MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC World
June 2005
Stuart J. Johnston
Serious Holes in Antivirus Software McAfee, Symantec, Trend Micro, and F-Secure antivirus apps are affected. mark for My Articles similar articles
PC World
September 22, 2006
Stuart J. Johnston
Bugs and Fixes: Critical Fixes for Windows, IE, Office The surge in critical updates that Microsoft has been issuing shows no sign of weakening.... Help for Spysweeper 5.0 headaches... A new e-mail threat... mark for My Articles similar articles
InternetNews
September 24, 2004
Ryan Naraine
Scanner Tool Released To Thwart JPEG Attack Microsoft's detection tool can be used to identify vulnerable versions of the GDI libraries that handle JPEG processing. mark for My Articles similar articles
InternetNews
August 6, 2010
Adobe Hurries Patch for PDF Security Flaw The vulnerability in Adobe Reader could give hackers control of a user's computer. mark for My Articles similar articles
InternetNews
November 23, 2009
Zero-Day Exploit a Threat to IE6 & 7 Browsers? Another zero-day hole emerges in key Microsoft software. mark for My Articles similar articles
PC World
November 2005
Erik Larkin
Threat Alert: Antivirus Killers Savvy invaders can erode your PC's defenses and make it even more vulnerable. mark for My Articles similar articles
Fast Company
Neal Ungerleider
95% Of Android Phones Could Be Hacked With Just One Text Android users, beware: Security researchers have discovered that 95% of Android phones are vulnerable to attack through the dispatch of just one text message. mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
PC World
May 2001
Kim Zetter
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... mark for My Articles similar articles
PC World
November 2000
Stuart J. Johnston
Java Lets Hackers Attack Your Browser Java security flaws... Money file protection... Trojan horse invades PDAs... mark for My Articles similar articles
PC World
October 24, 2002
Paul Roberts
Microsoft Patches Lingering Win XP Hole Workaround aims at critics who seek major-vulnerability fix independent of SP1. mark for My Articles similar articles
InternetNews
August 12, 2005
Tim Gray
Windows Exploit Code Online The exploit code can lead to a remote system compromise, where an attacker can take control of an affected computer. A patch for this code is available online. mark for My Articles similar articles
InternetNews
February 18, 2009
Richard Adhikari
Hackers Target IE 7 Browser Again Users who failed to patch their computers after Microsoft released its monthly Patch Tuesday update last week could be in trouble - an Internet Explorer browser vulnerability for which the patch was sent out is under attack again. mark for My Articles similar articles
PC World
December 17, 2001
Russell Pavlicek
Is Linux Immune to E-Mail Viruses? Immunity is impossible, but the open-source operating system may be protected... mark for My Articles similar articles
InternetNews
October 9, 2007
Andy Patrizio
Microsoft Patches IE, Office Holes A favorite target of virus writers, Internet Explorer, is the recipient of four new vulnerability fixes today from Microsoft in the latest of the company's regular monthly product updates. mark for My Articles similar articles
HBS Working Knowledge
October 20, 2003
Wendy Guild Swearingen
New Rules for Information Security In a new book from Harvard Business School Press, Digital Defense, Thomas J. Parenty explains how security technologies are changing the rules of business. Plus: Q&A mark for My Articles similar articles
PC Magazine
December 9, 2003
The Lookout: Faulty Patch Leaves IE Open An incomplete patch has opened a vulnerability in Internet Explorer, and security experts say there are at least four methods attackers can use to compromise vulnerable PCs. mark for My Articles similar articles
InternetNews
July 20, 2004
Ryan Naraine
Windows 2000 Exploit Code Released Exploit code for a known security flaw in Microsoft Windows 2000 has been posted online, putting millions of users at risk of a PC hijack. Apply those MS04-019 and MS04-022 security patches as needed. mark for My Articles similar articles
PC Magazine
March 16, 2005
Dennis Fisher
New Virus Attack Bypasses Filters Virus writers have once again gotten the drop on antivirus vendors and IT administrators with a new technique that's finding considerable success. mark for My Articles similar articles
PC World
March 2006
Andrew Sullivan
Programs in Peril Popular applications have more security flaws than Windows does. mark for My Articles similar articles
PC Magazine
August 23, 2007
John Brandon
Q&A with the Forefather of Hacking Kevin Mitnick, arguably the world's most famous hacker, sets the record straight on what he's doing now, what he didn't do back then, and why kids should not follow in his footsteps. mark for My Articles similar articles
PC World
September 2005
Stuart J. Johnston
Windows, IE at Risk From PC Snatchers Many common browser viruses have download-able patches. mark for My Articles similar articles
AskMen.com
Eric Santos
Why Leadership Takes Vulnerability There are several qualities many leaders share, but I recently learned about one that is very different from being strong, and that is being vulnerable. mark for My Articles similar articles
InternetNews
August 2, 2010
Windows Shortcut Zero-Day Gets Patch Microsoft goes the out-of-band route for securing a vulnerability in all currently supported Windows versions. mark for My Articles similar articles
PC World
December 20, 2001
Matt Berger
Windows Patch Plugs 'Critical' Holes Microsoft issues a fix for a major flaw -- kept secret for five weeks -- that leaves Windows XP, Me, and some 98 systems vulnerable when online... mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
Information Today
February 2001
Marshall Breeding
A Prescription for Computer Health We finished the year with little to no damage to our computer systems. Read on to learn more about how to develop a successful strategy for computing in an increasingly dangerous world... mark for My Articles similar articles
InternetNews
April 7, 2006
Tim Scannell
Norm Laudermilch, CTO, Trust Digital Most companies aren't prepared to prevent malicious code from hopping from cell phones to enterprise networks, or tracking it when it happens. mark for My Articles similar articles