MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
National Defense
December 2009
Austin Wright
National-Security Infrastructure Faces Relentless Cyberespionage Campaign U.S. government and defense-industry networks face a relentless onslaught from cyber-spies who seek some of the nation's most heavily guarded secrets mark for My Articles similar articles
IEEE Spectrum
November 2005
Lauren Aaronson
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. mark for My Articles similar articles
Bank Technology News
April 2007
Rebecca Sausner
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. mark for My Articles similar articles
National Defense
January 2005
Joe Pappalardo
Homeland Defense Research Agency Directs Attention To Cyber Security Fearing the specter of crippling attacks on government and private sector computer systems, federal officials are stepping up efforts to foil cyber terrorism. mark for My Articles similar articles
InternetNews
July 8, 2005
David Needle
CERT Warns on Latest Trojan Horse Attacks Targeted e-mail viruses may be behind some recent Internet outages. The trojan horse viruses can evade anti-virus software and appear to be from a trusted source. mark for My Articles similar articles
Information Today
February 4, 2013
Paula J. Hane
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. mark for My Articles similar articles
CFO
January 30, 2004
Esther Shein
Spy vs. Spy Companies are spending billions on network security, but staying ahead of hackers may be a pipe dream. mark for My Articles similar articles
InternetNews
May 22, 2006
Ed Sutherland
Word Attack Hails From China Security researchers warn Microsoft Word zero-day exploit is aimed at government e-mail systems. mark for My Articles similar articles
InternetNews
March 25, 2010
Symantec: China Is Tops in Targeted Malware Symantec's latest report pinpoints China as the leading source of malware tailored to hoodwink execs in specific industries. mark for My Articles similar articles
Defense Update
Issue 3, 2005
DARPA gears to Counter Network Worms One of the most imminent threats to C4 systems, particularly mobile ad-hoc and COTS based networks, are large scale attacks by computer worms spreading malicious code. mark for My Articles similar articles
Fast Company
Victor Kotsev
Why International Cybercrime Is Going To Keep Getting Worse Many countries have devoted cyber warfare units that know how to cover their tracks, and just about every country now has cyber vigilantes and criminals motivated by their own specific needs, missions or grievances. mark for My Articles similar articles
National Defense
December 2011
Stew Magnuson
Defense Department Partners With Industry To Stem Staggering Cybertheft Losses The amount of intellectual property hackers are stealing from U.S. companies and sending to China is said to be staggering. The private sector's crown jewels are being moved off nominally secure networks and transmitted to the Asian nation every day: usually from 9 to 5 -- Beijing time. mark for My Articles similar articles
National Defense
August 2012
Eric Beidel
Companies Rush to Tailor Products to New Cyber-Attacks The cybersecurity marketplace is flooded with products that tout the ability to keep networks and computers safe from intruders. mark for My Articles similar articles
Wall Street & Technology
September 17, 2007
Melanie Rodier
Online Security Attacks Against Financial Institutions Rapidly Increasing Gone are the days of teenagers sitting in their parents' basements trying to hack into a company's computer system just to prove a point. Today, hacking is an organized crime enterprise -- and it is bigger than ever. mark for My Articles similar articles
Information Today
February 2001
Marshall Breeding
A Prescription for Computer Health We finished the year with little to no damage to our computer systems. Read on to learn more about how to develop a successful strategy for computing in an increasingly dangerous world... mark for My Articles similar articles
The Motley Fool
December 5, 2010
Dean Takahashi.
WikiLeaks Reveals How Google Was Targeted in China Documents lay bare vast hacking attempts by Chinese leaders. mark for My Articles similar articles
National Defense
October 2007
Breanne Wagner
Computer Crimes Keep Government and Industry on the Defensive The complexity of new malicious code and the elusive nature of cyber attackers have become significant impediments to detecting or preventing most intrusions. mark for My Articles similar articles
InternetNews
February 26, 2004
Michael Singer
The Net Has An 'Insecurity' Complex RSA's second annual assessment of online security leaves little doubt that corporations have a long way to go. mark for My Articles similar articles
InternetNews
January 27, 2010
Cyber Terrorists Target U.S. Oil Industry Three of the world's largest U.S.-based oil and natural gas companies were hoodwinked by an extremely sophisticated malware attack designed to steal key proprietary data related to the whereabouts of new oil reserves. mark for My Articles similar articles
PC Magazine
June 22, 2004
Robert P. Lipschutz
Business Security Our buying guide sorts out the technologies and explains the best ways to protect yourself. mark for My Articles similar articles
InternetNews
April 10, 2008
Susan Kuchinskas
An Imperfect (Cyber) Storm The federal government has been working with private companies and security vendors to develop protocols and communications systems that will let them respond quickly and share relevant information on threats and attacks. mark for My Articles similar articles
Search Engine Watch
June 5, 2010
Johnny Widerlund
Avoiding Online Risks Kicking Off with the 2010 FIFA World Cup Cyber criminals will continue hijacking current news and events to serve malware. A rundown of the most prevalent online security risks, and how to avoid them. mark for My Articles similar articles
InternetNews
November 29, 2007
Andy Patrizio
Cyber Crime Grows More Dangerous And Sophisticated McAfee study finds online threats are getting more complex and brazen in what they target, like the U.S. military. mark for My Articles similar articles
PC World
August 2006
Andrew Brandt
The 10 Biggest Security Risks You Don't Know About Hackers, scammers, and identity thieves are constantly coming up with new ways to attack your PC and your privacy. Here are the newest perils and how to foil them. mark for My Articles similar articles
Bank Technology News
May 1, 2008
Rebecca Sausner
Homeland Security: Manhattan Project for Cyber Sec The federal government has begun to offer details on an expensive, and targeted, defensive cyber-security plan to protect our nation's financial markets. mark for My Articles similar articles
InternetNews
September 17, 2007
Andy Patrizio
Have We Reached The End Of The Virus? Not quite. The old-fashioned virus infestation is fading as the biggest nuisance for computer users in favor of Trojans, Symantec's new malware study finds. mark for My Articles similar articles
InternetNews
September 29, 2010
Cyber Storm Simulation Tests Nation's Readiness The three days of simulations sponsored by the Department of Homeland Security, are designed to test the U.S.'s ability to respond to a major attack on its digital infrastructure. mark for My Articles similar articles
InternetNews
February 2, 2009
Richard Adhikari
Are Legitimate Sites the Next Malware Threat? Businesses may be exposing their customers to malware by leaving their sites unpatched, IBM warns in a new study. mark for My Articles similar articles
InternetNews
January 24, 2006
Sean Michael Kerner
IBM: Users Are The Weak Link in Security IBM is warning in a new report that, though widespread virus outbreaks are on the decline, on the whole online attacks are expected to rise in 2006. The culprit? Highly targeted attacks that rely on naive users to help perpetrate cybercrimes. mark for My Articles similar articles
InternetNews
May 28, 2009
Alex Goldman
Flood of Fake Western Union E-mails Hide Trojan An influx of malware-laden spam, which started two weeks ago, continues today as hackers seek credit card and banking information. mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
InternetNews
April 8, 2010
Massive Cyber Spy Ring Seen Operating in China New report details the activities of the "Shadow network," a sophisticated group of cyber criminals traced back to China, prompting denial from a state official. mark for My Articles similar articles
InternetNews
February 25, 2010
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. mark for My Articles similar articles
PC Magazine
April 5, 2006
Robert Lemos
This Man Has a Virus Security software can do little about the most dangerous delivery mechanism of all: the user. mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
PC Magazine
July 13, 2004
Alexandra Robbins
The Virus Wars As the problem continues to escalate, the future direction of the virus wars is something of an unknown, because it depends on so many variables, including the shifting motivations for virus writing. mark for My Articles similar articles
InternetNews
February 24, 2009
Richard Adhikari
Hackers Pounce on Excel Vulnerability Hackers have launched a new attack that uses a previously undiscovered flaw in Microsoft Excel to target business executives and government agencies. mark for My Articles similar articles
PC World
December 2000
Kim Zetter
Computer Viruses: The Next Generation What will be the next virulent outbreak? No one knows, except that it's guaranteed to be more lethal than ever... mark for My Articles similar articles
PC World
May 2001
Stan Miastkowski
Fortress PC Snoops, hackers, and viruses abound online. We identify all the tools you need to defend yourself against these hazards... mark for My Articles similar articles
BusinessWeek
March 22, 2004
Stephen H. Wildstrom
Toughing Out The Junk-Mail Virus An insidious strain swipes e-addresses from your PC -- to spam your friends mark for My Articles similar articles
National Defense
January 2016
Stephanie Meloni
Defense Department Assuming Growing Cyber Security Role The Defense Department sees cyber as a domain that spans air, land, sea and space, but it struggles with how to handle it as a war fighting domain to best protect the nation. mark for My Articles similar articles
PC World
May 23, 2001
Frank Thorsberg
Sizing Up Cybervandalism: Thousands Hit Monthly Researchers find debilitating hacker attacks cross borders to hit big and small targets... mark for My Articles similar articles
InternetNews
April 20, 2010
Targeted, DIY Malware Here to Stay: Symantec Symantec's latest threat report provides plenty of disconcerting news for IT managers charged with safeguarding critical enterprise data. mark for My Articles similar articles
Chemistry World
June 10, 2015
Emma Stoye
Security experts warn chemical plants are vulnerable to cyber-attacks Security experts are warning that the computers controlling machinery in chemical plants, power stations and other critical infrastructure are vulnerable to attacks from hackers. mark for My Articles similar articles
Registered Rep.
February 1, 2013
Megan Leonhardt
Ten Tips That Could Prevent Cyber Criminals from Hijacking Client Data As tablet ownership continues to grow -- doubling since 2011 -- and more than half of U.S. consumers owning a smartphone, according to a 2013 Forrester Research report, advisors need to be more vigilant about data security now more than ever. mark for My Articles similar articles
National Defense
July 2007
Breanne Wagner
Experts Downplay Imminent Threat of Cyberterrorism U.S. officials are worried about the threat of a terrorist attack against civilian and government computer systems, but experts say any attack by cyber terrorists is likely to be non-debilitating worms and viruses. mark for My Articles similar articles
InternetNews
February 9, 2010
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. mark for My Articles similar articles
InternetNews
September 24, 2007
Sean Michael Kerner
Unisys to Blame For DHS Insecurity? Congressman alleges that the Department of Homeland Security hasn't been so secure, thanks to its contractor. mark for My Articles similar articles
InternetNews
June 10, 2005
Tim Gray
Trojan Spreads in Michael Jackson Spotlight British anti-virus firm Sophos says hackers are slamming computers around the world with a Trojan virus by sending e-mails claiming Michael Jackson has tried to kill himself. mark for My Articles similar articles