews
June 10, 2005
Tim Gray
Trojan Spreads in Michael Jackson Spotlight British anti-virus firm Sophos says hackers are slamming computers around the world with a Trojan virus by sending e-mails claiming Michael Jackson has tried to kill himself. mark for My Articles similar articles
InternetNews
May 22, 2006
Ed Sutherland
Word Attack Hails From China Security researchers warn Microsoft Word zero-day exploit is aimed at government e-mail systems. mark for My Articles similar articles
InternetNews
March 8, 2010
CERT Warns of Energizer DUO Trojan U.S. Computer Emergency Readiness Team issues warning that software associated with Energizer DUO USB battery charger contains a Trojan that makes users' PC susceptible to hackers. mark for My Articles similar articles
PC World
December 11, 2000
Sean Captain
Security Crusader Punches Holes in Firewalls Gibson's simple Trojan horse tricks firewalls from McAfee.com, Symantec, Sygate, and more... mark for My Articles similar articles
PC Magazine
November 29, 2006
Robert Lemos
Hacking for Dollars Viruses and worms are so last-decade. Today's PC users have to worry more about online burglary than stolen bandwidth. mark for My Articles similar articles
InternetNews
August 26, 2004
Ryan Naraine
How Not to Get 'Phished' The FTC releases a helpful guide to avoid the lure of phishers, who attempt to steal your identity online. mark for My Articles similar articles
InternetNews
January 10, 2008
Andy Patrizio
First iPhone Malware Found The US Computer Emergency Response Team has issued a warning that a fraudulent iPhone upgrade is making its way around the Internet and users should not be fooled into installing it. mark for My Articles similar articles
InternetNews
April 1, 2004
Sharon Gaudin
Study: Virus Attacks Up But Infections Hold Steady Last year more -- and more dangerous -- viruses raced across the Internet than ever, according to a new study. But there was a glimmer of good news. mark for My Articles similar articles
InternetNews
September 7, 2006
Ed Sutherland
Microsoft Investigates Word 2000 Trojan Microsoft said it has launched an investigation into reports of a new Trojan horse targeting Word 2000. mark for My Articles similar articles
PC Magazine
October 5, 2004
Sheryl Canter
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. mark for My Articles similar articles
Bank Systems & Technology
July 5, 2004
Peggy Bresnick Kendler
Virus Vigilance A virus can grind a bank's operations to a halt and expose billions of dollars. To really safeguard their systems, banks must implement strict security policies - and communicate them to employees and technology partners. mark for My Articles similar articles
T.H.E. Journal
April 2004
Judith Rajala
Computer Virus Protection Simply having virus protection software on your institution's computer system doesn't guarantee safety and security. Instead, protection and prevention is a team effort between the users and the anti-virus software. Includes a list of useful websites. mark for My Articles similar articles
InternetNews
March 31, 2005
Tim Gray
Symantec Fixes Security Holes The firm releases fixes for two vulnerabilities found in its anti-virus products. mark for My Articles similar articles
InternetNews
April 13, 2004
Sharon Gaudin
Browser-based Attacks 'Surging' Virulent viruses and worms aren't the only things to watch out for. Security analysts say browser-based attacks are escalating in frequency and damage. And now a new study backs up the warnings. mark for My Articles similar articles
InternetNews
January 14, 2004
Sharon Gaudin
Last Year's Security Problems May Balloon in 2004 If 2003 was the worst year in history for viruses and spam, hold onto your hat. This year, according to security experts, is setting up to see the malicious problems that appeared last year grow and fester into major security problems for 2004. mark for My Articles similar articles
PC Magazine
March 6, 2007
No Peeking at Suspect E-Mail Don't peek at the pictures in spam e-mails. If you look, you're potentially giving personal information to the sender and, of course, inviting more spam. mark for My Articles similar articles
InternetNews
March 19, 2004
Ryan Naraine
It is Time for Some 'Friendly' Worms Let's face it folks, the virus writers have the upper hand these days. Is it time for the industry to be bold and imaginative about fighting back? mark for My Articles similar articles
PC Magazine
June 5, 2008
Malware Everywhere Malicious software attacks, including Trojan horses, bots, and rootkits, are rising at the fastest rate ever. mark for My Articles similar articles
InternetNews
September 17, 2007
Andy Patrizio
Have We Reached The End Of The Virus? Not quite. The old-fashioned virus infestation is fading as the biggest nuisance for computer users in favor of Trojans, Symantec's new malware study finds. mark for My Articles similar articles
InternetNews
June 13, 2005
Tim Gray
New Trojan Pretends to be Antivirus Software Anti-virus maker F-Secure warned mobile phone users about a slippery new trojan disguising itself as an antivirus application. mark for My Articles similar articles
InternetNews
May 28, 2009
Alex Goldman
Small Businesses Under Siege by Spammers Real-world data compiled shows that money scams are growing as the recession continues - and small firms aren't exempt. mark for My Articles similar articles
InternetNews
April 23, 2004
Ryan Naraine
'Osama Captured' e-Mail is Malicious Trojan The 'Osama Bin Laden Captured' e-mail hammering your in-box today will attempt to download a Trojan if the embedded URL is clicked. mark for My Articles similar articles