MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Popular Mechanics
April 2009
Glenn Derene
How Vulnerable is U.S. Infrastructure to a Major Cyber Attack? The next world war might not start with a bang, but with a blackout. mark for My Articles similar articles
Chemistry World
June 10, 2015
Emma Stoye
Security experts warn chemical plants are vulnerable to cyber-attacks Security experts are warning that the computers controlling machinery in chemical plants, power stations and other critical infrastructure are vulnerable to attacks from hackers. mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
PC World
December 20, 2001
Matt Berger
Windows Patch Plugs 'Critical' Holes Microsoft issues a fix for a major flaw -- kept secret for five weeks -- that leaves Windows XP, Me, and some 98 systems vulnerable when online... mark for My Articles similar articles
PC World
May 15, 2001
Frank Thorsberg
Does Your PC Harbor Zombies Waiting to Attack? Unprotected broadband connections can leave your PC open to raids by malicious hackers... mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
PC World
September 1, 2000
Jeff Sengstack
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. mark for My Articles similar articles
PC World
May 2001
Kim Zetter
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... mark for My Articles similar articles
Macworld
May 2001
Mel Beckman
Norton Personal Firewall 1.0 Internet-protection software for individual users needs beefing up... mark for My Articles similar articles
Bank Technology News
April 2007
Rebecca Sausner
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. mark for My Articles similar articles
National Defense
January 2005
Joe Pappalardo
Homeland Defense Research Agency Directs Attention To Cyber Security Fearing the specter of crippling attacks on government and private sector computer systems, federal officials are stepping up efforts to foil cyber terrorism. mark for My Articles similar articles
IndustryWeek
July 22, 2009
Jonathan Katz
Leveraging Lean Designs Think flow and flexibility when designing or relocating to a new facility. mark for My Articles similar articles
Popular Mechanics
April 21, 2009
Glenn Derene
Obama Set to Provide a New Direction for Cyber Security in U.S. In light of shocking security lapses, Obama will soon announce a new direction for the United States to combat cyber threats. mark for My Articles similar articles
National Defense
October 2015
Tim Larkins
U.S. Government Slow to React to Cyber Attacks This is the first in a series of articles looking at critical infrastructure in the United States and exploring the consequences of cyber intrusions. mark for My Articles similar articles
InternetNews
September 15, 2009
U.S. Reviewing Cyber Threat to Power Grid Chinese researcher uses publicly available data to demonstrate how cyber terrorists could knockout entire West Coast grid with relative ease. mark for My Articles similar articles
PC Magazine
October 1, 2003
Brett Glass
Don't Let Your PC Become a Porn Zombie Protect your computer from takeover. We tell you how. mark for My Articles similar articles
Fast Company
Daniel Terdiman
AP Report: U.S. Power Grid Subject To Repeated Foreign Hacks The U.S. power grid is subject to being hacked from abroad, and foreign hackers have gained remote access to American power operations about a dozen times over the last decade. mark for My Articles similar articles
Home Theater
April 1, 2010
Mark Fleischmann
Smart Meters Maybe Not So Smart Security holes may let hackers steal your juice. mark for My Articles similar articles
Bank Technology News
October 2008
Dan Sharplin
Keep the Grid Going and Reap Rewards Instead of simply putting up with higher electric bills and periodic service disruptions, bank chains have a unique opportunity to become part of the energy solution-and to profit from it at the same time. mark for My Articles similar articles
PC World
March 2006
Andrew Sullivan
Programs in Peril Popular applications have more security flaws than Windows does. mark for My Articles similar articles
InternetNews
January 28, 2010
IT Managers Brace for a Barrage of Cyber Attacks Despite increased awareness and new state and federal legislation, most enterprise IT managers expect to be victimized by a major cyber attack in the next five years. mark for My Articles similar articles
T.H.E. Journal
February 2009
John K. Waters
IT Security: Target: The Web No longer focused on the network, hackers have a bull's eye now trained squarely on web-based applications. What, if anything, can school districts do to thwart them? mark for My Articles similar articles
CIO
April 15, 2004
Eric Knorr
Guard the Application Layer Firewalls alone are no longer enough to protect your online assets mark for My Articles similar articles
BusinessWeek
August 22, 2005
Grow & Hamm
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. mark for My Articles similar articles
PC Magazine
February 1, 2006
Cade Metz
The Sorry State of Security Time to face facts: when it comes to our online safety woes, everybody is to blame. mark for My Articles similar articles
PC World
May 2003
Daniel Tynan
Dawn of the Superworm Experts warn that the Slammer worm is a harbinger of worse strains to come. mark for My Articles similar articles
CFO
January 30, 2004
Esther Shein
Spy vs. Spy Companies are spending billions on network security, but staying ahead of hackers may be a pipe dream. mark for My Articles similar articles
Food Processing
May 2005
Mike Pehanich
How to retrofit an aging plant Food processors looking to retrofit aging facilities to get more out of their capital budgets should heed these "rules of retro" before they bring their plants into the 21st century. mark for My Articles similar articles
Wall Street & Technology
September 17, 2007
Melanie Rodier
Online Security Attacks Against Financial Institutions Rapidly Increasing Gone are the days of teenagers sitting in their parents' basements trying to hack into a company's computer system just to prove a point. Today, hacking is an organized crime enterprise -- and it is bigger than ever. mark for My Articles similar articles
National Defense
July 2012
Eric Beidel
iCollege Takes Nation's Cybersecurity Leaders Back to School The iCollege, also known as the Information Resources Management College, is working to fill the gap in knowledge that exists among the senior leadership trying to carve out policies and strategies under which the government's "cyberwarriors" must operate. mark for My Articles similar articles
National Defense
August 2012
Eric Beidel
Companies Rush to Tailor Products to New Cyber-Attacks The cybersecurity marketplace is flooded with products that tout the ability to keep networks and computers safe from intruders. mark for My Articles similar articles
Popular Mechanics
September 2008
Glenn Derene
Top 3 Threats and Countermeasures From the Coming Cyberwar: Glossary An explanation of terms like DDoS, root-level penetration, etc. mark for My Articles similar articles
InternetNews
October 9, 2008
Sean Michael Kerner
No/Low/High-Tech Hacking: It All Matters Don't point the finger at hackers for all security woes. Point hacker tools at yourself to see what's wrong with your stuff, instead. mark for My Articles similar articles
New Architect
February 2003
Joseph C. Panettieri
Dangerous Dealings Reformed hackers want to lend a hand with your IT security strategy. mark for My Articles similar articles
Wall Street & Technology
January 5, 2007
Larry Tabb
Preparing for the Inevitable While electronic thefts can be cleaner, less physical and certainly less bloody, the chance of getting money out of a brokerage or bank illegally is usually greater with a gun than a computer. But as the criminals and terrorists get smarter, we too must raise the bar. mark for My Articles similar articles
Information Today
February 4, 2013
Paula J. Hane
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. mark for My Articles similar articles
Fast Company
Victor Kotsev
Why International Cybercrime Is Going To Keep Getting Worse Many countries have devoted cyber warfare units that know how to cover their tracks, and just about every country now has cyber vigilantes and criminals motivated by their own specific needs, missions or grievances. mark for My Articles similar articles
InternetNews
April 8, 2009
Alex Goldman
U.S. Electricity Grid Compromised The threat is real but, unfortunately, not new. What is new, say reports, is actual evidence of espionage. mark for My Articles similar articles
PC World
July 9, 2002
Dan Verton
Experts Expect a Major Terrorist Cyberattack Security and intelligence officials say an attack will happen, and warn that we're not ready to respond. mark for My Articles similar articles
PC Magazine
December 20, 2006
Robert Lemos
The New Security Threats More secure operating systems mean that attackers are looking elsewhere for holes to sneak through. mark for My Articles similar articles
Fast Company
Michael Grothaus
For First Time, Cyber Attack Causes Widespread Electricity Blackout The first known cyber attack to cause widespread public blackouts has occurred in Ukraine, it is believed. mark for My Articles similar articles
PC Magazine
September 26, 2008
Corinne Iozzio
The 10 Most Mysterious Cyber Crimes The best criminal hacker is the one that isn't caught or even identified. These are 10 of the most infamous unsolved computer crimes (that we know about). mark for My Articles similar articles
InternetNews
February 2, 2009
Richard Adhikari
Are Legitimate Sites the Next Malware Threat? Businesses may be exposing their customers to malware by leaving their sites unpatched, IBM warns in a new study. mark for My Articles similar articles