MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
January 14, 2009
Richard Adhikari
New York Plans Application Security Program Developers must straighten up and fly right if they want to do business with the Empire State. mark for My Articles similar articles
InternetNews
February 18, 2010
SANS Names Mistakes That Cause Vulnerability If programmers were perfect, there would be no vulnerabilities for the bad guys to exploit. SANS Institute has listed the most common mistakes leading to the most common exploits. mark for My Articles similar articles
InternetNews
February 9, 2010
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. mark for My Articles similar articles
InternetNews
July 31, 2006
Clint Boulton
SQL Injection Threatens to Needle Web Users A scripting flaw that lets perpetrators pull any content from a database is a scary tool for IT admins. mark for My Articles similar articles
InternetNews
February 26, 2009
Richard Adhikari
Experts Push Guidelines to Halt Data Breaches After a series of high-profile attacks and security lapses, government and private sector experts pull together a list of recommendations. mark for My Articles similar articles
InternetNews
February 20, 2009
Richard Adhikari
Group Warns of Top Web 2.0 Security Threats We can't stand in the path of progress with Web 2.0 technologies, but we can make it safer, an industry group says. mark for My Articles similar articles
Bank Technology News
November 2007
Developers Face Secure Coding Exams The Secure Programming Council is a 40-organization board that's establishing "essential skills" standards and exams in a variety of programming languages. mark for My Articles similar articles
InternetNews
February 5, 2010
SQL Injections Led to 60% of UK Data Breaches Malicious hackers are relying on growing numbers of increasingly complex SQL attacks to get at companies' data. mark for My Articles similar articles
InternetNews
May 1, 2006
David Miller
Zero-Day Attacks an Ongoing Menace Security report from the SANS Institute details biggest Internet vulnerabilities. mark for My Articles similar articles
InternetNews
October 11, 2004
Ryan Naraine
Web Servers, BIND Top 2004 Vulnerabilities List The SANS institute breaks down the top 10 vulnerabilities in Windows and Unix systems. mark for My Articles similar articles
InternetNews
July 25, 2005
Sean Michael Kerner
SANS: No Safety From Vulnerabilities IE vulnerabilities still abound, but Apple, Mozilla and Real Player users have little to gloat about. mark for My Articles similar articles
InternetNews
May 22, 2006
Ed Sutherland
Word Attack Hails From China Security researchers warn Microsoft Word zero-day exploit is aimed at government e-mail systems. mark for My Articles similar articles
InternetNews
August 18, 2009
U.S. Fingers TJX Hacker in Heartland Breach Attacks on Heartland, 7-Eleven and Hannaford Bros. netted the criminals 130 million credit card numbers, according to the DoJ. mark for My Articles similar articles
InternetNews
November 22, 2005
Sean Michael Kerner
Hackers Change Course A new SANS 2005 Top 20 list of Internet vulnerabilities shows a shift in what attackers are going after. And it's not just operating systems anymore. mark for My Articles similar articles
InternetNews
October 28, 2009
McAfee: SMBs Can't Afford to Ignore Cyber Threats Security software vendor says small- and midsized companies are becoming a popular target for hackers and online thieves. mark for My Articles similar articles
InternetNews
November 17, 2009
McAfee Outlines Growing Cyber Warfare Threat McAfee's study finds politically motivated cyber attacks are on the rise internationally. mark for My Articles similar articles
InternetNews
April 8, 2009
Alex Goldman
Pentagon Claims $100M in Cybersecurity Costs The threat is real, but so is the fight for budget financing in Washington. mark for My Articles similar articles
National Defense
August 2014
Stew Magnuson
Cyber Labor Shortage Not What it Seems, Experts Say Only a handful of universities offering cyber security degrees are producing graduates who have "hard skills." mark for My Articles similar articles
InternetNews
December 8, 2008
Richard Adhikari
Obama Faces New Calls for Cybersecurity Revamp National security think tank pushes for new U.S. oversight and regulations to combat Internet threats. mark for My Articles similar articles
The Motley Fool
October 11, 2005
Fixing Your Credit Report Errors Here's how -- and why! -- you should correct your credit report. mark for My Articles similar articles
Popular Mechanics
June 30, 2008
Glenn Derene
Inside NSA Red Team Secret Ops With Government's Top Hackers Highly skilled firewall-crackers help the government keep the bad guys out of the country's computer systems. mark for My Articles similar articles
The Motley Fool
July 1, 2004
Fix Your Credit Report Errors You can -- and should! -- make sure your credit report is accurate. mark for My Articles similar articles
CIO
June 26, 2009
Kim S. Nash
Obama's Cybersecurity Push: What It Means for CIOs President Obama aims to fix U.S. cybersecurity, but can the feds hit a moving target? Not without private sector support and practical solutions. mark for My Articles similar articles
Bank Technology News
May 1, 2008
Rebecca Sausner
Homeland Security: Manhattan Project for Cyber Sec The federal government has begun to offer details on an expensive, and targeted, defensive cyber-security plan to protect our nation's financial markets. mark for My Articles similar articles
InternetNews
September 8, 2006
Roy Mark
Five Years Later, Are We More Secure? We may be more secure in some ways since 9/11, but network security isn't one of them. mark for My Articles similar articles
National Defense
May 2014
Stew Magnuson
New Cyber Hygiene Campaign Seeks to Curtail Attacks The Center for Internet Security and the Council on CyberSecurity, working with the Department of Homeland Security, the National Governors Association and the Governors Homeland Security Advisors Council launched the Cyber Hygiene Campaign in April. mark for My Articles similar articles
InternetNews
December 1, 2005
Sean Michael Kerner
Backup Software Under Attack A SANS report on top security vulnerabilities finds that backup and recovery software has become a favorite target of hackers. mark for My Articles similar articles
InternetNews
February 10, 2009
Kenneth Corbin
Obama Calls for Cybersecurity Review After a string of breaches and data leaks, president orders two-month interagency review to shore up computing infrastructure. mark for My Articles similar articles
InternetNews
April 23, 2010
SMBs Often a Weak Link in Cyber Security Lax data security and a lack of resources could be exposing small and midsized businesses - and their customers - to risk. mark for My Articles similar articles
Information Today
February 4, 2013
Paula J. Hane
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. mark for My Articles similar articles
InternetNews
May 28, 2009
Kenneth Corbin
Counting Down to White House Cyber Czar As the time draws near, many questions remain about how Obama will shake up government cybersecurity. mark for My Articles similar articles
National Defense
October 2015
Tim Larkins
U.S. Government Slow to React to Cyber Attacks This is the first in a series of articles looking at critical infrastructure in the United States and exploring the consequences of cyber intrusions. mark for My Articles similar articles
National Defense
March 2015
Sarah Sicard
North Korean Cyber Attack on Sony Poses Tough Security Questions While cyber attacks are on the rise around the world -- both from inside and outside threats -- this was the first known instance of a country deliberately causing destruction to a U.S. company's data. mark for My Articles similar articles
InternetNews
July 8, 2009
Alex Goldman
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. mark for My Articles similar articles
PC World
March 2006
Andrew Sullivan
Programs in Peril Popular applications have more security flaws than Windows does. mark for My Articles similar articles
InternetNews
February 18, 2009
Sean Michael Kerner
Black Hat: U.S. Needs 'Cyberweapons' for Security An expert asks whether it's time for the U.S. to take aggressive measures to rein in national network security. mark for My Articles similar articles
Insurance & Technology
November 5, 2008
Prasad Balakrishnan
Cyber Attacks Can Come in Many Shapes and Sizes Cyber threats aimed at insurance companies are constantly evolving and growing. Unfortunately the pace of adoption of cyber protection mechanisms has not caught up. mark for My Articles similar articles
InternetNews
August 3, 2010
Most Don't Object to Cyber Spying: Report A survey by a prominent security software firm reveals that most people don't mind if the government uses cyber spying techniques to keep tabs on our enemies. mark for My Articles similar articles
InternetNews
April 17, 2006
Tim Scannell
Cyber Sleuths Call For New 'Smart Swarms' Security honchos say new threats from cyber-terrorism require a fresh approach to network protection, like 'smart swarming.' mark for My Articles similar articles
InternetNews
February 24, 2010
Cyber Attacks Hit 75% of Enterprises in 2009 Symantec's latest report has more unsettling news for IT security administrators. mark for My Articles similar articles
The Motley Fool
July 13, 2009
Rich Smith
Welcome! You've Got Hackers! Someone threw a cyber war this week. It's great to know that the government is spending billions hardening the IT system against more competent attackers, but what we really need here is a solution to the real problem: Identifying who the attackers are. mark for My Articles similar articles
InternetNews
December 13, 2005
Roy Mark
Cyber Security Group Flunks Washington Neither the Bush administration nor Congress is providing significant leadership or legislation to secure the United States against cyber attacks, the Cyber Security Industry Alliance charged Tuesday. mark for My Articles similar articles
InternetNews
November 29, 2007
Andy Patrizio
Cyber Crime Grows More Dangerous And Sophisticated McAfee study finds online threats are getting more complex and brazen in what they target, like the U.S. military. mark for My Articles similar articles
InternetNews
April 16, 2009
Alex Goldman
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. mark for My Articles similar articles
National Defense
January 2016
Stephanie Meloni
Defense Department Assuming Growing Cyber Security Role The Defense Department sees cyber as a domain that spans air, land, sea and space, but it struggles with how to handle it as a war fighting domain to best protect the nation. mark for My Articles similar articles
InternetNews
December 5, 2008
Richard Adhikari
Cyber Threats Await Next Homeland Security Chief How might Obama's appointment to head the DHS turn things around for the department? Experts weigh in. mark for My Articles similar articles
InternetNews
December 7, 2004
Roy Mark
Execs Call for Tighter Cyber Security Control Security alliance claims White House and DHS are not doing enough to protect against cyber attacks. mark for My Articles similar articles
CIO
September 28, 2014
George V. Hulme
Data Breaches Rise as Cybercriminals Continue to Outwit IT Security breaches rise again this year, costing an average of $415,000, as security pros fail to keep pace with cybercrime innovation. mark for My Articles similar articles
InternetNews
April 10, 2008
Susan Kuchinskas
An Imperfect (Cyber) Storm The federal government has been working with private companies and security vendors to develop protocols and communications systems that will let them respond quickly and share relevant information on threats and attacks. mark for My Articles similar articles
Popular Mechanics
April 21, 2009
Glenn Derene
Obama Set to Provide a New Direction for Cyber Security in U.S. In light of shocking security lapses, Obama will soon announce a new direction for the United States to combat cyber threats. mark for My Articles similar articles