MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
May 13, 2010
One Gang Responsible For Most Phishing Attacks More than two-thirds of all phishing attacks in the second half of 2009 were the work of one gang, according to an anti-phishing group. mark for My Articles similar articles
InternetNews
June 8, 2009
Alex Goldman
Symantec Says Phishers Have New Tools Automated toolkits are making it easier to attack services such as Facebook, Twitter and financial services brands. mark for My Articles similar articles
InternetNews
February 17, 2009
Sean Gallagher
Social Networks a Magnet for Malware Just like the crooks robbed the banks because that's where the money is, malware will go where the people are. mark for My Articles similar articles
InternetNews
November 7, 2007
Andy Patrizio
Salesforce.com Scrambles To Halt Phishing Attacks Another example of why humans - not technology - are the weakest link in security. mark for My Articles similar articles
PC Magazine
March 16, 2004
Leon Erlanger
The Weakest Link Even the best-protected networks are vulnerable if employees unwittingly divulge sensitive information. mark for My Articles similar articles
BusinessWeek
April 17, 2006
Brian Grow
The Mind Games Cybercrooks Play Hackers are exploiting psychological vulnerabilities to gain access to your data. mark for My Articles similar articles
InternetNews
June 2, 2011
Google Blames China for Gmail Hack According to Google, their security systems discovered a phishing campaign that had targeted Gmail in an effort to obtain user passwords. mark for My Articles similar articles
PC World
November 20, 2006
Andrew Brandt
Privacy Watch: Phishers Put Their Lures on Cell Phones Phishing scammers have begun sending deceptive short message service (SMS) messages to people's mobile sets. mark for My Articles similar articles
PC World
November 2005
Erik Larkin
Threat Alert: Spear Phishing Targeted e-mail attacks try to lure you in with specific, convincing messages. mark for My Articles similar articles
Information Today
June 2005
Phillip Britt
No Phishing Allowed Today, the biggest threats for companies and consumers are the new crimes with funny-looking names: phishing, pharming, and spim. mark for My Articles similar articles
PC Magazine
November 29, 2006
Robert Lemos
Hacking for Dollars Viruses and worms are so last-decade. Today's PC users have to worry more about online burglary than stolen bandwidth. mark for My Articles similar articles
Wall Street & Technology
April 14, 2006
New Phishing Twists Online financial criminals have advanced their phishing techniques, according to RSA Security, which uncovered a new type of attack that it has dubbed a Smart Redirection Attack. mark for My Articles similar articles
InternetNews
January 5, 2009
Richard Adhikari
Phishers Hit Twitter Users Obama, Britney Spears and Bill O'Reilly among reported victims of phony Twitter messages that also included an iPhone scam. mark for My Articles similar articles
InternetNews
January 28, 2009
Richard Adhikari
Online Trust: A Thing of the Past? Malware attacks are turning the Web upside down, and complicating the efforts of security vendors and users to cope with the threats. mark for My Articles similar articles
InternetNews
May 26, 2006
Tim Scannell
Jamie de Guerre, Director, Partner Programs, Cloudmark Spam isn't going anywhere, and Jamie de Guerre's company is tracking its trails through our inboxes. mark for My Articles similar articles
InternetNews
June 16, 2005
Tim Gray
Browser-Based Attacks on the Rise Browser-based attacks such as pharming and phishing scams are now the fastest-growing security threat on the Internet. mark for My Articles similar articles
InternetNews
August 20, 2004
Susan Kuchinskas
Phishers Are Getting Together Free 'phishing kits' on the Web are making this scam easier than ever. mark for My Articles similar articles
Popular Mechanics
February 2006
Brian Krebs
It's 10 PM. Do You Know Where Your Identity Is? Global identity thieves may know their way around your computer better than you do. Learn how to protect yourself in the scary new world of zombies, RATs, Trojan horses and evil twins. mark for My Articles similar articles
InternetNews
May 13, 2010
APWG Fingers 'Avalanche' Phishing Syndicate The Anti-Phishing Working Group says one highly sophisticated and well-organized group of cyber thieves was responsible for a huge spike in phishing attacks late last year. mark for My Articles similar articles
InternetNews
February 3, 2011
Hackers Use Facebook Mania to Spread Malware Facebook is a magnet for security threats and hackers are capitalizing on users' addiction to the social networking site to do even more damage. mark for My Articles similar articles
CIO
March 17, 2010
Robert McMillan
Forensics Tools Help Companies Investigate Intrusions Remotely For global companies, forensics applications provide another weapon in the security arsenal. mark for My Articles similar articles
InternetNews
October 27, 2010
Malware Scams Pick Up In Retail Sector Targeted attacks are becoming more and more common as hackers seek out specific individuals or groups to steal proprietary information. mark for My Articles similar articles
InternetNews
February 9, 2010
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. mark for My Articles similar articles
InternetNews
October 31, 2007
Andy Patrizio
Symantec's Latest: Customized Threat Protection Symantec announced a custom threat analysis and protection service through its Global Services Security Response unit. Managed Threat Analysis, is designed to help companies facing more targeted attacks from criminals looking to steal intellectual property. mark for My Articles similar articles
National Defense
December 2011
Stew Magnuson
Defense Department Partners With Industry To Stem Staggering Cybertheft Losses The amount of intellectual property hackers are stealing from U.S. companies and sending to China is said to be staggering. The private sector's crown jewels are being moved off nominally secure networks and transmitted to the Asian nation every day: usually from 9 to 5 -- Beijing time. mark for My Articles similar articles
InternetNews
May 6, 2004
Sean Michael Kerner
The Cost of Phishing Hits $1.2 Billion The wider impact to the enterprise is an erosion of consumer trust, a new Gartner research study suggests. mark for My Articles similar articles
InternetNews
December 6, 2004
Tim Gray
Phishing Grows with Holiday Shopping Spike Attacks jumped 80 percent in November and now target the workplace. mark for My Articles similar articles
InternetNews
January 21, 2011
Phishing Scam Preys On McDonald's Customers A new phishing scam targeting McDonald's customers attempts to elicit credit card and other personal information for identity theft. mark for My Articles similar articles
Wall Street & Technology
December 19, 2007
Melanie Rodier
U.S. Banks Are Targets in 60 Percent of Worldwide Phishing Attacks Phishing attacks against global banking brands target U.S. institutions most, according to security solutions provider RSA. mark for My Articles similar articles
PC Magazine
April 5, 2006
Robert Lemos
This Man Has a Virus Security software can do little about the most dangerous delivery mechanism of all: the user. mark for My Articles similar articles
InternetNews
February 25, 2009
Richard Adhikari
Online Trust Takes a Hit in Gmail Chat Phishing Security experts are warning that a phishing attack on Google's Gmail's chat feature not only poses a danger to users, but could be a harbinger of things to come. mark for My Articles similar articles
InternetNews
January 24, 2006
Sean Michael Kerner
IBM: Users Are The Weak Link in Security IBM is warning in a new report that, though widespread virus outbreaks are on the decline, on the whole online attacks are expected to rise in 2006. The culprit? Highly targeted attacks that rely on naive users to help perpetrate cybercrimes. mark for My Articles similar articles
IndustryWeek
July 1, 2007
Brad Kenney
From ID To IP Theft Manufacturing companies have tended to lag behind the financial, health care and energy industries in the area of information security, even though manufacturers clearly have a lot to lose. mark for My Articles similar articles
InternetNews
November 23, 2009
IBM Outlines Top Security Trends for 2010 IBM's X-Force security team sees cyber crooks getting social and heading for the clouds. mark for My Articles similar articles
Search Engine Watch
June 5, 2010
Johnny Widerlund
Avoiding Online Risks Kicking Off with the 2010 FIFA World Cup Cyber criminals will continue hijacking current news and events to serve malware. A rundown of the most prevalent online security risks, and how to avoid them. mark for My Articles similar articles
InternetNews
May 21, 2009
Alex Goldman
Phishers Strike Facebook in Latest Assault Facebook is fighting back against the most recent attack. mark for My Articles similar articles
PC Magazine
February 15, 2006
Robert Lemos
Caught by Phish Falling prey to online identity theft takes only a few minutes, but the cost can be high. mark for My Articles similar articles
Bank Systems & Technology
September 15, 2007
Sharon Gaudin
Number Of Hackers Attacking Banks Jumps 81% Hackers no longer need to be technical wizards to set up an operation to steal people's banking information and then rob their accounts. mark for My Articles similar articles
InternetNews
August 18, 2010
Facebook Kit Makes Hacking Logins Easy Security software vendor BitDefender says it's found a new malware kit that lets hackers easily access logins and passwords for Facebook and other unsecured credentials. mark for My Articles similar articles
InternetNews
July 19, 2010
Zscaler Leverages the Cloud for Email Security The Zscaler cloud-based security suite now includes real-time filtering to block spam and phishing attacks. mark for My Articles similar articles
InternetNews
October 29, 2008
Richard Adhikari
Facebook Worm Redux Taps Google Sites Once again, social networking site Facebook has been hit by the Koobface worm, which has been used to attack it several times since July. mark for My Articles similar articles
InternetNews
April 9, 2010
Phishers Rev Up IRS Scams for Tax Time With tax season in full swing, online scammers are blanketing the Internet with polished messages posing as the IRS trying to entice users to click on a link that could expose their personal information. mark for My Articles similar articles
BusinessWeek
August 13, 2009
Joel Schectman
Computer Hacking Made Easy Botnet attacks like the one that took down Twitter are becoming so easy and cheap, almost anyone can do it. mark for My Articles similar articles
InternetNews
April 16, 2009
Alex Goldman
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. mark for My Articles similar articles
InternetNews
October 1, 2009
Internet Never More Dangerous: Study Report finds a 585 percent spike in fake anti-malware and security software programs in the first half of 2009. mark for My Articles similar articles
Wall Street & Technology
July 28, 2004
Jim Middlemiss
Gone Phishing In the latest identity-theft scam, fraudulent e-mails trick individuals into coughing up passwords to 'secure' financial data. mark for My Articles similar articles
Information Today
February 4, 2013
Paula J. Hane
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. mark for My Articles similar articles
Popular Mechanics
April 17, 2008
Joe Pappalardo
Hack Attack on Tibet Groups Could Hint at China's Anti-U.S. Tactic As Buddhist monks in exile mourn fellow Tibetans killed in the recent conflict with China, U.S.-based nonprofit organizations are facing spam attacks, fake smear campaigns and other threats to digital privacy. mark for My Articles similar articles
InternetNews
May 14, 2010
Facebook's Become a Phisher's Playground Facebook has plenty of security problems of its own making to resolve and, in the interim, professional cyber-thieves are exploiting other vulnerabilities. mark for My Articles similar articles
InternetNews
October 3, 2006
Roy Mark
Cyber Criminals Turn to Home Users Phishing and spam are on a dramatic rise as home users become the prime targets of online criminals. Attacks are up 81 percent over the last six months and spam jumped 50 percent over the same period. mark for My Articles similar articles