MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
December 5, 2006
Ed Sutherland
MySpace Hit by QuickTime Worm Hackers attempted to steal the user data of MySpace visitors using an Apple QuickTime video and a vulnerability in the social-networking site. mark for My Articles similar articles
InternetNews
December 5, 2007
Andy Patrizio
Grisoft Grabs Exploit Prevention Labs' Link Scanner Antivirus vendor Grisoft continues the trend toward multi-faceted security offerings with its acquisition today of Exploit Prevention Labs, developer of a link-scanning utility. mark for My Articles similar articles
PC World
January 28, 2008
Erik Larkin
Hackers Rig Google to Deliver Malware The latest malware trend should prompt you to think twice about the links you click next time you search. mark for My Articles similar articles
InternetNews
November 17, 2006
Andy Patrizio
Pirated Vista, Office 2007 Already on The 'Net Pirates have already gotten their hands on Windows Vista and are circulating a "cracked" version of the operating system on the Internet. mark for My Articles similar articles
InternetNews
August 2, 2006
Andy Patrizio
Firefox Is Doing So Well It's Now A Malware Target Mozilla has seen its first serious malware exploit. mark for My Articles similar articles
PC Magazine
September 23, 2008
Matthew D. Sarrel
A Day in the Life of a Web 2.0 Hacker They harvest data about you, your family, your friends, and your work directly from the Web apps you use and the sites you visit. Here's how they do it. mark for My Articles similar articles
InternetNews
January 27, 2009
Richard Adhikari
Spammers Ramp Up Short-Lived Web Sites Sites that are here today, gone tomorrow are difficult to track and block. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
Search Engine Watch
June 5, 2010
Johnny Widerlund
Avoiding Online Risks Kicking Off with the 2010 FIFA World Cup Cyber criminals will continue hijacking current news and events to serve malware. A rundown of the most prevalent online security risks, and how to avoid them. mark for My Articles similar articles
InternetNews
December 17, 2008
Richard Adhikari
Microsoft Patches IE, But Security Issues Remain As usual, the bad guys are ahead in the tug-of-war over security. mark for My Articles similar articles
InternetNews
March 3, 2009
Richard Adhikari
Digg Hackers Strike Next at YouTube Attacks are on the rise, with malware authors dabbling in spreading worms and scareware via comments. mark for My Articles similar articles
InternetNews
September 2, 2009
Malware Capitalizes on California Wildfires Macs and PCs are under attack as concerned netizens search for information about the fires. mark for My Articles similar articles
InternetNews
January 6, 2009
Richard Adhikari
Fake Celeb Profiles in Spam Attacks Want to see "more" of your favorite actor or pop star? Bad idea. mark for My Articles similar articles
InternetNews
October 28, 2005
Tim Gray
Rootkit-Wom Hitting AOL's IM Network The W32/Sdbot-ADD worm is propagating via AOL's IM network, looking to infect host computers with spyware. mark for My Articles similar articles
PC World
August 2006
Andrew Brandt
The 10 Biggest Security Risks You Don't Know About Hackers, scammers, and identity thieves are constantly coming up with new ways to attack your PC and your privacy. Here are the newest perils and how to foil them. mark for My Articles similar articles
InternetNews
August 13, 2010
Malware Discovered on Another Red Cross Website The Red Cross of Serbia was targeted by hackers who injected malicious JavaScript files onto several of the organization's web pages. mark for My Articles similar articles
InternetNews
February 7, 2008
Andy Patrizio
Web 2.0: Unsafe At Any Speed? People who specialize in Web security are saying Web 2.0 as it is now can't be secured. Should we keep on this path? mark for My Articles similar articles
PC Magazine
March 21, 2007
Neil J. Rubenking
Spyware Doctor with AntiVirus 5.0 From-scratch rewrite has the virtues and problems of a brand-new program. mark for My Articles similar articles
PC World
January 24, 2007
Scott Spanbauer
Thwart the Three Biggest Internet Threats of 2007 Protect yourself against the three gravest Web dangers: Internet Explorer, phishing attacks, and malware. mark for My Articles similar articles
InternetNews
January 19, 2009
Richard Adhikari
Get Ready for Inauguration Spam As Obama prepares to be sworn in, hackers and spammers are gearing up for a field day. mark for My Articles similar articles
InternetNews
July 6, 2006
Sean Michael Kerner
Trojans on The March Is it all Microsoft's fault? One security vendor suggests that users may well want to switch to a less-targeted OS. mark for My Articles similar articles
PC Magazine
March 26, 2007
Neil J. Rubenking
DriveSentry 2.1 DriveSentry stops bad programs from writing to your drives, but you have to tell it what's bad. mark for My Articles similar articles
InternetNews
August 9, 2010
Cisco Unveils Top 10 Web Malware Threats Contaminated websites are still a threat, but Cisco's latest security report suggests that are plenty of other Web-borne malware scams that can cost you or your company dearly. mark for My Articles similar articles
PC World
July 2005
Andrew Brandt
Security Tips: Identify Malware Hiding in Windows' System Folders Fortunately, once identified, malware is usually fairly easy--albeit tedious--to clean up. So follow these detection procedures, and your PC will be in good shape. Also, several available programs will help you spot, and in one case, remove, dangerous rootkit files. mark for My Articles similar articles
InternetNews
January 10, 2008
Andy Patrizio
New Rootkit Targets the Drive's MBR The bad guys got the idea from Black Hat and a security firm, illustrating the risks of bringing vulnerabilities to light. mark for My Articles similar articles
PC World
June 1, 2008
Erik Larkin
Web 2.0 Sites a Thriving Marketplace for Malware Malicious software makers are using social networks, video sites, and blogs to peddle their wares to other online criminals. mark for My Articles similar articles
T.H.E. Journal
August 2006
Doug Gale
Can This Virus Be 'Rooted' Out? A new kind of hard-to-detect malware is increasing our vulnerability to hackers and creating headaches for makers of antiviral software. mark for My Articles similar articles
InternetNews
January 18, 2011
Attack Toolkits Spark New Malware Strains Do-it-yourself malware kits are all the rage online and they're making life much easier for cyber-criminals looking to turn a quick buck. mark for My Articles similar articles