MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
August 23, 2007
Andy Patrizio
Storm Worm Gathers Strength on The Internet The Storm worm virus is still around, still causing trouble and stronger than ever six months later. mark for My Articles similar articles
InternetNews
October 24, 2007
Andy Patrizio
The 'Storm' That Keeps Blowing The Storm worm seems to unleash one new e-mail flood or denial of service attack every week. Why won't it go away? mark for My Articles similar articles
InternetNews
January 8, 2008
Andy Patrizio
Move Over Storm, There's a New Botnet in Town Nugache, a once-minor botnet, gets an extreme makeover and may be rivaling Storm in terms of size and scale of nuisance. mark for My Articles similar articles
InternetNews
November 29, 2007
Andy Patrizio
Cyber Crime Grows More Dangerous And Sophisticated McAfee study finds online threats are getting more complex and brazen in what they target, like the U.S. military. mark for My Articles similar articles
InternetNews
December 9, 2008
Richard Adhikari
Report Warns of More Cybercrime The economic downturn, poor cooperation among law enforcement agencies and inadequate laws may see cybercriminals prosper - but not if the Obama administration takes warnings to heart. mark for My Articles similar articles
InternetNews
February 27, 2007
Ed Sutherland
Storm Trojan Takes Social Measures Storm Trojan uses Web mail, blogs and message boards as conduits for spreading malware code. mark for My Articles similar articles
InternetNews
September 17, 2007
Andy Patrizio
Have We Reached The End Of The Virus? Not quite. The old-fashioned virus infestation is fading as the biggest nuisance for computer users in favor of Trojans, Symantec's new malware study finds. mark for My Articles similar articles
InternetNews
December 23, 2004
Jim Wagner
Cyber Criminals Prove Elusive Law enforcement efforts to snare virus writers are improving, but the most destructive ones have evaded capture. mark for My Articles similar articles
InternetNews
September 30, 2010
FBI Busts International Cybercrime Syndicate After a year-long investigation, the FBI and local law enforcement charges 37 hackers with using Zeus Trojan to steal more than $3 million from U.S. banks. mark for My Articles similar articles
InternetNews
March 7, 2008
Andy Patrizio
Is The Storm Worm Finally Blowing Over? A report by e-mail and content security firm Marshal claims that just six botnets are responsible for almost 90 percent of spam, but others in the spam filtering business disagree with the report's findings. mark for My Articles similar articles
InternetNews
July 7, 2009
Alex Goldman
FBI, DOJ Agents: We're Gaining on Cyber Crime While the Internet helps criminals organize and to reach across borders, it can also help law enforcement catch them. mark for My Articles similar articles
InternetNews
March 23, 2010
FBI Underboss Outlines Anatomy of a Cyber Gang As cyber criminals grow ever more sophisticated and organized, law enforcement agencies have had to step up their game to keep pace. One of the top men at the FBI shares what the bureau is doing to combat cyber crime. mark for My Articles similar articles
BusinessWeek
April 10, 2006
Brian Grow
This Worm Is Nasty, Brutish, And Sneaky Hackers have raised the stakes with a new bug almost immune to detection. mark for My Articles similar articles
InternetNews
January 12, 2006
Roy Mark
Data Breaches: New Year, Old Story Data breaches are off to a flying start this year. Congress does nothing about it, not even requiring companies to inform consumers of the breaches. mark for My Articles similar articles
PC World
October 24, 2007
Erik Larkin
The Internet's Public Enemy Number One The Storm Worm has infected so many machines that it's now one of the most powerful supercomputers. mark for My Articles similar articles
InternetNews
December 22, 2009
Andy Patrizio
Malware Writers Get Bold, Rent Datacenters Not content with infecting individual PCs, the criminals who run botnets are now setting up shop in legitimate data centers. How? mark for My Articles similar articles
InternetNews
December 23, 2008
Richard Adhikari
New E-holiday Card Virus Surfaces A new worm has emerged that could be much worse than the notorious Storm worm, which ruled the botnet world for nearly two years. mark for My Articles similar articles
Scientific American
June 2009
Michael Moyer
What Conficker Reveals About Internet Crime The worm exposes the sophisticated international criminal networks behind modern computer viruses mark for My Articles similar articles
InternetNews
June 15, 2007
Andy Patrizio
Four Bot Herders Get Put Out To Pasture Your spam filters have ever so slightly less work to do today, thanks to several arrests of bot herders by the FBI. mark for My Articles similar articles
AskMen.com
Bernie Alexander
Cyber Crime: The Wild West, Online Forget about breaking and entering, aggravated assault and armed robbery. Cyber crime is taking over. mark for My Articles similar articles
Bank Technology News
May 2006
Holly Sraeel
If Financial Crime is Rising, Then Security is Job #1 Furthered along by a loosely knit network of criminals, cybercrime is being waged by hackers and botmasters for profit in ways that are often not easily tracked by financial institutions, law enforcement authorities and governments. mark for My Articles similar articles
Bank Systems & Technology
August 27, 2009
Maria Bruno-Britz
U.S. Small Businesses Are Scammers' New Targets Cyber crooks in Eastern Europe have begun to prey upon smaller companies in their efforts to steal. mark for My Articles similar articles
InternetNews
August 18, 2005
Tim Gray
Warily Watching Worm Variants Versions of the Zotob worm continue to slam corporate networks while security vendors and Microsoft play defense. mark for My Articles similar articles
PC Magazine
March 14, 2007
Larry Seltzer
A Storm Blows Through the Web The Storm Worm virus is old news. Where is it now? mark for My Articles similar articles
National Defense
October 2007
Breanne Wagner
Computer Crimes Keep Government and Industry on the Defensive The complexity of new malicious code and the elusive nature of cyber attackers have become significant impediments to detecting or preventing most intrusions. mark for My Articles similar articles
PC World
August 2006
Andrew Brandt
The 10 Biggest Security Risks You Don't Know About Hackers, scammers, and identity thieves are constantly coming up with new ways to attack your PC and your privacy. Here are the newest perils and how to foil them. mark for My Articles similar articles
InternetNews
July 13, 2007
Andy Patrizio
Now PDF Is The Format For Spam Delivery With image-based spam being effectively stopped, the scammers find a new way to get by your defenses. mark for My Articles similar articles
PC World
June 1, 2008
Erik Larkin
Web 2.0 Sites a Thriving Marketplace for Malware Malicious software makers are using social networks, video sites, and blogs to peddle their wares to other online criminals. mark for My Articles similar articles
InternetNews
June 29, 2005
Industry Groups Push For Cyber Crime Treaty The coalition puts pressure on the US Senate for ratification of international cyber crime treaty. mark for My Articles similar articles
PC World
December 31, 2007
Erik Larkin
Malware Evolving Too Fast for Antivirus Apps Bad guys use sophisticated testing to create malware that can evade even the best security programs. mark for My Articles similar articles
InternetNews
November 11, 2005
Roy Mark
FBI Hunkered in The Bunker Cyber G-men are responsible for investigating cyber attacks by foreign adversaries and terrorists, and for preventing online criminals from using the Internet to steal, defraud and otherwise victimize U.S. citizens, businesses and communities. mark for My Articles similar articles
InternetNews
October 26, 2007
Andy Patrizio
Hacker Criminals Find An Exploit In a Fix Adobe issues a fix to an exploit that could allow a rootkit to be installed on unsuspecting computers. The bad guys craft an exploit off that fix within a day. mark for My Articles similar articles
InternetNews
April 10, 2009
Sean Michael Kerner
Conficker's 'Kido' Spinoff Gets Busy Spamming Report says one bot can send up to 80,000 e-mails a day. mark for My Articles similar articles
InternetNews
December 7, 2005
Michael Hall
Chatty Worm-Bot Coaxes Malware Download A new worm making the rounds on AIM simulates a real person to coax users into accepting its payload. mark for My Articles similar articles
Bank Technology News
April 2007
Rebecca Sausner
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. mark for My Articles similar articles
Bank Systems & Technology
November 12, 2009
Maria Bruno-Britz
Hackers Exploit Prepaid Payroll Cards Cyber criminals accused of breaking into RBS WorldPay's systems and exploiting payroll cards may indicate a new trend. mark for My Articles similar articles
InternetNews
January 16, 2008
Andy Patrizio
A Particularly Nasty Week For Malware From Excel to the revitalized Storm worm to a severe banking Trojan, it's enough to make you nostalgic for the days of BBSes. mark for My Articles similar articles
Bank Technology News
May 2010
Michael Sisk
Security Threats and Opportunities As more people adopt mobile banking and it becomes more transactional -- not just checking balances and getting alerts -- the security threats are likely to mount quickly. mark for My Articles similar articles
InternetNews
January 15, 2010
Larry Barrett
Russia Blamed for 13% of Global Cyber Attacks New report from Akamai awards Russia the dubious distinction of world's leading source of cyber threats. mark for My Articles similar articles
InternetNews
October 21, 2009
Auto Industry a Spam Magnet: Study Panda Security survey finds that only one-tenth of one percent of all e-mail received by auto industry is legitimate. mark for My Articles similar articles
InternetNews
December 17, 2008
Warning, Your Antivirus Software May be Leaky If you think you're protected because you have antivirus applications installed, think again. mark for My Articles similar articles
InternetNews
April 14, 2009
Alex Goldman
Credit Cards, Banks Targeted by Cyber Criminals Sophisticated criminal gangs are organized and focused on stealing, buying and selling identities across shadowy online markets. mark for My Articles similar articles
InternetNews
July 14, 2004
Ryan Naraine
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues. mark for My Articles similar articles
The Motley Fool
December 7, 2006
Rich Smith
IBM: International Business vs. Sub-Machine Guns Big Blue got a taste of the Russian justice system when troops from an "unidentified" law enforcement agency raided its offices. mark for My Articles similar articles
InternetNews
September 30, 2010
'Here You Have' Worm Takes Toll In September The new version of an old malware trick was the single largest security threat to enterprise IT departments last month. mark for My Articles similar articles
InternetNews
March 25, 2010
Symantec: China Is Tops in Targeted Malware Symantec's latest report pinpoints China as the leading source of malware tailored to hoodwink execs in specific industries. mark for My Articles similar articles
PC Magazine
October 14, 2003
The Lookout: Blaster and SoBig Move In The Blaster worm continued to tear through the Internet in August, followed almost immediately by an improved version of the SoBig worm, as security experts struggled to find and fix infected systems. mark for My Articles similar articles
PC World
August 12, 2002
Tom Mainelli
Symantec Unveils Automated Norton AntiVirus Updated program zaps latest worms, seeks out instant messaging nasties, and doesn't bother you with the details. mark for My Articles similar articles
PC Magazine
August 20, 2008
Matthew D. Sarrel
There's a Bot in Your PC Aiding the rise of blended threats around the world, botnets are digging in and using your network as a base of operations. mark for My Articles similar articles
InternetNews
December 2, 2010
Targeted Malware, Spam Will Surge in '11 Security software vendor predicts more malware campaigns will use social media to target mobile devices, apps and industry-specific systems. mark for My Articles similar articles