MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
August 3, 2010
Tech Firms Split on Paying for Security Flaws Some major IT firms have made it a standard practice to pay security researchers for bringing vulnerabilities to their attention, while others have a strict prohibition against it. What accounts for the divide? mark for My Articles similar articles
InternetNews
July 28, 2010
Enterprise Wi-Fi users at Risk? Although Cisco downplays the danger, researchers at the Black Hat security conference discussed a potential security vulnerability in Cisco 1200-series wireless access points. mark for My Articles similar articles
InternetNews
October 9, 2008
Sean Michael Kerner
No/Low/High-Tech Hacking: It All Matters Don't point the finger at hackers for all security woes. Point hacker tools at yourself to see what's wrong with your stuff, instead. mark for My Articles similar articles
InternetNews
July 27, 2010
Security Pros Gather For Black Hat Confab Security experts, hackers and media types are filing into Sin City this week for the annual Black Hat USA security conference, a gathering that's endured and generated its share of controversy in the past. mark for My Articles similar articles
InternetNews
July 27, 2005
Tim Gray
Black Hat Is Back TippingPoint launched Zero Day Initiative, which rewards security researchers for informing the company of any security bugs. mark for My Articles similar articles
InternetNews
July 21, 2010
Mozilla Patches 14 Firefox Security Flaws Ahead of the annual Black Hat security conference, Mozilla issues its largest patch for the open source Firefox 3.6 browser, fixing 14 security vulnerabilities. mark for My Articles similar articles
InternetNews
February 19, 2008
Sean Michael Kerner
Black Hat Descends on Washington Hackers flock to D.C. during this week's Black Hat conference to talk government, security and going on the defense - for a change. mark for My Articles similar articles
The Motley Fool
January 15, 2010
Tim Beyers
Bing Is Better Than You Think Different researchers provide different numbers? Shocking. mark for My Articles similar articles
InternetNews
July 30, 2010
Researcher Warns of IE Auto-Complete Flaw At the Black Hat security conference, Whitehat Security CTO Jeremiah Grossman describes a browser flaw that could allow hackers to capture entries stored in Web forms. mark for My Articles similar articles
InternetNews
July 30, 2007
Sean Michael Kerner
Black Hat Cometh; You Afraid? The Black Hat conference in Las Vegas is a place where bad things are talked about openly and things that we once thought were secure get thrown out the window. mark for My Articles similar articles
InternetNews
March 10, 2011
Pwn2own Hackers Tear Through Safari, IE8 At annual browser hacking competition, participants make short work of a recent version of Apple's Safari browser, while others took on Microsoft's Internet Explorer 8. mark for My Articles similar articles
InternetNews
July 26, 2010
Microsoft Updates Bug Reporting Process Extending an olive branch to security researchers, Microsoft says it will provide new mechanisms to make it easier to report vulnerabilities. mark for My Articles similar articles
InternetNews
July 29, 2010
Microsoft Brings an Olive Branch to Black Hat Microsoft preaches a message of cooperation with the research community at the annual Black Hat security conference, announcing details of new collaborations. mark for My Articles similar articles
PC Magazine
December 28, 2004
Matthew Broersma
E-Mail Scam Dupes Linux Users In late October, Red Hat warned users of an e-mail scam designed to plant malicious code on users' systems. mark for My Articles similar articles
InternetNews
December 4, 2009
What's Behind the Bing Blackout? The brief downtime might not weaken users' enthusiasm, but one observer suggests it's a sign that Microsoft might be moving too quickly. mark for My Articles similar articles
Entrepreneur
December 2005
Amanda C. Kooser
Can You Hack It? Build the best defense you can against hackers. mark for My Articles similar articles
InternetNews
June 22, 2006
Sean Michael Kerner
Search Engines And Their Hacker Friends Search engines have become indispensable tools for hundreds of millions of people. Including hackers who are use them to find vulnerable networks, machines and services with relative ease. mark for My Articles similar articles
Technology Research News
June 18, 2003
Nods drive audio interface Researchers from the University of Glasgow and the Canadian National Research Council have devised a pair of interaction techniques that allow people to manipulate mobile computers without looking at or talking to them. mark for My Articles similar articles
InternetNews
August 7, 2006
Sean Michael Kerner
Black Hat 2006: 'l33t' or 'Lame?' Was the Black Hat security conference a wake-up call for enterprises or just a snoozer? mark for My Articles similar articles
InternetNews
August 3, 2007
Sean Michael Kerner
Black Hat And The Jedi Force Hackers have a lot of different tools at their disposal, but low-tech hacking may be all they really need. mark for My Articles similar articles
InternetNews
July 7, 2010
Hackers Snipe Back in Microsoft Security Row Bruised by Microsoft's criticism dismissing the work of third-party security researchers, a band of hackers has begun a campaign to publish proof-of-concept vulnerabilities in the software giant's products. mark for My Articles similar articles
InternetNews
March 1, 2011
Google Fixes Chrome Flaws on Eve of PWN2OWN Ahead of prominent browser hacking contest, Google pushes out an update that addresses at least 19 security issues, following closely on another recent batch of security fixes. mark for My Articles similar articles
InternetNews
February 18, 2009
Sean Michael Kerner
Black Hat: Macs Under Attack? A security researcher says a new vulnerability could pose danger to Macs and iPhones. But we're still waiting for the proof. mark for My Articles similar articles
InternetNews
April 27, 2010
Red Hat Brings Enterprise Linux to the Cloud Linux vendor debuts Red Hat Cloud Access program, offering premium enterprise subscribers the option of moving to Amazon's EC2 cloud-computing environment. mark for My Articles similar articles
PC Magazine
June 20, 2008
Larry Seltzer
Hacked Through the Heart Even medical gadgetry is subject to outside hacking. mark for My Articles similar articles
InternetNews
January 27, 2010
Semantic Web Already Having an Impact Microsoft Bing head Scott Prevost said search engines are getting smarter thanks to Semantic Web technology. mark for My Articles similar articles
InternetNews
March 7, 2011
How To Win Pwn2own Browser Hack Head of security research at HP's Tipping Point previews the annual hacking contest, which will take aim at all major Web browsers and mobile platforms. mark for My Articles similar articles
InternetNews
June 3, 2010
Bing Gains Ground But Google Reigns Supreme A year after its launch, Microsoft's search engine Bing has managed to carve out a modest 3.5 percent foothold in the search market while Google commands nearly 90 percent. mark for My Articles similar articles
The Motley Fool
September 14, 2010
Wolfgang Gruener
Bing Hits No. 2: Microsoft's Little Engine Can! Big Softy's search engine is gaining steam. mark for My Articles similar articles
InternetNews
July 6, 2007
Andy Patrizio
Step Right Up, Get Your Exploits Right Here WabiSabiLabi sets up an eBay for software vulnerabilities. mark for My Articles similar articles
InternetNews
July 31, 2009
Apple Fixes iPhone SMS Vulnerability Apple pushes out an OS patch just one day after the texting vulnerability debuted at Black Hat. mark for My Articles similar articles
The Motley Fool
June 18, 2009
Rick Aristotle Munarriz
Alarm Bells Ring Over Bing Microsoft is turning heads in search, as it's new Bing search engine continues to grow its audience. mark for My Articles similar articles
Search Engine Watch
September 29, 2010
Gary-Adam Shannon
White Hats: This is Why You're Getting Beaten Fire the white hat agency and "get real." Today, successful search marketing strategies absolutely must incorporate elements of black hat (or gray hat -- call it whatever you want) methodology. mark for My Articles similar articles
Search Engine Watch
July 2, 2008
Eric Enge
Coding Problems: How to Avoid Getting Flagged by Search Engines Some common SEO and Web development practices can be used quite legitimately, yet still could look like spam to search engines. The key is to use these techniques for legitimate reasons, use them in moderation, and in ways commonly found on the Web. mark for My Articles similar articles
InternetNews
August 20, 2010
Google Nabs 11 Chrome Vulnerabilities The company shuts down a number of potentials security holes while paying out more than $10,000 to third-party researchers who discovered the flaws. mark for My Articles similar articles
InternetNews
June 11, 2010
Microsoft Adds Social Features to Bing Software giant continues its push to give Bing search engine a social makeover, adding in live feeds from Facebook into search results. mark for My Articles similar articles
InternetNews
August 3, 2010
Most Don't Object to Cyber Spying: Report A survey by a prominent security software firm reveals that most people don't mind if the government uses cyber spying techniques to keep tabs on our enemies. mark for My Articles similar articles
The Motley Fool
September 10, 2009
Rick Aristotle Munarriz
Google Gets Even Bigger Google is introducing a marginally larger search box, with bigger search-refinement buttons below. mark for My Articles similar articles
InternetNews
June 10, 2009
Stuart J. Johnston
Bing's Big Week, Search Share Ticks Up After its first week on the Web, Bing appears to be gaining ground against its rivals. mark for My Articles similar articles
InternetNews
September 17, 2010
Are PC Security Flaws on the Wane? New survey from HP Tipping Point finds that 2006 was a high water mark for security vulnerabilities, and that the sheer volume of flaws has since been on the decline. mark for My Articles similar articles
InternetNews
May 29, 2009
Stuart J. Johnston
Goodbye Microsoft Live Search, Hello Bing The software giant hopes to make headway against Google with its "decision engine" challenger to traditional search engines. mark for My Articles similar articles
InternetNews
July 12, 2010
Bing Shows Slight Growth in Search Scrum Microsoft's toddling search engine managed to eke out a slight improvement in U.S. search traffic last month, according to Experian Hitwise. mark for My Articles similar articles
The Motley Fool
September 24, 2009
Anders Bylund
You Should Have Seen Red Hat's Success Coming Red Hat is still the tech horse you want to bet on. mark for My Articles similar articles
InternetNews
June 1, 2009
Stuart J. Johnston
Microsoft's Bing Goes Live Ahead of Schedule The waiting over, users now have a Bing 'preview' to search with. mark for My Articles similar articles
CIO
July 14, 2008
Jarina D'Auria
Five Things Kevin Mitnick Has Learned About Computer Security Legendary former hacker on hacking, being hacked, and companies that turn a blind eye to security. mark for My Articles similar articles