MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
September 17, 2007
Andy Patrizio
Have We Reached The End Of The Virus? Not quite. The old-fashioned virus infestation is fading as the biggest nuisance for computer users in favor of Trojans, Symantec's new malware study finds. mark for My Articles similar articles
InternetNews
March 19, 2007
Andy Patrizio
What's a New Identity Cost? Less Than a CD. Symantec probes the identity-trading underground and finds personal IDs selling for $14. mark for My Articles similar articles
Fast Company
May 1, 2007
Alex C. Pasquariello
Fast Talk: Threat Reduction Symantec's Zulfikar Ramzan on figuring out online crime before the criminals do. mark for My Articles similar articles
InternetNews
April 8, 2008
Andy Patrizio
Malware Problem Shows no Sign of Slowing It's easier than ever to write a phishing virus that looks like a Facebook app thanks to virus writer's toolkits, Symantec finds. mark for My Articles similar articles
PC Magazine
November 29, 2006
Robert Lemos
Hacking for Dollars Viruses and worms are so last-decade. Today's PC users have to worry more about online burglary than stolen bandwidth. mark for My Articles similar articles
InternetNews
April 10, 2009
Alex Goldman
Security Firms Warn: Data Thieves Love Tax Time There's a significant amount of your valuable personal data traveling over the Internet, and organized crime is working hard to obtain it. mark for My Articles similar articles
Wall Street & Technology
September 17, 2007
Melanie Rodier
Online Security Attacks Against Financial Institutions Rapidly Increasing Gone are the days of teenagers sitting in their parents' basements trying to hack into a company's computer system just to prove a point. Today, hacking is an organized crime enterprise -- and it is bigger than ever. mark for My Articles similar articles
InternetNews
February 24, 2010
Cyber Attacks Hit 75% of Enterprises in 2009 Symantec's latest report has more unsettling news for IT security administrators. mark for My Articles similar articles
InternetNews
August 3, 2009
Alex Goldman
Mobile, Social Networks Threaten IT: Symantec IT management is getting tougher as new threats (e.g. 'scareware') emerge and old ones persist. mark for My Articles similar articles
InternetNews
October 27, 2010
Malware Scams Pick Up In Retail Sector Targeted attacks are becoming more and more common as hackers seek out specific individuals or groups to steal proprietary information. mark for My Articles similar articles
Popular Mechanics
February 2006
Brian Krebs
It's 10 PM. Do You Know Where Your Identity Is? Global identity thieves may know their way around your computer better than you do. Learn how to protect yourself in the scary new world of zombies, RATs, Trojan horses and evil twins. mark for My Articles similar articles
InternetNews
April 17, 2009
Alex Goldman
Report: Credit Cards Plentiful in Crime Networks There are so many credit cards in criminal markets that their price has dropped, leading to a new target: PIN numbers. mark for My Articles similar articles
Investment Advisor
June 2008
Irace & Mehta
Security in a New Age How to protect your firm from 21st century online criminals mark for My Articles similar articles
InternetNews
March 3, 2005
Roy Mark
New Senate Bill Looks to Hook Phishers The Anti-Phishing Act of 2005 targets both the e-mail bait and the Web site switch by entering two new crimes into the U.S. Code. mark for My Articles similar articles
InternetNews
October 31, 2007
Andy Patrizio
Symantec's Latest: Customized Threat Protection Symantec announced a custom threat analysis and protection service through its Global Services Security Response unit. Managed Threat Analysis, is designed to help companies facing more targeted attacks from criminals looking to steal intellectual property. mark for My Articles similar articles
InternetNews
November 23, 2009
IBM Outlines Top Security Trends for 2010 IBM's X-Force security team sees cyber crooks getting social and heading for the clouds. mark for My Articles similar articles
Bank Systems & Technology
June 24, 2008
Lisa Valentine
Peter Makohon Keeps Wachovia Secure on the Cyber Front Lines Wachovia's VP of information security says protecting the bank's network against ever more sophisticated attacks is a constant challenge that requires eternal vigilance. mark for My Articles similar articles
Searcher
October 2007
Paul S. Piper
Phish Pharming: A Newer, More Profitable Aquaculture Detecting e-mail scams. mark for My Articles similar articles
National Defense
October 2007
Breanne Wagner
Computer Crimes Keep Government and Industry on the Defensive The complexity of new malicious code and the elusive nature of cyber attackers have become significant impediments to detecting or preventing most intrusions. mark for My Articles similar articles
InternetNews
November 29, 2007
Andy Patrizio
Cyber Crime Grows More Dangerous And Sophisticated McAfee study finds online threats are getting more complex and brazen in what they target, like the U.S. military. mark for My Articles similar articles
InternetNews
June 8, 2009
Alex Goldman
Symantec Says Phishers Have New Tools Automated toolkits are making it easier to attack services such as Facebook, Twitter and financial services brands. mark for My Articles similar articles
Bank Technology News
September 2010
Tom Leuchtner
Patrolling the Neighborhood Cyber criminals are employing increasingly sophisticated methods to perpetrate financial crimes. mark for My Articles similar articles
BusinessWeek
July 3, 2006
Dean Foust
ID Theft: More Hype Than Harm Law enforcement officials say the criminals tend not to follow through after stealing personal data. mark for My Articles similar articles
PC World
February 3, 2003
Paul Roberts
The Net Is Dangerous, Research Says Attack rates decline, but worms and software flaws keep cyberspace hazardous, Symantec reports. mark for My Articles similar articles
InternetNews
July 28, 2010
Most Data Breaches Perpetrated by Cyber Gangs Organized crime syndicates, many of them based or operated from outside the U.S., are overwhelmingly to blame for coordinated cyber attacks, according to a study by Verizon and the U.S. Secret Service. mark for My Articles similar articles
InternetNews
January 18, 2011
Attack Toolkits Spark New Malware Strains Do-it-yourself malware kits are all the rage online and they're making life much easier for cyber-criminals looking to turn a quick buck. mark for My Articles similar articles
PC World
December 2004
Bob Tedeschi
Protect Your Identity Phishers and other online thieves are targeting your money and personal data--and they're getting sneakier. Here's how to defend yourself, and how to erase the damage if you get scammed. mark for My Articles similar articles
InternetNews
March 23, 2010
FBI Underboss Outlines Anatomy of a Cyber Gang As cyber criminals grow ever more sophisticated and organized, law enforcement agencies have had to step up their game to keep pace. One of the top men at the FBI shares what the bureau is doing to combat cyber crime. mark for My Articles similar articles
InternetNews
September 20, 2005
Roy Mark
Malicious Code For Profit New trend finds shifts toward attacks seeking confidential information. mark for My Articles similar articles
InternetNews
September 23, 2005
Tim Gray
Symantec Lands Anti-Phish Firm Security software giant Symantec is expanding its line of products with the acquisition of behavior-based security and anti-phishing firm WholeSecurity. mark for My Articles similar articles
PC World
August 2006
Andrew Brandt
The 10 Biggest Security Risks You Don't Know About Hackers, scammers, and identity thieves are constantly coming up with new ways to attack your PC and your privacy. Here are the newest perils and how to foil them. mark for My Articles similar articles
Information Today
June 2005
Phillip Britt
No Phishing Allowed Today, the biggest threats for companies and consumers are the new crimes with funny-looking names: phishing, pharming, and spim. mark for My Articles similar articles
InternetNews
October 3, 2006
Roy Mark
Cyber Criminals Turn to Home Users Phishing and spam are on a dramatic rise as home users become the prime targets of online criminals. Attacks are up 81 percent over the last six months and spam jumped 50 percent over the same period. mark for My Articles similar articles
AskMen.com
Bernie Alexander
Cyber Crime: The Wild West, Online Forget about breaking and entering, aggravated assault and armed robbery. Cyber crime is taking over. mark for My Articles similar articles
Bank Technology News
April 1, 2008
Joe Sowerby
ID-Theft Fears Keep Clients Off the Web Adoption of online banking is increasing, but not nearly at the rate of broadband adoption. The main reason: fear of online identity fraud. mark for My Articles similar articles
PC World
February 26, 2007
Robert McMillan
Phishing Sites Explode on the Web Online criminals are thriving even in the face of new automated defenses. mark for My Articles similar articles
InternetNews
July 7, 2009
Alex Goldman
Symantec: USB Keys Threaten the Enterprise As criminals innovate to attack PCs, Symantec promised to continue to fight them. mark for My Articles similar articles
InternetNews
February 16, 2007
Ed Sutherland
Symantec Sounds Warning on Router Passwords Symantec warns on a vulnerability in some home broadband routers. mark for My Articles similar articles
Bank Systems & Technology
August 27, 2009
Maria Bruno-Britz
U.S. Small Businesses Are Scammers' New Targets Cyber crooks in Eastern Europe have begun to prey upon smaller companies in their efforts to steal. mark for My Articles similar articles
PC World
June 1, 2008
Erik Larkin
Web 2.0 Sites a Thriving Marketplace for Malware Malicious software makers are using social networks, video sites, and blogs to peddle their wares to other online criminals. mark for My Articles similar articles
U.S. Banker
February 2005
Michael Sisk
A Phish Story Phishing attacks (in which thieves send mass e-mails supposedly from reputable businesses) are expected to more than double in 2005, and are spreading to small banks. mark for My Articles similar articles
InternetNews
May 13, 2010
One Gang Responsible For Most Phishing Attacks More than two-thirds of all phishing attacks in the second half of 2009 were the work of one gang, according to an anti-phishing group. mark for My Articles similar articles
InternetNews
April 20, 2010
Targeted, DIY Malware Here to Stay: Symantec Symantec's latest threat report provides plenty of disconcerting news for IT managers charged with safeguarding critical enterprise data. mark for My Articles similar articles
Search Engine Watch
June 5, 2010
Johnny Widerlund
Avoiding Online Risks Kicking Off with the 2010 FIFA World Cup Cyber criminals will continue hijacking current news and events to serve malware. A rundown of the most prevalent online security risks, and how to avoid them. mark for My Articles similar articles
InternetNews
July 7, 2009
Alex Goldman
FBI, DOJ Agents: We're Gaining on Cyber Crime While the Internet helps criminals organize and to reach across borders, it can also help law enforcement catch them. mark for My Articles similar articles
Bank Technology News
April 2004
Michael Grebb
Forgotten Fraud: Counterfeit Checks Banks lost $698 million from scams in 2001 mark for My Articles similar articles
U.S. Banker
May 2004
Counterfeit Checks are The Forgotten Fraud With all the attention on ID theft, old-fashioned check fraud is getting easier than ever. It may actually account for the majority of cases categorized as identity-related crime. mark for My Articles similar articles
CIO
December 16, 2009
Robert McMillan
Five Things You Need to Know About Social Engineering How hackers can steal your data. mark for My Articles similar articles
Fast Company
March 2000
Rekha Balu
Cyber Crime Report from the Futurist mark for My Articles similar articles
Insurance & Technology
November 5, 2008
Prasad Balakrishnan
Cyber Attacks Can Come in Many Shapes and Sizes Cyber threats aimed at insurance companies are constantly evolving and growing. Unfortunately the pace of adoption of cyber protection mechanisms has not caught up. mark for My Articles similar articles