MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
February 5, 2010
SQL Injections Led to 60% of UK Data Breaches Malicious hackers are relying on growing numbers of increasingly complex SQL attacks to get at companies' data. mark for My Articles similar articles
InternetNews
January 21, 2010
Microsoft Serves Up Zero-Day Fix for IE Flaw Microsoft issued a cumulative update for most Internet Explorer versions in order to shore up a gaping security hole that left Google and dozens of other companies open to attack from Chinese hackers. mark for My Articles similar articles
CIO
April 15, 2004
Eric Knorr
Guard the Application Layer Firewalls alone are no longer enough to protect your online assets mark for My Articles similar articles
InternetNews
March 25, 2008
Sean Michael Kerner
Report: 90% of Web Sites Vulnerable to Hackers New study claims Cross-Site Scripting attacks are all over the place. Should we be afraid? mark for My Articles similar articles
InternetNews
July 31, 2006
Clint Boulton
SQL Injection Threatens to Needle Web Users A scripting flaw that lets perpetrators pull any content from a database is a scary tool for IT admins. mark for My Articles similar articles
InternetNews
December 23, 2008
Sean Michael Kerner
New Zero-Day Exploit Emerges for Microsoft SQL Microsoft issues warning for attack vector that could paralyze database servers. mark for My Articles similar articles
InternetNews
October 17, 2008
Richard Adhikari
Adobe Sites Hit by Malware Just weeks after a BusinessWeek Web site was hit by an SQL injection attack, comes news that Adobe has had to deal with two of its Web sites compromised the same way. mark for My Articles similar articles
InternetNews
April 2, 2007
Michael Hickins
Game On: Microsoft to Issue Emergency Patch Microsoft is issuing the patch in advance of its usual Patch Tuesday schedule to counter role-play game hackers. mark for My Articles similar articles
Bank Technology News
September 2009
Rebecca Sausner
Everything That Can Go Wrong The aftermath of the breach of Albert Gonzalez has had some positive effects. mark for My Articles similar articles
InternetNews
December 16, 2008
Sean Michael Kerner
'Shockers' in Cisco's Year-End Security Report But it's what didn't make it into the report that could be even more revealing. mark for My Articles similar articles
InternetNews
April 16, 2009
Alex Goldman
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. mark for My Articles similar articles
InternetNews
November 16, 2006
Sean Michael Kerner
Automated Patching Helping Zero-Day Exploits Latest SANS Institute top 20 list puts IE and Office squarely in hackers cross hairs. Are efforts to protect them fueling the rise? mark for My Articles similar articles
PC World
February 3, 2003
Paul Roberts
The Net Is Dangerous, Research Says Attack rates decline, but worms and software flaws keep cyberspace hazardous, Symantec reports. mark for My Articles similar articles
InternetNews
February 9, 2010
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. mark for My Articles similar articles
InternetNews
September 15, 2008
Richard Adhikari
Hackers Hit BusinessWeek With Malware The BusinessWeek.com site was hit by a SQL injection attack and connects users to a sleeper site. mark for My Articles similar articles
PC Magazine
May 1, 2010
Albanesius & Rhey
Anatomy of a Hack In late March, a chapter was closed with little fanfare on the biggest case of online identity theft in U.S. history. mark for My Articles similar articles
InternetNews
August 18, 2009
U.S. Fingers TJX Hacker in Heartland Breach Attacks on Heartland, 7-Eleven and Hannaford Bros. netted the criminals 130 million credit card numbers, according to the DoJ. mark for My Articles similar articles
InternetNews
July 8, 2009
Alex Goldman
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. mark for My Articles similar articles
CIO
January 1, 2002
Sarah D. Scalet
How to Not Recover from Getting Hacked (A Loser's Guide to Failure) A guide for what not to do when you get hacked. Take a moment to learn from the mistakes that others have made. mark for My Articles similar articles
InternetNews
February 20, 2009
Richard Adhikari
Group Warns of Top Web 2.0 Security Threats We can't stand in the path of progress with Web 2.0 technologies, but we can make it safer, an industry group says. mark for My Articles similar articles
InternetNews
March 11, 2008
David Needle
Microsoft Targets Office Remote Execution Flaws Latest "Patch Tuesday" updates aim to shut the door on a slew of critical Office suite vulnerabilities. mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
Chemistry World
June 10, 2015
Emma Stoye
Security experts warn chemical plants are vulnerable to cyber-attacks Security experts are warning that the computers controlling machinery in chemical plants, power stations and other critical infrastructure are vulnerable to attacks from hackers. mark for My Articles similar articles
InternetNews
January 19, 2010
Microsoft to Ship 'Out-of-Band' Patch New zero-day hole aided hackers in Google attacks and required immediate action. mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
Home Theater
April 1, 2010
Mark Fleischmann
Smart Meters Maybe Not So Smart Security holes may let hackers steal your juice. mark for My Articles similar articles
InternetNews
June 11, 2009
Alex Goldman
Malware Keeps Creeping Onto Mac OS X The Apple Mac is still seeing far fewer attacks than Windows experiences, but researchers say there's a disturbing trend at work. mark for My Articles similar articles
Real Estate Portfolio
Mar/Apr 2002
Scott Laliberte
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... mark for My Articles similar articles
InternetNews
May 1, 2006
David Miller
Zero-Day Attacks an Ongoing Menace Security report from the SANS Institute details biggest Internet vulnerabilities. mark for My Articles similar articles
InternetNews
February 9, 2007
Clint Boulton
RSA Reminds Us to Fight The Good Fight There is no bullet-proof way to outmaneuver people who want your data. But we need to try. mark for My Articles similar articles
InternetNews
February 2, 2009
Richard Adhikari
Are Legitimate Sites the Next Malware Threat? Businesses may be exposing their customers to malware by leaving their sites unpatched, IBM warns in a new study. mark for My Articles similar articles
National Defense
August 2012
Eric Beidel
Companies Rush to Tailor Products to New Cyber-Attacks The cybersecurity marketplace is flooded with products that tout the ability to keep networks and computers safe from intruders. mark for My Articles similar articles
New Architect
May 2002
Jay Lyman
to Catch a Thief Effective incident response against network intruders... mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
InternetNews
December 10, 2009
Fast-Moving SQL Attack Hits 125,000-Plus Sites Nasty SQL injection attack has ties to a credit card-snatching trojan - and may just be getting started. mark for My Articles similar articles
InternetNews
March 16, 2004
Ryan Naraine
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. mark for My Articles similar articles
Registered Rep.
May 24, 2011
Lauren Barack
Cyber-Hackers: Faster, Better Equipped Than You Security should be the responsibility of all employees - not just the chief technology officer, or the principal of an advisory firm. mark for My Articles similar articles
InternetNews
June 28, 2005
Tim Gray
UConn Finds Hacking Program in Server University of Connecticut officials say a server containing the personal data of many of its staff and students was compromised on at least one occasion. mark for My Articles similar articles
T.H.E. Journal
February 2009
John K. Waters
IT Security: Target: The Web No longer focused on the network, hackers have a bull's eye now trained squarely on web-based applications. What, if anything, can school districts do to thwart them? mark for My Articles similar articles
Bank Technology News
September 2008
Tom Kellermann
The Cyber Security Quagmire It's becoming essential that on a quarterly basis financial institutions conduct penetration tests on service providers. These tests should assess their network security posture, and verify whether they have layered security beyond firewalls, virus scanners and encryption. mark for My Articles similar articles
Entrepreneur
June 2010
Ericka Chickowski
Protect Your Small Business Against Cyber Attacks Cybercrime costs the economy more than $1 trillion per year, and crooks are increasingly setting their sights on small businesses. A look at the most destructive threats to your network - and what you need to do about them. mark for My Articles similar articles
Defense Update
Issue 3, 2005
DARPA gears to Counter Network Worms One of the most imminent threats to C4 systems, particularly mobile ad-hoc and COTS based networks, are large scale attacks by computer worms spreading malicious code. mark for My Articles similar articles
PC World
May 2001
Kim Zetter
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... mark for My Articles similar articles
PC World
May 23, 2001
Frank Thorsberg
Sizing Up Cybervandalism: Thousands Hit Monthly Researchers find debilitating hacker attacks cross borders to hit big and small targets... mark for My Articles similar articles
Search Engine Watch
April 14, 2011
Kristine Schachinger
3 Website Exploits - Are You Protected? Examining three common attacks that can hurt your visitors and rankings, and tips on how to prevent your site from being hacked. mark for My Articles similar articles
InternetNews
June 16, 2011
Mesh Injection Attack Claims 30,000 Sites Meshed Web attack emerges that takes a new approach to replication and it may already be a big problem. mark for My Articles similar articles
The Motley Fool
June 13, 2011
Arunava De
Are Hackers the Next Threat to Your Portfolio? Before you respond to a malicious attack on one of your investments in your portfolios, measure the impact that such an attack can have on the company. mark for My Articles similar articles
Bank Technology News
April 2001
Maria Bruno
Hackers Steal 1 Million Card Numbers Teams of Russian and Ukrainian hackers stole more than 1 million credit card numbers from 40 American e-businesses in recent months, according to the Federal Bureau of Investigation... mark for My Articles similar articles
InternetNews
January 24, 2006
Sean Michael Kerner
IBM: Users Are The Weak Link in Security IBM is warning in a new report that, though widespread virus outbreaks are on the decline, on the whole online attacks are expected to rise in 2006. The culprit? Highly targeted attacks that rely on naive users to help perpetrate cybercrimes. mark for My Articles similar articles
CIO
August 29, 2011
Robert McMillan
Five Things CIOs Need to Know about Anonymous The hacking collective dubbed Anonymous has unleashed its brand of pesky "operations" on companies from Visa to Sony. Here are the top five things you need to know about their antics. mark for My Articles similar articles