Similar Articles |
|
InternetNews February 24, 2009 Richard Adhikari |
Supertoxic Site Infects eWeek.com Hackers attacked news site eWeek through DoubleClick network. |
InternetNews February 25, 2009 Richard Adhikari |
Online Trust Takes a Hit in Gmail Chat Phishing Security experts are warning that a phishing attack on Google's Gmail's chat feature not only poses a danger to users, but could be a harbinger of things to come. |
InternetNews February 2, 2009 Richard Adhikari |
Are Legitimate Sites the Next Malware Threat? Businesses may be exposing their customers to malware by leaving their sites unpatched, IBM warns in a new study. |
InternetNews May 21, 2009 Alex Goldman |
Phishers Strike Facebook in Latest Assault Facebook is fighting back against the most recent attack. |
InternetNews October 29, 2009 |
Two-Headed Trojan Targets Online Banks New Trojan uses "two-pronged payload" to swipe log-in information, steal electronic funds. |
InternetNews September 18, 2009 |
Hackers Hit 'Curious George' on PBS Web Site Malicious code aimed to infect visitors to the site. |
Entrepreneur July 2005 Amanda C. Kooser |
Pharm's Way Learn how to protect yourself from the latest internet attack, pharming, which can lead to hijacked accounts or identity theft. |
InternetNews December 17, 2008 Richard Adhikari |
Microsoft Patches IE, But Security Issues Remain As usual, the bad guys are ahead in the tug-of-war over security. |
Bank Systems & Technology September 30, 2009 Maria Bruno-Britz |
At Least One Part of the Economy is Growing: Cybercrime Several studies are showing growth in new techniques designed to trick users and even anti-virus programs to gain access to personal data. |
Search Engine Watch January 20, 2010 Jason King |
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. |
InternetNews April 16, 2009 Alex Goldman |
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. |
InternetNews September 15, 2008 Richard Adhikari |
Hackers Hit BusinessWeek With Malware The BusinessWeek.com site was hit by a SQL injection attack and connects users to a sleeper site. |
PC Magazine November 29, 2006 Robert Lemos |
Hacking for Dollars Viruses and worms are so last-decade. Today's PC users have to worry more about online burglary than stolen bandwidth. |
InternetNews September 17, 2007 Andy Patrizio |
Have We Reached The End Of The Virus? Not quite. The old-fashioned virus infestation is fading as the biggest nuisance for computer users in favor of Trojans, Symantec's new malware study finds. |
InternetNews March 3, 2009 Richard Adhikari |
Digg Hackers Strike Next at YouTube Attacks are on the rise, with malware authors dabbling in spreading worms and scareware via comments. |
InternetNews October 3, 2008 Richard Adhikari |
Researcher Claims 200K Web Sites at Risk Online thieves have obtained administrative log-in credentials for more than 200,000 Web sites and modified the code of some of these sites to attack users who visit them, a security researcher claims. |
InternetNews March 25, 2005 Susan Kuchinskas |
Phishing Attacks Jump 26% Phishers and pharmers up attacks, perhaps in response to decreased results. |
InternetNews June 8, 2009 Alex Goldman |
Symantec Says Phishers Have New Tools Automated toolkits are making it easier to attack services such as Facebook, Twitter and financial services brands. |
InternetNews June 6, 2007 Andy Patrizio |
Microsoft IIS a Popular Target For Malware According to a report by Google, malware is as prevalent on Microsoft's Internet Information Servers as the far more popular Apache Web server. |
InternetNews November 5, 2008 Richard Adhikari |
Spammers Latch on to Obama Victory President-elect Barack Obama's campaign leveraged social networking all the way to victory in last night's election. But Obama's online presence has attracted some problems, too. |
Entrepreneur June 2010 Ericka Chickowski |
Protect Your Small Business Against Cyber Attacks Cybercrime costs the economy more than $1 trillion per year, and crooks are increasingly setting their sights on small businesses. A look at the most destructive threats to your network - and what you need to do about them. |
InternetNews October 1, 2009 |
Internet Never More Dangerous: Study Report finds a 585 percent spike in fake anti-malware and security software programs in the first half of 2009. |
InternetNews December 12, 2008 Richard Adhikari |
Web 2.0 and Cloud Tech: A Spammers' Paradise? With the proliferation of the cloud, spammers will find it becoming ever easier to ply their trade. |
InternetNews April 8, 2008 Andy Patrizio |
Malware Problem Shows no Sign of Slowing It's easier than ever to write a phishing virus that looks like a Facebook app thanks to virus writer's toolkits, Symantec finds. |
InternetNews March 21, 2011 Sean Michael Kerner |
Detecting Malware Without Software? New service from Trusteer can pinpoint remote malware running on client PCs. |
InternetNews February 23, 2007 Clint Boulton |
Want a Contract With Your Key Logger? Malware authors are now offering ongoing support and updates for their goods. |
InternetNews January 4, 2008 David Needle |
Wi-Fi Networks Face Virus Threat? Unprotected routers could spread malicious software rapidly to thousands of computers. |
Bank Systems & Technology October 16, 2009 Maria Bruno-Britz |
Trojan Planted in Fake E-mail from IT Dept. Designed to Steal Info From Businesses Trusteer issues a warning to IT departments to be aware of a new phishing attack aimed at enterprises and their confidential information. |
IEEE Spectrum November 2005 Lauren Aaronson |
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. |
InternetNews January 24, 2006 Sean Michael Kerner |
IBM: Users Are The Weak Link in Security IBM is warning in a new report that, though widespread virus outbreaks are on the decline, on the whole online attacks are expected to rise in 2006. The culprit? Highly targeted attacks that rely on naive users to help perpetrate cybercrimes. |
InternetNews January 19, 2009 Richard Adhikari |
Get Ready for Inauguration Spam As Obama prepares to be sworn in, hackers and spammers are gearing up for a field day. |
InternetNews December 18, 2006 Andy Patrizio |
Real Phishing Tool Probes User Gullibility Now you can find the weakest point of security in your company: your staff. Core Security Technologies has updated its CORE IMPACT software to test an internal infrastructure against phishing attacks. |
PC World August 2006 Andrew Brandt |
The 10 Biggest Security Risks You Don't Know About Hackers, scammers, and identity thieves are constantly coming up with new ways to attack your PC and your privacy. Here are the newest perils and how to foil them. |
InternetNews October 26, 2006 Ed Sutherland |
Zombies Control Half of Windows PCs Software giant Microsoft has crowned the "zombie" PC the greatest threat to Windows users. |
InternetNews September 5, 2007 Andy Patrizio |
Made in China: Virus-Laden Web Pages A report finds China has the most compromised Web pages serving up malware. |
PC World February 21, 2007 Ryan Singel |
Zero-Day Malware Attacks You Can't Block No matter how diligently you patch your PC, it may still be vulnerable during the first hours of a previously unseen attack. Here's what you should know about zero-day hazards and the security holes they exploit. |
InternetNews July 14, 2004 Ryan Naraine |
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues. |
PC Magazine September 23, 2008 Matthew D. Sarrel |
A Day in the Life of a Web 2.0 Hacker They harvest data about you, your family, your friends, and your work directly from the Web apps you use and the sites you visit. Here's how they do it. |
InternetNews January 27, 2009 Richard Adhikari |
Spammers Ramp Up Short-Lived Web Sites Sites that are here today, gone tomorrow are difficult to track and block. |
PC Magazine March 7, 2008 Larry Seltzer |
ID Theft: The Next Level The new virus Trojan.Silentbanker regularly patrols the Internet for banking sites it can manipulate. |
Information Today June 2005 Phillip Britt |
No Phishing Allowed Today, the biggest threats for companies and consumers are the new crimes with funny-looking names: phishing, pharming, and spim. |
InternetNews May 26, 2006 Tim Scannell |
Jamie de Guerre, Director, Partner Programs, Cloudmark Spam isn't going anywhere, and Jamie de Guerre's company is tracking its trails through our inboxes. |
InternetNews November 25, 2005 Sean Michael Kerner |
Can You Spot The Phish Attack? According to data from e-mail security firm MailFrontier, only 4 percent of users can spot a phished e-mail 100 percent of the time. |
InternetNews May 19, 2009 |
Gumblar: Biggest Threat on the Web Today? A new trojan has grown quickly, and experts aren't mincing words in describing the danger. |
InternetNews February 12, 2009 Richard Adhikari |
Botnet Operators Gearing Up for Valentine's Day Spammers try to play Cupid, with a dark twist. |
InternetNews February 26, 2009 Richard Adhikari |
Microsoft Clamps Down on Excel Zero-Day Attack Microsoft is taking steps to protect customers from attacks through a zero-day flaw in Microsoft Excel discovered earlier this week. |
PC Magazine June 20, 2007 Larry Seltzer |
Beware Windows Hactivation Threat A new Trojan horse masquerading as a Windows security check is wreaking havoc on PCs. Find out how you can keep your system safe. |
Registered Rep. May 24, 2011 Lauren Barack |
Cyber-Hackers: Faster, Better Equipped Than You Security should be the responsibility of all employees - not just the chief technology officer, or the principal of an advisory firm. |
InternetNews July 6, 2006 Sean Michael Kerner |
Trojans on The March Is it all Microsoft's fault? One security vendor suggests that users may well want to switch to a less-targeted OS. |
InternetNews July 8, 2009 Alex Goldman |
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. |