MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC World
December 31, 2007
Erik Larkin
Malware Evolving Too Fast for Antivirus Apps Bad guys use sophisticated testing to create malware that can evade even the best security programs. mark for My Articles similar articles
InternetNews
February 11, 2009
Richard Adhikari
Spammers Hijack Facebook Group of 1.5 Million Facebook site is taken over by get-rich-quick and other familiar spam. mark for My Articles similar articles
InternetNews
March 3, 2009
Richard Adhikari
Digg Hackers Strike Next at YouTube Attacks are on the rise, with malware authors dabbling in spreading worms and scareware via comments. mark for My Articles similar articles
InternetNews
July 21, 2009
Alex Goldman
Erin Andrews Virus Infects Search, Blogs The taping of the original video was a Peeping Tom crime that criminals are now exploiting to infect PCs. mark for My Articles similar articles
PC World
August 2004
Andrew Brandt
Does Your Online Profile Say Something You Wouldn't? Sneaky hackers can put undesirable links and images into your personal profile page without your knowledge. mark for My Articles similar articles
PC Magazine
September 23, 2008
Matthew D. Sarrel
A Day in the Life of a Web 2.0 Hacker They harvest data about you, your family, your friends, and your work directly from the Web apps you use and the sites you visit. Here's how they do it. mark for My Articles similar articles
InternetNews
January 6, 2009
Richard Adhikari
Fake Celeb Profiles in Spam Attacks Want to see "more" of your favorite actor or pop star? Bad idea. mark for My Articles similar articles
PC World
August 2006
Andrew Brandt
The 10 Biggest Security Risks You Don't Know About Hackers, scammers, and identity thieves are constantly coming up with new ways to attack your PC and your privacy. Here are the newest perils and how to foil them. mark for My Articles similar articles
InternetNews
September 17, 2007
Andy Patrizio
Have We Reached The End Of The Virus? Not quite. The old-fashioned virus infestation is fading as the biggest nuisance for computer users in favor of Trojans, Symantec's new malware study finds. mark for My Articles similar articles
InternetNews
July 6, 2006
Sean Michael Kerner
Trojans on The March Is it all Microsoft's fault? One security vendor suggests that users may well want to switch to a less-targeted OS. mark for My Articles similar articles
InternetNews
March 10, 2010
Mariposa Bot Shipped With Vodafone Smartphone Panda Security discovered Confiker, Mariposa and Lineage password stealing malware samples installed on a recently purchased Vodafone HTC Magic smartphone. mark for My Articles similar articles
InternetNews
August 18, 2010
Facebook Kit Makes Hacking Logins Easy Security software vendor BitDefender says it's found a new malware kit that lets hackers easily access logins and passwords for Facebook and other unsecured credentials. mark for My Articles similar articles
InternetNews
November 29, 2007
Andy Patrizio
Cyber Crime Grows More Dangerous And Sophisticated McAfee study finds online threats are getting more complex and brazen in what they target, like the U.S. military. mark for My Articles similar articles
InternetNews
June 10, 2005
Tim Gray
Trojan Spreads in Michael Jackson Spotlight British anti-virus firm Sophos says hackers are slamming computers around the world with a Trojan virus by sending e-mails claiming Michael Jackson has tried to kill himself. mark for My Articles similar articles
InternetNews
January 22, 2009
Richard Adhikari
Spammers Are Gaming Google's Adwords Researchers are warning of some bad actors in paid results on Google. mark for My Articles similar articles
InternetNews
January 4, 2007
Ed Sutherland
Vista Exploit Looking For Achilles' Heel First Vista exploit could mean lasting problems for Microsoft, according to a security vendor. mark for My Articles similar articles
InternetNews
August 13, 2010
Malware Discovered on Another Red Cross Website The Red Cross of Serbia was targeted by hackers who injected malicious JavaScript files onto several of the organization's web pages. mark for My Articles similar articles
InternetNews
February 15, 2008
Andy Patrizio
Malware Threatens Mac Users: Report Survey shows Apple users expect the bad guys to follow them, but the good news is the evildoers are looking the other way. mark for My Articles similar articles
InternetNews
May 13, 2010
One Gang Responsible For Most Phishing Attacks More than two-thirds of all phishing attacks in the second half of 2009 were the work of one gang, according to an anti-phishing group. mark for My Articles similar articles
InternetNews
January 19, 2009
Richard Adhikari
Get Ready for Inauguration Spam As Obama prepares to be sworn in, hackers and spammers are gearing up for a field day. mark for My Articles similar articles
InternetNews
January 18, 2011
Attack Toolkits Spark New Malware Strains Do-it-yourself malware kits are all the rage online and they're making life much easier for cyber-criminals looking to turn a quick buck. mark for My Articles similar articles
InternetNews
April 11, 2008
Susan Kuchinskas
Web 2.0 in Enterprise Needs a Lock Sans security controls, company-hosted blogs and wikis make it all too easy to post malware. Then, the trusting, sharing culture of Web 2.0 encourages others to click on the link. mark for My Articles similar articles
InternetNews
April 14, 2009
Alex Goldman
Credit Cards, Banks Targeted by Cyber Criminals Sophisticated criminal gangs are organized and focused on stealing, buying and selling identities across shadowy online markets. mark for My Articles similar articles
InternetNews
March 3, 2005
Sean Michael Kerner
Searchmeup Targets Weak PCs A new adware exploit takes advantage of IE LoadImage vulnerability. mark for My Articles similar articles
InternetNews
September 15, 2008
Richard Adhikari
Hackers Hit BusinessWeek With Malware The BusinessWeek.com site was hit by a SQL injection attack and connects users to a sleeper site. mark for My Articles similar articles
InternetNews
September 2, 2009
Malware Capitalizes on California Wildfires Macs and PCs are under attack as concerned netizens search for information about the fires. mark for My Articles similar articles
InternetNews
January 14, 2009
Judy Mottl
More Adults Jump Into Social Networking But the trend remains dominated by teenagers. mark for My Articles similar articles
InternetNews
January 28, 2009
Richard Adhikari
Online Trust: A Thing of the Past? Malware attacks are turning the Web upside down, and complicating the efforts of security vendors and users to cope with the threats. mark for My Articles similar articles
InternetNews
September 16, 2009
Larry Barrett
Hackers Targeting Web 2.0 Sites at Alarming Rate Security software vendor Websense claims 95 percent of user-generated comments on blogs and message boards are either spam or contain malicious code. mark for My Articles similar articles
InternetNews
February 27, 2007
Ed Sutherland
Storm Trojan Takes Social Measures Storm Trojan uses Web mail, blogs and message boards as conduits for spreading malware code. mark for My Articles similar articles
InternetNews
January 25, 2011
ICQ Users Fend Off Fake AV Campaign A new scareware scam is taking flight on ICQ, attempting to infect users' PCs and mobile devices while selling them a bill of goods. mark for My Articles similar articles
InternetNews
June 20, 2007
Susan Kuchinskas
Malware on The Tube The newest wave of Trojans is coming to you on YouTube - and other Web sites. mark for My Articles similar articles
InternetNews
February 3, 2006
Catherine Pickavet
Balancing The Business of MySpace Are social networking sites like MySpace in need of more supervision? mark for My Articles similar articles
PC World
September 26, 2007
Erik Larkin
Five of the Dirtiest Malware Tricks From disguising applets to look like part of Windows to co-opting security tools, Web crooks use a variety of methods to bypass your system's safeguards. mark for My Articles similar articles
InternetNews
December 2, 2010
Targeted Malware, Spam Will Surge in '11 Security software vendor predicts more malware campaigns will use social media to target mobile devices, apps and industry-specific systems. mark for My Articles similar articles
InternetNews
April 8, 2008
Andy Patrizio
Malware Problem Shows no Sign of Slowing It's easier than ever to write a phishing virus that looks like a Facebook app thanks to virus writer's toolkits, Symantec finds. mark for My Articles similar articles
InternetNews
February 23, 2009
Richard Adhikari
Malware Authors Exploit Facebook App Is a bogus application making the rounds on Facebook just a failed marketing ploy? Or something more dangerous? mark for My Articles similar articles
InternetNews
January 30, 2008
Andy Patrizio
Storm's Creators Face a Storm of Their Own Law enforcement knows who created one of the worst worms to hit the Internet. The hard part is arresting them. mark for My Articles similar articles
InternetNews
December 5, 2006
Ed Sutherland
MySpace Hit by QuickTime Worm Hackers attempted to steal the user data of MySpace visitors using an Apple QuickTime video and a vulnerability in the social-networking site. mark for My Articles similar articles
InternetNews
April 2, 2010
Report Tracks the Latest Trends in Cybercrime Sophisticated campaign tracking and dramatically increased use of social networking technologies were two of the top trends in cybercrime in 2009. mark for My Articles similar articles
InternetNews
June 29, 2009
Alex Goldman
Michael Jackson Malware Has Already Hit the Net Trojans attempt to exploit the postmortem interest around the late King of Pop. mark for My Articles similar articles
Bank Systems & Technology
September 15, 2007
Sharon Gaudin
Number Of Hackers Attacking Banks Jumps 81% Hackers no longer need to be technical wizards to set up an operation to steal people's banking information and then rob their accounts. mark for My Articles similar articles
InternetNews
February 24, 2009
Richard Adhikari
Supertoxic Site Infects eWeek.com Hackers attacked news site eWeek through DoubleClick network. mark for My Articles similar articles
Fast Company
Neal Ungerleider
YouTube: Users Are More Likely To View Ads On Mobile A new survey released today by YouTube and consulting firm Ipsos MediaCT says mobile users are 1.4 times more likely to share ads. mark for My Articles similar articles
PC World
February 21, 2007
Ryan Singel
Zero-Day Malware Attacks You Can't Block No matter how diligently you patch your PC, it may still be vulnerable during the first hours of a previously unseen attack. Here's what you should know about zero-day hazards and the security holes they exploit. mark for My Articles similar articles
InternetNews
June 2, 2010
Facebook Users Fend Off 'Likejacking' Attacks Hackers looking to take over Web sessions via Facebook are hiding malware under click-inducing, socially engineered links. mark for My Articles similar articles
InternetNews
September 30, 2010
FBI Busts International Cybercrime Syndicate After a year-long investigation, the FBI and local law enforcement charges 37 hackers with using Zeus Trojan to steal more than $3 million from U.S. banks. mark for My Articles similar articles
InternetNews
June 2, 2010
Blackhat SEO Scam Hits Mop.com Gaming Site One of the world's most popular online gaming sites is under siege from a creative malware scam that attempts to swindle players' personal information and gaming credits. mark for My Articles similar articles
InternetNews
January 20, 2011
New Worm Takes Twitter Users For a Ride Twitter fans have a new malware campaign to worry about this week after security researchers at Kaspersky Lab identified a new scareware come-on. mark for My Articles similar articles
PC World
January 28, 2008
Erik Larkin
Hackers Rig Google to Deliver Malware The latest malware trend should prompt you to think twice about the links you click next time you search. mark for My Articles similar articles