MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
August 26, 2009
Apple Adding Malware Defense to Snow Leopard? Apple may be following Microsoft's lead in offering free protection for its users in the upcoming release of Mac OS X Snow Leopard. mark for My Articles similar articles
InternetNews
January 5, 2009
Richard Adhikari
Phishers Hit Twitter Users Obama, Britney Spears and Bill O'Reilly among reported victims of phony Twitter messages that also included an iPhone scam. mark for My Articles similar articles
InternetNews
September 2, 2009
Malware Capitalizes on California Wildfires Macs and PCs are under attack as concerned netizens search for information about the fires. mark for My Articles similar articles
InternetNews
June 3, 2009
Alex Goldman
Scareware Arrives on Twitter in Latest Attack As new Web 2.0 threats proliferate, business IT departments struggle with basic tasks such as patch management. mark for My Articles similar articles
InternetNews
February 15, 2008
Andy Patrizio
Malware Threatens Mac Users: Report Survey shows Apple users expect the bad guys to follow them, but the good news is the evildoers are looking the other way. mark for My Articles similar articles
InternetNews
November 2, 2010
Sophos Serves Up Free Security App for Macs Sophos firm is giving away free anti-malware software for the Mac OS. mark for My Articles similar articles
InternetNews
December 2, 2008
Sean Michael Kerner
Apple Recommends Antivirus for Mac Users Apple quietly suggests customers use antivirus software, though threats are still few in number. mark for My Articles similar articles
InternetNews
September 25, 2009
Twitter URLs Again Under Siege by Hackers Hackers are taking advantage of the popular microblogging site's limitations to spread malware. mark for My Articles similar articles
InternetNews
June 4, 2009
Alex Goldman
Fake Microsoft E-Mail Carries Real Malware Security experts are warning of deceptive e-mails that claim that Microsoft Outlook needs an update. mark for My Articles similar articles
InternetNews
May 28, 2009
Alex Goldman
Flood of Fake Western Union E-mails Hide Trojan An influx of malware-laden spam, which started two weeks ago, continues today as hackers seek credit card and banking information. mark for My Articles similar articles
InternetNews
September 21, 2010
Twitter Hit With Mouseover Malware Attack Twitter hit with attack that sees hackers embed JavaScript within URLs in tweets that display a pop-up directing users to malicious or pornographic websites. mark for My Articles similar articles
InternetNews
January 19, 2011
Enterprises Weigh Social Nets' Risks, Rewards New survey by security software firm Sophos reveals most companies allow employees to visit social networking sites despite obvious risks. mark for My Articles similar articles
InternetNews
February 25, 2009
Richard Adhikari
Online Trust Takes a Hit in Gmail Chat Phishing Security experts are warning that a phishing attack on Google's Gmail's chat feature not only poses a danger to users, but could be a harbinger of things to come. mark for My Articles similar articles
InternetNews
June 10, 2005
Tim Gray
Trojan Spreads in Michael Jackson Spotlight British anti-virus firm Sophos says hackers are slamming computers around the world with a Trojan virus by sending e-mails claiming Michael Jackson has tried to kill himself. mark for My Articles similar articles
InternetNews
September 23, 2009
Do Not Pass Go: Malware Taps Phony 'Monopoly' Unsolicited invitation to play an online version of the popular board game can turn your computer into a spam-spewing zombie. mark for My Articles similar articles
Search Engine Watch
August 3, 2009
Ron Jones
Link Building Tactics 101, Part 2 Concentrate on offering something of value to the online community/industry to demonstrate why they should visit your site. Focus on the idea of reaching out to others and building quality connections that make sense. mark for My Articles similar articles
InternetNews
July 6, 2006
Sean Michael Kerner
Trojans on The March Is it all Microsoft's fault? One security vendor suggests that users may well want to switch to a less-targeted OS. mark for My Articles similar articles
InternetNews
February 11, 2009
Richard Adhikari
Spammers Hijack Facebook Group of 1.5 Million Facebook site is taken over by get-rich-quick and other familiar spam. mark for My Articles similar articles
InternetNews
July 21, 2009
Alex Goldman
Erin Andrews Virus Infects Search, Blogs The taping of the original video was a Peeping Tom crime that criminals are now exploiting to infect PCs. mark for My Articles similar articles
InternetNews
May 31, 2006
Andy Patrizio
Keylogger Masquerades As Microsoft Alert Would-be identity thieves have turned loose another sneaky means for stealing users' personal information. It comes in the form of a fraudulent e-mail pretending to be from Microsoft that suckers users into installing a key logger. mark for My Articles similar articles
InternetNews
May 15, 2009
Mike Elgan
Does Google's Tweaks Top Twitter? Twitter Search offers more timely results while Google's "Recent results" are better filtered. The best option is to combine them. C'mon, Google: Acquire Twitter already! mark for My Articles similar articles
InternetNews
February 27, 2007
Ed Sutherland
Storm Trojan Takes Social Measures Storm Trojan uses Web mail, blogs and message boards as conduits for spreading malware code. mark for My Articles similar articles
InternetNews
July 22, 2010
Shortened URLs Are Spam Magnets: Gartner Abbreviated URLs are standard operating procedure on Twitter and everyone loves Twitter. So it's no surprise hackers are embedding malware in shortened URLs to evade security apps. mark for My Articles similar articles
InternetNews
June 11, 2009
Alex Goldman
Malware Keeps Creeping Onto Mac OS X The Apple Mac is still seeing far fewer attacks than Windows experiences, but researchers say there's a disturbing trend at work. mark for My Articles similar articles
Search Engine Watch
May 26, 2009
Mark Jackson
Content is King...IF You Promote It Social media tools can play an integral role in promotion of your content and generating links. The promotion of high quality content can and will lead to natural link generation. mark for My Articles similar articles
InternetNews
August 24, 2004
Sharon Gaudin
Worm Uses Webcams to Spy on Users A new variant of the Rbot worm has the ability to take over users' webcams and use them to spy on people in their offices and homes. mark for My Articles similar articles
InternetNews
February 12, 2009
Sean Gallagher
'Don't Click' Tweetbomb Stresses Twitter Service The exploit, hijacked Twitter users' status to spread itself around the microblogging network. mark for My Articles similar articles
InternetNews
May 4, 2009
Kenneth Corbin
Nielsen Sticking by Twitter Quitter Analysis Nielsen says off-site Twitter usage doesn't improve retention rate. mark for My Articles similar articles
InternetNews
January 20, 2011
New Worm Takes Twitter Users For a Ride Twitter fans have a new malware campaign to worry about this week after security researchers at Kaspersky Lab identified a new scareware come-on. mark for My Articles similar articles
InternetNews
May 19, 2009
Gumblar: Biggest Threat on the Web Today? A new trojan has grown quickly, and experts aren't mincing words in describing the danger. mark for My Articles similar articles
InternetNews
February 23, 2009
Richard Adhikari
Malware Authors Exploit Facebook App Is a bogus application making the rounds on Facebook just a failed marketing ploy? Or something more dangerous? mark for My Articles similar articles
The Motley Fool
August 26, 2009
Tim Beyers
This IPO Won't Happen Soon A major security flaw still plagues Twitter. mark for My Articles similar articles
InternetNews
May 15, 2009
Alex Goldman
Facebook Attacks Threaten All Web Sites Why would users want your user name and password? Perhaps because it could give them access to your money and your e-mail. mark for My Articles similar articles
InternetNews
November 4, 2009
Kaspersky Offers Macs a Security Blanket Antivirus software designed to thwart growing malware threat to Macs. mark for My Articles similar articles
The Motley Fool
November 5, 2009
Rick Aristotle Munarriz
Amazon, Twitter ... and Spam? Amazon.com, the country's leading e-tailer, is doing what even Twitter hasn't been able to do: Make money on Twitter. mark for My Articles similar articles
InternetNews
December 10, 2009
Yahoo Throws More Love Twitter's Way Expanded integration of relevant Twitter tweets into search results keeps pace with announcements by Google and Microsoft. mark for My Articles similar articles
Search Engine Watch
May 19, 2009
Mark Jackson
Is Twitter a Google Killer? Not Yet The easier a search engine is to manipulate, the less likely it is to deliver quality results. Right now, Twitter Search is just too easy to manipulate. mark for My Articles similar articles
InternetNews
September 2, 2010
Twitter Link-Shortening Raises Privacy Concerns Amid a wider rollout of new security and third-party app authentication enhancements, one feature has some Twitter users worried. mark for My Articles similar articles
InternetNews
November 2, 2007
Andy Patrizio
Barbarians at the Mac's Gates Leopard's security gets hammered by security pros and a new Mac virus has emerged, proving that - even for Apple - popularity comes at a price. mark for My Articles similar articles
Search Engine Watch
February 21, 2011
Andrew Girdwood
14 Tips for Making the Most of Feeds Seven tips for using feeds from other sites to ensure you're among the first writing about a topic, and seven tips for using your own site's feeds to grow and keep your audience. mark for My Articles similar articles
InternetNews
November 30, 2005
Tim Gray
Phishers Play on IRS Web Site Thieves are exploiting the fear of Uncle Sam's most notorious agency to steal identities. mark for My Articles similar articles
InternetNews
February 2, 2010
Facebook Seen as Biggest Threat to IT Security New survey from Sophos highlights concerns about using social media sites inside the enterprise. mark for My Articles similar articles
PC Magazine
August 11, 2008
Matthew D. Sarrel
The Rise of Blended Threats Technology has made the world smaller, and therefore more dangerous. mark for My Articles similar articles
PC Magazine
February 17, 2009
Nick Douglas
Six Ways to Make Twitter Useful Twitter's usefulness goes far beyond finding out what strangers ate for lunch. Read breaking news, get customer service, or even chat with your favorite celebrities. mark for My Articles similar articles
Search Engine Watch
May 18, 2010
Eric Enge
SEO Link Building is Just Like Business Development Today's link building has become a cross between old-fashioned public relations and business development. Let's examine some of the modern methods of building links. mark for My Articles similar articles
InternetNews
February 17, 2009
Sean Gallagher
Social Networks a Magnet for Malware Just like the crooks robbed the banks because that's where the money is, malware will go where the people are. mark for My Articles similar articles
InternetNews
December 3, 2010
Phony Holiday Tweets Hide Malware Shortened URLs posted on Twitter may not lead to the holiday-themed sites listed. mark for My Articles similar articles
InternetNews
July 13, 2010
New Malware Scam Picks On eBay Fans Hackers know where people like to go online and what brands the average Internet user responds to when they conceive their illicit plots. This time around, it's eBay users they've targeted. mark for My Articles similar articles
Search Engine Watch
June 15, 2010
Kevin Gibbons
10 Things You Need to Know to Get Started on Twitter Doing social media badly is far worse than failing to do it. Tips on how to get started on Twitter and use it effectively to spread the word about your brand or small business. mark for My Articles similar articles
IEEE Spectrum
October 2007
Paul McFedries
All A-Twitter The major buzz in microblogging centers around Twitter, a site that combines social networking and microblogging. mark for My Articles similar articles