MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC Magazine
June 21, 2006
Outsmarting Keyloggers How to protect passwords and personal information in public cybercafes. mark for My Articles similar articles
PC World
September 2004
Andrew Brandt
Privacy Watch: Two Passwords Double Your Privacy 'Two-factor authentication' is the computer equivalent of the security provided by a safety deposit box: Neither you nor the bank alone can open the box; both parties need to use their keys at the same time. mark for My Articles similar articles
PC Magazine
June 15, 2007
Neil J. Rubenking
GuardedID 1.02 GuardedID manages the connection between your keyboard and browser and leaves key-loggers out in the cold. mark for My Articles similar articles
InternetNews
April 27, 2010
Passwords Should Be Last Line of Defense Longer passwords with numbers and capitalizations may make life a bit more difficult for identity thieves, but the truth is the relative strength or weakness of users' passwords should be beside the point. mark for My Articles similar articles
PC World
August 2006
Andrew Brandt
The 10 Biggest Security Risks You Don't Know About Hackers, scammers, and identity thieves are constantly coming up with new ways to attack your PC and your privacy. Here are the newest perils and how to foil them. mark for My Articles similar articles
InternetNews
September 30, 2005
Tim Gray
Phishers Use Photos for Catch A phishing scam is hooking Yahoo users by stealing their user names and passwords when they log into what looks like an area of the Yahoo site, according to a security firm. mark for My Articles similar articles
BusinessWeek
March 14, 2005
Stephen H. Wildstrom
New Weapons To Stop Identity Thieves That may explain why phishing incidents continue to proliferate despite the concerted efforts of software publishers to make it harder. And it is why the time has come to attack the problem at its root: the inadequacy of passwords. mark for My Articles similar articles
PC World
April 2004
Scott Spanbauer
Fight Back Against Surveillance Software Detect and disable keyloggers; reject e-mail return receipts; and use hardware and software firewalls. mark for My Articles similar articles
InternetNews
December 23, 2004
Brian Livingston
Protect Your Passwords -- Part 2 USB keys may free us from having to remember passwords at all. mark for My Articles similar articles
BusinessWeek
May 30, 2005
Mara Der Hovanesian
Hackers And Phishers And Frauds, Oh My! How consumers can protect themselves against cybercrime. mark for My Articles similar articles
PC Magazine
June 28, 2007
Neil J. Rubenking
Spy Sweeper 5.5 with Antivirus Spy Sweeper pulls ahead in the hotly contested race to crush every piece of spyware that makes its way onto your PC. mark for My Articles similar articles
PC World
August 2004
Jeff Bertolucci
Products for the Paranoid Fingerprint scanners, security keys, encryption software: Which tools should you use to keep sensitive data from prying eyes? mark for My Articles similar articles
PC World
February 2005
Lincoln Spector
Has Someone Made Off With My Online Identity? How to tell if you're the victim of online identity theft... Use the free Password Safe utility to manage your passwords... Add text of your choice to the taskbar... mark for My Articles similar articles
PC Magazine
December 30, 2010
Neil J. Rubenking
Kaspersky Password Manager 4 Kaspersky Password Manager automatically secures and retrieves your Web site and application passwords and fills Web forms with personal data. It can even generate a USB-based portable edition for travel. mark for My Articles similar articles
PC Magazine
April 19, 2006
Robert Lemos
Password Policies A simple password could be the weak link that leaves your data open to attack. mark for My Articles similar articles
PC Magazine
July 17, 2006
Neil J. Rubenking
Spy Sweeper 5.0 True to its title, Spy Sweeper 5 sweeps away spyware. With new features increasing protection against keyloggers and rootkits, Spy Sweeper remains a favorite for protection from spyware. mark for My Articles similar articles
PC World
June 2002
Andrew Brandt
Privacy Watch: Don't Let Anyone Secretly Track Your Keystrokes Three tips to keep snoops from maintaining logs of your keyboard input... mark for My Articles similar articles
PC Magazine
February 8, 2007
Matthew D. Sarrel
Access Smart Power LogOn Password Manager-USB Card Reader The Access Smart Power LogOn Password Manager bundle will make log-in security relatively pain-free once the interface improves. mark for My Articles similar articles
InternetNews
February 2, 2010
Twitter Responds to Phishing Attack Twitter's popularity has once again made it the target of the bad guys. mark for My Articles similar articles
Investment Advisor
June 2008
Irace & Mehta
Security in a New Age How to protect your firm from 21st century online criminals mark for My Articles similar articles
National Defense
December 2010
Eric Beidel
Cybersecurity Threatened By Common Password Buster GTRI researchers have proven that an inexpensive graphics processing unit (GPU) can bust passwords at the speed of a $100 million supercomputer. mark for My Articles similar articles
PC World
January 24, 2007
Scott Spanbauer
Thwart the Three Biggest Internet Threats of 2007 Protect yourself against the three gravest Web dangers: Internet Explorer, phishing attacks, and malware. mark for My Articles similar articles
AskMen.com
March 12, 2003
Steve Richer
How To: Avoid Identity Theft Criminals steal identities to commit all kinds of fraud and hide the misdeeds they commit. In 2001, there were more than 86,000 victims of this crime in the United States; that figure almost doubled to 162,000 in 2002. Read on to learn how to avoid being the next victim. mark for My Articles similar articles
Popular Mechanics
February 2006
Brian Krebs
It's 10 PM. Do You Know Where Your Identity Is? Global identity thieves may know their way around your computer better than you do. Learn how to protect yourself in the scary new world of zombies, RATs, Trojan horses and evil twins. mark for My Articles similar articles
PC Magazine
November 2, 2006
Neil J. Rubenking
Spy Sweeper 5.2 with Antivirus One of the best antispyware products out there adds a version with virus protection. mark for My Articles similar articles
Bank Systems & Technology
October 28, 2004
Ivan Schneider
No Static at All One-time passwords mitigate online banking security risks. mark for My Articles similar articles
U.S. Banker
February 2005
Michael Sisk
A Phish Story Phishing attacks (in which thieves send mass e-mails supposedly from reputable businesses) are expected to more than double in 2005, and are spreading to small banks. mark for My Articles similar articles
The Motley Fool
June 18, 2011
Anders Bylund
How to Thwart Digital Thieves and Stay Safe Online You wouldn't give your keys to a stranger on the street, right? Then don't do it online. mark for My Articles similar articles
PC World
February 26, 2007
Robert McMillan
Phishing Sites Explode on the Web Online criminals are thriving even in the face of new automated defenses. mark for My Articles similar articles
PC Magazine
November 2, 2004
Neil J. Rubenking
Revealing Passwords The passwords saved on your computer are more vulnerable than you think. mark for My Articles similar articles
InternetNews
October 1, 2009
Internet Never More Dangerous: Study Report finds a 585 percent spike in fake anti-malware and security software programs in the first half of 2009. mark for My Articles similar articles
BusinessWeek
March 26, 2009
Security Smarts Privacy on the Web is never perfect, but a few simple precautions will go a long way mark for My Articles similar articles
Wall Street & Technology
July 28, 2004
Jim Middlemiss
Gone Phishing In the latest identity-theft scam, fraudulent e-mails trick individuals into coughing up passwords to 'secure' financial data. mark for My Articles similar articles
PC Magazine
November 2, 2005
Michael J. Steinhart
Maximum Security: 94 Essential Tips for Staying Safe Dozens of our best security tips and pointers, broken down by category: system, networking and wireless, e-mail, Web surfing, malware, and mobile. mark for My Articles similar articles
PC Magazine
November 29, 2006
Robert Lemos
Hacking for Dollars Viruses and worms are so last-decade. Today's PC users have to worry more about online burglary than stolen bandwidth. mark for My Articles similar articles
PC World
December 2004
Bob Tedeschi
Protect Your Identity Phishers and other online thieves are targeting your money and personal data--and they're getting sneakier. Here's how to defend yourself, and how to erase the damage if you get scammed. mark for My Articles similar articles
PC World
January 2006
Steve Bass
Hassle-Free PC: Notebook Thieves? Bring Them On! Stop computer kleptos with these seven hardware and software tricks. mark for My Articles similar articles
PC World
June 2006
Scott Dunn
Security Is Up to You: Perfect Your Passwords Set up strong password policies for your PC's users... A freeware tool can give you greater control over passwords and more. mark for My Articles similar articles
PC Magazine
August 31, 2010
Eric Griffith
Password Protection: How to Create Strong Passwords Every password you have is important. Every one. Here's how to make your passwords uncrackable. mark for My Articles similar articles
PC World
October 2003
Scott Spanbauer
Can You Pass the PC World Password Safety Test? Password rules and tools; clear your passwords; cache news to read offline; update your media players. mark for My Articles similar articles
PC Magazine
March 20, 2009
Neil J. Rubenking
LastPass 1.50 LastPass manages your log-in passwords and fills in Web forms. It outperforms the competition in almost every area, and it's free!... RoboForm Pro 6.0... Eikon To Go Digital Privacy Manager... mark for My Articles similar articles
PC World
March 2004
Andrew Brandt
E@4#N or E@4#W? How to Remember Strong Passwords Tips for creating and keeping track of a passel of passwords. mark for My Articles similar articles
PC World
November 2003
Kandra & Brandt
The Great American Privacy Makeover An exclusive PC World survey reveals that even savvy Web users can do more to safeguard their privacy and data. Take the quiz and find out how vulnerable you are; then use our tips to improve your score. mark for My Articles similar articles
PC World
April 2004
Scott Spanbauer
Lock Down Your PC Hackers. Spammers. Even rogue coworkers and employees. How can you keep the bad guys out and the good data in? Safeguard your system's perimeter with these 29 beyond-the-basics security steps. mark for My Articles similar articles
PC Magazine
July 20, 2006
Neil J. Rubenking
Spyware Doctor 4.0 Spyware Doctor 4 isn't hugely different from 3.5, but it's a tad better in almost every area. It does a great job of cleaning up infested systems and keeping spyware out of clean systems. mark for My Articles similar articles
PC Magazine
February 15, 2006
Neil J. Rubenking
Laplink PCdefense LapLink's PCdefense combines security with backup, but the security doesn't succeed. mark for My Articles similar articles
InternetNews
May 13, 2010
One Gang Responsible For Most Phishing Attacks More than two-thirds of all phishing attacks in the second half of 2009 were the work of one gang, according to an anti-phishing group. mark for My Articles similar articles
PC Magazine
March 21, 2007
Neil J. Rubenking
Spyware Doctor with AntiVirus 5.0 From-scratch rewrite has the virtues and problems of a brand-new program. mark for My Articles similar articles
Fast Company
Glenn Fleishman
Everything You Know About Passwords Is Wrong Dr. Markus Jakobsson has a very different proposal for a type of password he calls "fastwords," which tie together storytelling, password strength, and probability. mark for My Articles similar articles
PC Magazine
October 31, 2005
Neil J. Rubenking
Spy Sweeper 4.5 Spy Sweeper 4.5 is the best antispyware tool we've seen yet. mark for My Articles similar articles