MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
February 24, 2009
Richard Adhikari
Supertoxic Site Infects eWeek.com Hackers attacked news site eWeek through DoubleClick network. mark for My Articles similar articles
InternetNews
February 25, 2009
Richard Adhikari
Online Trust Takes a Hit in Gmail Chat Phishing Security experts are warning that a phishing attack on Google's Gmail's chat feature not only poses a danger to users, but could be a harbinger of things to come. mark for My Articles similar articles
InternetNews
February 2, 2009
Richard Adhikari
Are Legitimate Sites the Next Malware Threat? Businesses may be exposing their customers to malware by leaving their sites unpatched, IBM warns in a new study. mark for My Articles similar articles
InternetNews
May 21, 2009
Alex Goldman
Phishers Strike Facebook in Latest Assault Facebook is fighting back against the most recent attack. mark for My Articles similar articles
InternetNews
October 29, 2009
Two-Headed Trojan Targets Online Banks New Trojan uses "two-pronged payload" to swipe log-in information, steal electronic funds. mark for My Articles similar articles
InternetNews
September 18, 2009
Hackers Hit 'Curious George' on PBS Web Site Malicious code aimed to infect visitors to the site. mark for My Articles similar articles
Entrepreneur
July 2005
Amanda C. Kooser
Pharm's Way Learn how to protect yourself from the latest internet attack, pharming, which can lead to hijacked accounts or identity theft. mark for My Articles similar articles
InternetNews
December 17, 2008
Richard Adhikari
Microsoft Patches IE, But Security Issues Remain As usual, the bad guys are ahead in the tug-of-war over security. mark for My Articles similar articles
Bank Systems & Technology
September 30, 2009
Maria Bruno-Britz
At Least One Part of the Economy is Growing: Cybercrime Several studies are showing growth in new techniques designed to trick users and even anti-virus programs to gain access to personal data. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
InternetNews
April 16, 2009
Alex Goldman
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. mark for My Articles similar articles
InternetNews
September 15, 2008
Richard Adhikari
Hackers Hit BusinessWeek With Malware The BusinessWeek.com site was hit by a SQL injection attack and connects users to a sleeper site. mark for My Articles similar articles
PC Magazine
November 29, 2006
Robert Lemos
Hacking for Dollars Viruses and worms are so last-decade. Today's PC users have to worry more about online burglary than stolen bandwidth. mark for My Articles similar articles
InternetNews
September 17, 2007
Andy Patrizio
Have We Reached The End Of The Virus? Not quite. The old-fashioned virus infestation is fading as the biggest nuisance for computer users in favor of Trojans, Symantec's new malware study finds. mark for My Articles similar articles
InternetNews
March 3, 2009
Richard Adhikari
Digg Hackers Strike Next at YouTube Attacks are on the rise, with malware authors dabbling in spreading worms and scareware via comments. mark for My Articles similar articles
InternetNews
October 3, 2008
Richard Adhikari
Researcher Claims 200K Web Sites at Risk Online thieves have obtained administrative log-in credentials for more than 200,000 Web sites and modified the code of some of these sites to attack users who visit them, a security researcher claims. mark for My Articles similar articles
InternetNews
March 25, 2005
Susan Kuchinskas
Phishing Attacks Jump 26% Phishers and pharmers up attacks, perhaps in response to decreased results. mark for My Articles similar articles
InternetNews
June 8, 2009
Alex Goldman
Symantec Says Phishers Have New Tools Automated toolkits are making it easier to attack services such as Facebook, Twitter and financial services brands. mark for My Articles similar articles
InternetNews
June 6, 2007
Andy Patrizio
Microsoft IIS a Popular Target For Malware According to a report by Google, malware is as prevalent on Microsoft's Internet Information Servers as the far more popular Apache Web server. mark for My Articles similar articles
InternetNews
November 5, 2008
Richard Adhikari
Spammers Latch on to Obama Victory President-elect Barack Obama's campaign leveraged social networking all the way to victory in last night's election. But Obama's online presence has attracted some problems, too. mark for My Articles similar articles
Entrepreneur
June 2010
Ericka Chickowski
Protect Your Small Business Against Cyber Attacks Cybercrime costs the economy more than $1 trillion per year, and crooks are increasingly setting their sights on small businesses. A look at the most destructive threats to your network - and what you need to do about them. mark for My Articles similar articles
InternetNews
October 1, 2009
Internet Never More Dangerous: Study Report finds a 585 percent spike in fake anti-malware and security software programs in the first half of 2009. mark for My Articles similar articles
InternetNews
December 12, 2008
Richard Adhikari
Web 2.0 and Cloud Tech: A Spammers' Paradise? With the proliferation of the cloud, spammers will find it becoming ever easier to ply their trade. mark for My Articles similar articles
InternetNews
April 8, 2008
Andy Patrizio
Malware Problem Shows no Sign of Slowing It's easier than ever to write a phishing virus that looks like a Facebook app thanks to virus writer's toolkits, Symantec finds. mark for My Articles similar articles
InternetNews
March 21, 2011
Sean Michael Kerner
Detecting Malware Without Software? New service from Trusteer can pinpoint remote malware running on client PCs. mark for My Articles similar articles
InternetNews
February 23, 2007
Clint Boulton
Want a Contract With Your Key Logger? Malware authors are now offering ongoing support and updates for their goods. mark for My Articles similar articles
InternetNews
January 4, 2008
David Needle
Wi-Fi Networks Face Virus Threat? Unprotected routers could spread malicious software rapidly to thousands of computers. mark for My Articles similar articles
Bank Systems & Technology
October 16, 2009
Maria Bruno-Britz
Trojan Planted in Fake E-mail from IT Dept. Designed to Steal Info From Businesses Trusteer issues a warning to IT departments to be aware of a new phishing attack aimed at enterprises and their confidential information. mark for My Articles similar articles
IEEE Spectrum
November 2005
Lauren Aaronson
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. mark for My Articles similar articles
InternetNews
January 24, 2006
Sean Michael Kerner
IBM: Users Are The Weak Link in Security IBM is warning in a new report that, though widespread virus outbreaks are on the decline, on the whole online attacks are expected to rise in 2006. The culprit? Highly targeted attacks that rely on naive users to help perpetrate cybercrimes. mark for My Articles similar articles
InternetNews
January 19, 2009
Richard Adhikari
Get Ready for Inauguration Spam As Obama prepares to be sworn in, hackers and spammers are gearing up for a field day. mark for My Articles similar articles
InternetNews
December 18, 2006
Andy Patrizio
Real Phishing Tool Probes User Gullibility Now you can find the weakest point of security in your company: your staff. Core Security Technologies has updated its CORE IMPACT software to test an internal infrastructure against phishing attacks. mark for My Articles similar articles
PC World
August 2006
Andrew Brandt
The 10 Biggest Security Risks You Don't Know About Hackers, scammers, and identity thieves are constantly coming up with new ways to attack your PC and your privacy. Here are the newest perils and how to foil them. mark for My Articles similar articles
InternetNews
October 26, 2006
Ed Sutherland
Zombies Control Half of Windows PCs Software giant Microsoft has crowned the "zombie" PC the greatest threat to Windows users. mark for My Articles similar articles
InternetNews
September 5, 2007
Andy Patrizio
Made in China: Virus-Laden Web Pages A report finds China has the most compromised Web pages serving up malware. mark for My Articles similar articles
PC World
February 21, 2007
Ryan Singel
Zero-Day Malware Attacks You Can't Block No matter how diligently you patch your PC, it may still be vulnerable during the first hours of a previously unseen attack. Here's what you should know about zero-day hazards and the security holes they exploit. mark for My Articles similar articles
InternetNews
July 14, 2004
Ryan Naraine
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues. mark for My Articles similar articles
PC Magazine
September 23, 2008
Matthew D. Sarrel
A Day in the Life of a Web 2.0 Hacker They harvest data about you, your family, your friends, and your work directly from the Web apps you use and the sites you visit. Here's how they do it. mark for My Articles similar articles
InternetNews
January 27, 2009
Richard Adhikari
Spammers Ramp Up Short-Lived Web Sites Sites that are here today, gone tomorrow are difficult to track and block. mark for My Articles similar articles
PC Magazine
March 7, 2008
Larry Seltzer
ID Theft: The Next Level The new virus Trojan.Silentbanker regularly patrols the Internet for banking sites it can manipulate. mark for My Articles similar articles
Information Today
June 2005
Phillip Britt
No Phishing Allowed Today, the biggest threats for companies and consumers are the new crimes with funny-looking names: phishing, pharming, and spim. mark for My Articles similar articles
InternetNews
May 26, 2006
Tim Scannell
Jamie de Guerre, Director, Partner Programs, Cloudmark Spam isn't going anywhere, and Jamie de Guerre's company is tracking its trails through our inboxes. mark for My Articles similar articles
InternetNews
November 25, 2005
Sean Michael Kerner
Can You Spot The Phish Attack? According to data from e-mail security firm MailFrontier, only 4 percent of users can spot a phished e-mail 100 percent of the time. mark for My Articles similar articles
InternetNews
May 19, 2009
Gumblar: Biggest Threat on the Web Today? A new trojan has grown quickly, and experts aren't mincing words in describing the danger. mark for My Articles similar articles
InternetNews
February 12, 2009
Richard Adhikari
Botnet Operators Gearing Up for Valentine's Day Spammers try to play Cupid, with a dark twist. mark for My Articles similar articles
InternetNews
February 26, 2009
Richard Adhikari
Microsoft Clamps Down on Excel Zero-Day Attack Microsoft is taking steps to protect customers from attacks through a zero-day flaw in Microsoft Excel discovered earlier this week. mark for My Articles similar articles
PC Magazine
June 20, 2007
Larry Seltzer
Beware Windows Hactivation Threat A new Trojan horse masquerading as a Windows security check is wreaking havoc on PCs. Find out how you can keep your system safe. mark for My Articles similar articles
Registered Rep.
May 24, 2011
Lauren Barack
Cyber-Hackers: Faster, Better Equipped Than You Security should be the responsibility of all employees - not just the chief technology officer, or the principal of an advisory firm. mark for My Articles similar articles
InternetNews
July 6, 2006
Sean Michael Kerner
Trojans on The March Is it all Microsoft's fault? One security vendor suggests that users may well want to switch to a less-targeted OS. mark for My Articles similar articles
InternetNews
July 8, 2009
Alex Goldman
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. mark for My Articles similar articles