MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
September 29, 2004
Ryan Naraine
Large Scale IM Virus Attack Feared The first signs of a large-scale virus attack are spotted on newsgroups regarding a Windows flaw in the way JPEG images are processed. mark for My Articles similar articles
InternetNews
June 28, 2004
Ryan Naraine
Malware Attack Thwarted but Danger Lurks Critical IE vulnerability remains unpatched. mark for My Articles similar articles
PC Magazine
November 30, 2005
Jane Pinckard
Trojan Invades PSPs In early October, Symantec Security Response experts identified Trojan.PSPBrick, the first Trojan horse that targets Sony PlayStation Portable systems, as a Category 1 threat. mark for My Articles similar articles
InternetNews
October 17, 2005
Tim Gray
IRCbot Trojan Spoofing Skype Researchers discover a new variant of the IRCbot Trojan disguised as the latest release of the popular Skype VoIP software client version 1.4. mark for My Articles similar articles
InternetNews
February 24, 2009
Richard Adhikari
Hackers Pounce on Excel Vulnerability Hackers have launched a new attack that uses a previously undiscovered flaw in Microsoft Excel to target business executives and government agencies. mark for My Articles similar articles
T.H.E. Journal
April 2004
Judith Rajala
Computer Virus Protection Simply having virus protection software on your institution's computer system doesn't guarantee safety and security. Instead, protection and prevention is a team effort between the users and the anti-virus software. Includes a list of useful websites. mark for My Articles similar articles
InternetNews
September 7, 2006
Ed Sutherland
Microsoft Investigates Word 2000 Trojan Microsoft said it has launched an investigation into reports of a new Trojan horse targeting Word 2000. mark for My Articles similar articles
InternetNews
October 31, 2007
Andy Patrizio
Symantec's Latest: Customized Threat Protection Symantec announced a custom threat analysis and protection service through its Global Services Security Response unit. Managed Threat Analysis, is designed to help companies facing more targeted attacks from criminals looking to steal intellectual property. mark for My Articles similar articles
InternetNews
July 7, 2009
Alex Goldman
Symantec: USB Keys Threaten the Enterprise As criminals innovate to attack PCs, Symantec promised to continue to fight them. mark for My Articles similar articles
InternetNews
March 15, 2006
Sean Michael Kerner
New Trojan is Holding Data Ransom If you're the unlucky victim of the new cryzip Trojan making the rounds, it'll cost you $300 to get your data back from the Trojan's author. mark for My Articles similar articles
PC World
July 29, 2002
Sam Costello
Symantec Unveils Blended Security Software New product mixes firewall, antivirus, and intrusion detection tools to better protect PCs from a new wave of threats. mark for My Articles similar articles
PC Magazine
March 7, 2008
Larry Seltzer
ID Theft: The Next Level The new virus Trojan.Silentbanker regularly patrols the Internet for banking sites it can manipulate. mark for My Articles similar articles
InternetNews
January 16, 2008
Andy Patrizio
A Particularly Nasty Week For Malware From Excel to the revitalized Storm worm to a severe banking Trojan, it's enough to make you nostalgic for the days of BBSes. mark for My Articles similar articles
IEEE Spectrum
November 2005
Lauren Aaronson
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. mark for My Articles similar articles
InternetNews
August 6, 2004
Roy Mark
Trojan Horse Charges PDAs First known backdoor attack on handhelds probably written by Russian virus coder. mark for My Articles similar articles
InternetNews
July 2, 2004
Susan Kuchinskas
Microsoft Issues Security Update For Trojan Redmond is urging customers to reconfigure their operating systems right away as it works on bigger patches for IE. mark for My Articles similar articles
InternetNews
July 27, 2004
Jim Wagner
More Gloom from MyDoom Virus The latest version of the virus is a vehicle for another Trojan horse, which attacks Microsoft.com... Symantec releases a removal tool. mark for My Articles similar articles
InternetNews
December 30, 2004
Tim Gray
Trojan Threatens XP Flaw may leave Windows XP vulnerable to attack. mark for My Articles similar articles
PC Magazine
December 21, 2005
Nicole Price Fasig
Skype Security Questioned Skype has already made waves in Voice over IP (VoIP) telephone service for consumers, but its more recent extension into the corporate arena has raised new issues. mark for My Articles similar articles
PC World
February 2005
Stuart J. Johnson
Protect Your Browser From Attack Ads Get the latest hotfix for IE 6 and plug holes in Java and Skype's VoIP software. mark for My Articles similar articles
InternetNews
May 11, 2007
Sean Michael Kerner
Is Microsoft Update Infecting You? Tens of millions of Microsoft users get their security updates from the Microsoft Update service. But a researcher at security firm Symantec is alleging that users could potentially get something more than they bargained for. mark for My Articles similar articles
InternetNews
December 27, 2006
Andy Patrizio
The Evolution Of Malware Continues Skype is the latest target of electronic thieves. mark for My Articles similar articles
InternetNews
April 21, 2009
Alex Goldman
Symantec Warns: Mac Botnet Could Strike Again Symantec, the company that discovered the first Macintosh worm in 1998, announced the discovery of the first Macintosh botnet. mark for My Articles similar articles
InternetNews
August 20, 2007
Nicholas Carlson
Skype's Back But For How Long? EBay's Voice over IP company Skype is blaming last week's two-day outage on "massive restart" of user computers across the globe. mark for My Articles similar articles
InternetNews
May 28, 2009
Alex Goldman
Flood of Fake Western Union E-mails Hide Trojan An influx of malware-laden spam, which started two weeks ago, continues today as hackers seek credit card and banking information. mark for My Articles similar articles
InternetNews
January 28, 2009
Judy Mottl
Hold the VoIP: Skype Sale Rumors Flying Comments from parent company on last week's earnings call have kept the buzz alive over whether eBay's selling Skype. mark for My Articles similar articles
PC World
September 26, 2007
Erik Larkin
Five of the Dirtiest Malware Tricks From disguising applets to look like part of Windows to co-opting security tools, Web crooks use a variety of methods to bypass your system's safeguards. mark for My Articles similar articles
InternetNews
June 13, 2006
Sean Michael Kerner
Worm Has a Yen For Yahoo Mail Worm wrigglers have apparently targeted Yahoo's popular Webmail with a new virus. But so far, it's a bust. mark for My Articles similar articles
PC Magazine
June 20, 2007
Larry Seltzer
Beware Windows Hactivation Threat A new Trojan horse masquerading as a Windows security check is wreaking havoc on PCs. Find out how you can keep your system safe. mark for My Articles similar articles
InternetNews
July 14, 2004
Ryan Naraine
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues. mark for My Articles similar articles
PC World
July 2005
Steve Bass
Cheap and Easy Internet Phone Calls Why sign up for a complex service when you can just test the online waters?... Tool of The Month: Exterminate Stubborn Files... mark for My Articles similar articles
InternetNews
June 25, 2004
Ryan Naraine
Malware Hacker Attack Linked to Spammers Experts warn that a highly sophisticated malicious hacker attack could turn millions of PCs into spam zombies. Infected IIS web servers are spreading the malicious software to Internet Explorer users. mark for My Articles similar articles
BusinessWeek
February 19, 2007
Stephen H. Wildstrom
Mischief-Proofing Your PC Vista comes with only some of the protection you'll need. mark for My Articles similar articles
InternetNews
February 27, 2007
Ed Sutherland
Storm Trojan Takes Social Measures Storm Trojan uses Web mail, blogs and message boards as conduits for spreading malware code. mark for My Articles similar articles
InternetNews
December 27, 2010
Skype Holiday VoIP Outage Explained Skype continues to investigate, but suggests that service outage in the days leading up to Christmas stemmed from supernode failure. mark for My Articles similar articles
InternetNews
March 16, 2004
Sharon Gaudin
Report: Threats Coming from all Sides A Symantec study shows that the number of software security flaws has leveled off over the past year. That sounds like good news until you find out that it's leveled off at seven new vulnerabilities a day, or 2,636 a year. mark for My Articles similar articles
InternetNews
August 8, 2005
Jim Wagner
Skype Downplays Takeover Talk Responding to a report that News Corp. floated a $3 billion acquisition offer, a spokeswoman for the VoIP developer says the company is not for sale. mark for My Articles similar articles
PC Magazine
September 14, 2005
Bill Machrone
Bill Machrone The editor voices his opinion on personal Voice over IP and innovations by Skype and Gizmo. mark for My Articles similar articles
InternetNews
September 17, 2007
Andy Patrizio
Have We Reached The End Of The Virus? Not quite. The old-fashioned virus infestation is fading as the biggest nuisance for computer users in favor of Trojans, Symantec's new malware study finds. mark for My Articles similar articles
Fast Company
October 2005
Scott Kirsner
Sweating In the Hot Zone Imagine what life would be like if your product were never finished, if your work were never done, if your market shifted 30 times a day. The computer-virus hunters at Symantec don't have to imagine. mark for My Articles similar articles
InternetNews
June 19, 2006
Sean Michael Kerner
US-CERT Warns of Unpatched Excel Flaw Warning for Microsoft Excel users. According to US-CERT, an unpatched vulnerability may well put you and your precious spreadsheet data at risk. mark for My Articles similar articles
InternetNews
November 10, 2005
Jim Wagner
Researchers: Skype, VoIP Are Hot And Risky Researchers warn that IT managers should take precautions when allowing VoIP use, specifically Skype, in the workplace. mark for My Articles similar articles
The Motley Fool
June 28, 2004
Alyce Lomax
No Summer Break for Virus Writers A new development in virus evolution reared its ugly head last week with hackers planting malicious code into the Web servers for several reportedly popular sites. mark for My Articles similar articles
InternetNews
May 30, 2006
Roy Mark
Symantec Patches Antivirus Vulnerability Symantec said today it has fixed a vulnerability in its antivirus software suite that potentially could open a backdoor to hackers. mark for My Articles similar articles
PC World
January 3, 2002
Joris Evers
Peer-to-Peer Apps Shared Trojan Horse Popular file-swapping programs installed spyware software even if users opted out, companies admit... mark for My Articles similar articles
InternetNews
January 9, 2004
Sean Michael Kerner
Fake Microsoft Service Pack is Xombe Trojan Another day, another virus. Unsuspecting Internet users were greeted Friday with an e-mail message purportedly from [email protected] to update their computers. Problem is, the message isn't from Microsoft and the patch is actually a back door Trojan. mark for My Articles similar articles
InternetNews
July 8, 2009
Alex Goldman
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. mark for My Articles similar articles
PC World
December 2000
Kim Zetter
Computer Viruses: The Next Generation What will be the next virulent outbreak? No one knows, except that it's guaranteed to be more lethal than ever... mark for My Articles similar articles
Bank Technology News
December 2005
Glen Fest
Voip Security Threats: Swimming With The Sleeping Sharks? Banks' enthusiasm for installing VoIP shows no signs of waning. Will hackers, spammers, phishers and other criminals soon notice and start to take advantage? mark for My Articles similar articles
PC World
March 2005
Landesman & McEvoy
Antivirus Tools Fool XP's Security Center Windows Security Center may say your PC is protected, even when it isn't. mark for My Articles similar articles