MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
PC Magazine
March 16, 2004
Leon Erlanger
The Weakest Link Even the best-protected networks are vulnerable if employees unwittingly divulge sensitive information. mark for My Articles similar articles
Inc.
November 1, 2009
Michael Fitzgerald
Are Your Passwords Too Weak? Hacked passwords can compromise company data security. Strategies for creating the best passwords mark for My Articles similar articles
Registered Rep.
July 1, 2004
Alan Plummer
The Cutting Edge Whether you pay a professional to handle these tasks for you, or you choose to do them yourself, creating a secure office is essential for any advisor. mark for My Articles similar articles
PC World
April 2003
Anne Kandra
Consumer Watch: Manage Passwords Safely -- and Simply Plagued by a plethora of passwords? Here's how to deal with them without driving yourself nuts. mark for My Articles similar articles
PC World
April 2004
Scott Spanbauer
Lock Down Your PC Hackers. Spammers. Even rogue coworkers and employees. How can you keep the bad guys out and the good data in? Safeguard your system's perimeter with these 29 beyond-the-basics security steps. mark for My Articles similar articles
Entrepreneur
June 2010
Ericka Chickowski
Protect Your Small Business Against Cyber Attacks Cybercrime costs the economy more than $1 trillion per year, and crooks are increasingly setting their sights on small businesses. A look at the most destructive threats to your network - and what you need to do about them. mark for My Articles similar articles
PC World
May 2001
Kim Zetter
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... mark for My Articles similar articles
CIO
March 1, 2007
Allan Holmes
Bad Neighborhood Many mid-market enterprises say they have neither the time, money nor resources to spend on security. Which may be why the crooks are targeting them. mark for My Articles similar articles
Fast Company
Neal Ungerleider
Italian Surveillance Firm Called HackingTeam Gets Hacked An Italian company that sells sophisticated tools for spying on Internet users to the world's most repressive governments appears to have just been the target of a massive hacker attack mark for My Articles similar articles
Inc.
August 2008
Michael Fitzgerald
Help! Somebody Save Our Files! How to handle and prevent the most common data disasters. mark for My Articles similar articles
PC Magazine
April 18, 2007
Russell Morgan
Essential Security: Firewalls Businesses, like homes, must be locked up tight to keep out crooks. mark for My Articles similar articles
National Defense
May 2010
Stew Magnuson
Russian Cyberthief Case Illustrates Security Risks For U.S. Corporations While the federal government and Congress are making a push to toughen up the nation's defenses in cyberspace, most of the vulnerabilities that thieves and spies are exploiting through the Internet are in the private sector. mark for My Articles similar articles
Popular Mechanics
June 30, 2008
Glenn Derene
Inside NSA Red Team Secret Ops With Government's Top Hackers Highly skilled firewall-crackers help the government keep the bad guys out of the country's computer systems. mark for My Articles similar articles
CFO
November 17, 2003
Joseph C. Panettieri
Security It's a classic technology dilemma: businesses know they must protect their computers from devoted hackers and disgruntled employees, but how much is too much? More computers equals more vulnerability, and more spending. mark for My Articles similar articles
InternetNews
June 28, 2005
Tim Gray
UConn Finds Hacking Program in Server University of Connecticut officials say a server containing the personal data of many of its staff and students was compromised on at least one occasion. mark for My Articles similar articles
T.H.E. Journal
August 2001
Joyce Lambert
New Aspects of Test Security Have you ever considered the new ways in which your tests are vulnerable to unauthorized access if you store your test files on an office or home computer? mark for My Articles similar articles
CRM
May 2015
Leonard Klie
Data Security Should Be in Everyone's Job Description Protecting valuable customer information should begin in the contact center and end in the executive suite. mark for My Articles similar articles
Investment Advisor
October 2010
Dan Skiles
Four Security Best Practices That All Advisors Should Implement Common sense security will make your firm a tough target for hackers. mark for My Articles similar articles
PC World
December 2003
Andrew Brandt
Privacy Watch: A Latte, a Wi-Fi Link, and a Hacker That person sipping coffee at the next table could be hacking your log-in info as you type. mark for My Articles similar articles
CIO
November 15, 2000
Sarah D. Scalet
Remote Control If government departments that deal with national secrets have trouble tracking mobile devices, is there hope for your company? mark for My Articles similar articles
T.H.E. Journal
September 2003
Roger Del Russo
Securing Your Computer Network Your entire district could be brought to its knees by a hacker's assault, and the costs of reviving the network could be astronomical. While district administrators may have devised plans for securing the physical plant of the school, they rarely consider the vulnerability of their computer networks. mark for My Articles similar articles
PC Magazine
September 26, 2008
Corinne Iozzio
The 10 Most Mysterious Cyber Crimes The best criminal hacker is the one that isn't caught or even identified. These are 10 of the most infamous unsolved computer crimes (that we know about). mark for My Articles similar articles
The Motley Fool
July 23, 2009
Tim Beyers
This Mistake Could Ruin Your Financial Life Personal digital security has never been more important. mark for My Articles similar articles
Information Today
February 2001
Marshall Breeding
A Prescription for Computer Health We finished the year with little to no damage to our computer systems. Read on to learn more about how to develop a successful strategy for computing in an increasingly dangerous world... mark for My Articles similar articles
Information Today
May 2005
Phillip Britt
Protecting Private Information In addition to the separation of security duties, the culture of the company may be one of the most important aspects in protecting sensitive information. mark for My Articles similar articles
Entrepreneur
February 2008
Amanda C. Kooser
Data Saver Your most valuable business asset may also be your most intangible one: data. Everything from customer credit card numbers to employee records to pricing information needs protection. mark for My Articles similar articles
Entrepreneur
September 2002
Mike Hogan
Wreck-Ware P2P exposes you to attack from hackers looking to filch files. Here's how to avoid a swap-and-run. mark for My Articles similar articles
Information Today
February 4, 2013
Paula J. Hane
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. mark for My Articles similar articles
PC World
May 2001
Stan Miastkowski
Fortress PC Snoops, hackers, and viruses abound online. We identify all the tools you need to defend yourself against these hazards... mark for My Articles similar articles
CIO
January 1, 2002
Sarah D. Scalet
How to Not Recover from Getting Hacked (A Loser's Guide to Failure) A guide for what not to do when you get hacked. Take a moment to learn from the mistakes that others have made. mark for My Articles similar articles
PC Magazine
March 16, 2004
Leon Erlanger
Five Tricks Hackers Use on You 5 tricks to what out for that hackers use to access your system. mark for My Articles similar articles
Fast Company
Chris Gayomali
The Celeb Photo Leak: Is Using ICloud Safe? Right now, the safest way to send a salacious photo is to literally never take one. Security is still not a top priority for everyone from established Fortune 500 companies to new and trendy startups. It is an afterthought. mark for My Articles similar articles
PC World
September 1, 2000
Jeff Sengstack
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. mark for My Articles similar articles
National Defense
August 2012
Eric Beidel
Companies Rush to Tailor Products to New Cyber-Attacks The cybersecurity marketplace is flooded with products that tout the ability to keep networks and computers safe from intruders. mark for My Articles similar articles
eCFO
December 2000
Karen J. Bannan
Fear of the Black Hats Increasingly, companies are hiring hackers to test their network firewalls. This may not be such a good idea. mark for My Articles similar articles
BusinessWeek
August 22, 2005
Grow & Hamm
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. mark for My Articles similar articles
PC World
November 2003
Kandra & Brandt
The Great American Privacy Makeover An exclusive PC World survey reveals that even savvy Web users can do more to safeguard their privacy and data. Take the quiz and find out how vulnerable you are; then use our tips to improve your score. mark for My Articles similar articles
Technology Research News
August 10, 2005
Kimberly Patch
Plug-in Protects Passwords Researchers have created a browser plug-in, dubbed PwdHash, that produces a different password for each website you visit without requiring the you to remember more than a single password. mark for My Articles similar articles
The Motley Fool
June 18, 2011
Anders Bylund
How to Thwart Digital Thieves and Stay Safe Online You wouldn't give your keys to a stranger on the street, right? Then don't do it online. mark for My Articles similar articles
CFO
October 1, 2004
Russ Banham
The Enemy Within When it comes to combating worms, Trojan horses, and viruses, technology alone is not enough. Human error can undo almost any firewall or safeguard. Yet in some cases the fixes are remarkably simple. mark for My Articles similar articles
Inc.
September 15, 2000
David S. Bernstein
We've Been Hacked Not scared of losing your data to a corporate thief? You should be... mark for My Articles similar articles
New Architect
February 2003
Joseph C. Panettieri
Dangerous Dealings Reformed hackers want to lend a hand with your IT security strategy. mark for My Articles similar articles
InternetNews
February 4, 2010
Firewall Mishap Puts Iowa Workers' Data at Risk More than 80,000 people affiliated with the Hawkeye State's casino and racing industry were victimized by a cyber attack that most likely originated in China. mark for My Articles similar articles
PC World
August 3, 2002
Andrew Brandt
Reality Douses DefCon Camaraderie Nation's new security priorities put new risks, greater penalties on cybercrime. mark for My Articles similar articles
PC Magazine
February 1, 2006
Cade Metz
The Sorry State of Security Time to face facts: when it comes to our online safety woes, everybody is to blame. mark for My Articles similar articles
PC World
February 8, 2001
Cameron Crouch
Tips for Keeping a Leash on Your PDA's Data Built-in and third-party security tools can help protect your PDA, even if you let it out of your hands... mark for My Articles similar articles
InternetNews
December 30, 2009
Twitter Blacklists 370 Shoddy Passwords To protect its users from themselves, Twitter is preventing new users from selecting some common or easily hacked passwords for their accounts. mark for My Articles similar articles
PC World
April 10, 2001
Hacking's History From phone phreaks to Web attacks, hacking has been a part of computing for 40 years... mark for My Articles similar articles