MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
January 19, 2011
Researcher Looks to Demystify Stuxnet Threat Securicon's Tom Parker is planning to present research at the Black Hat security conference describing a technical analysis of the feared threat of the Stuxnet worm, offering some tips for mitigation. mark for My Articles similar articles
The Motley Fool
January 26, 2011
Rich Smith
Welcome! You've Got Computer Worms! While the U.S. only targeted Stuxnet into Iran's nuclear centrifuge labs, the worm didn't stay stuck on it. Already, the worm has leaked out of Iran and into Symantec's virus filters. mark for My Articles similar articles
InternetNews
September 27, 2010
LinkedIn Users Hit by Spam Attack Malware designed to capture user's personal information on the popular professional network, LinkedIn. mark for My Articles similar articles
Fast Company
Neal Ungerleider
Facebook Tipped Off The U.S. Government To Iranian Hackers State Department officials were tipped off by Facebook's new notifications when Iranian hackers compromised their Facebook accounts. mark for My Articles similar articles
Chemistry World
June 10, 2015
Emma Stoye
Security experts warn chemical plants are vulnerable to cyber-attacks Security experts are warning that the computers controlling machinery in chemical plants, power stations and other critical infrastructure are vulnerable to attacks from hackers. mark for My Articles similar articles
IEEE Spectrum
March 2013
David Kushner
The Real Story of Stuxnet How Kaspersky Lab tracked down the malware that stymied Iran's nuclear-fuel enrichment program mark for My Articles similar articles
InternetNews
November 9, 2010
USB Devices Pose New Security Threats Portable drives and storage devices are a leading source of malware, according to one security software developer. mark for My Articles similar articles
InternetNews
December 2, 2010
Targeted Malware, Spam Will Surge in '11 Security software vendor predicts more malware campaigns will use social media to target mobile devices, apps and industry-specific systems. mark for My Articles similar articles
InternetNews
January 22, 2009
Richard Adhikari
Downadup: The Web's Next Big Threat? Experts blame a lack of patching and an advanced design for the rise of a worm that could outpace Storm. mark for My Articles similar articles
InternetNews
March 3, 2009
Richard Adhikari
Digg Hackers Strike Next at YouTube Attacks are on the rise, with malware authors dabbling in spreading worms and scareware via comments. mark for My Articles similar articles
InternetNews
November 17, 2010
Stuxnet, Mobile Threats Top 3Q Malware Report Security software vendor McAfee's 3Q Threats Report takes note of some older malware scams from the past and some new and discouraging new ones. mark for My Articles similar articles
PC World
August 1, 2001
James Niccolai
Code Red Awakens With a Whimper Hyped worm appears to have little impact, but experts warn we aren't out of the woods yet... mark for My Articles similar articles
National Defense
March 2013
Stew Magnuson
Iran's Ability to Carry Out Attacks in Cyberspace May Be Improving The ability to carry out attacks from across the world that can do real physical or economic damage without ever launching a jet fighter or sending in suicide squads is tempting for adversaries such as Iran, U.S. officials and cybersecurity experts have pointed out. mark for My Articles similar articles
PC World
January 27, 2003
Williams et al.
Spread of Slammer Worm Slows Investigators are searching for the source of the worm that caused major disruptions to Internet service over the weekend. mark for My Articles similar articles
The Motley Fool
January 8, 2007
Rich Smith
A New Threat for Investors Worrying news from London about the Middle East could rattle markets. mark for My Articles similar articles
InternetNews
October 29, 2008
Richard Adhikari
Facebook Worm Redux Taps Google Sites Once again, social networking site Facebook has been hit by the Koobface worm, which has been used to attack it several times since July. mark for My Articles similar articles
InternetNews
March 25, 2010
Symantec: China Is Tops in Targeted Malware Symantec's latest report pinpoints China as the leading source of malware tailored to hoodwink execs in specific industries. mark for My Articles similar articles
InternetNews
December 28, 2010
Security 2010: The Year in Review Stuxnet, embarrassing data leaks and sophisticated phishing attacks dominated the data security landscape in 2010. mark for My Articles similar articles
InternetNews
April 27, 2009
Alex Goldman
Conficker Awakens With Scareware and Spam The new activity on the Conficker botnet shows that the criminal economy is functioning well. mark for My Articles similar articles
InternetNews
January 4, 2008
David Needle
Wi-Fi Networks Face Virus Threat? Unprotected routers could spread malicious software rapidly to thousands of computers. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
InternetNews
May 7, 2010
Larry Barrett
Messenger Worm Preys On Users' Trust Hackers took advantage of a security gap in Yahoo Messenger and a bevy of Windows operating systems to spread malware through the instant messaging client. mark for My Articles similar articles
IEEE Spectrum
August 2012
Willie D. Jones
Declarations of Cyberwar What the revelations about the U.S.-Israeli origin of Stuxnet mean for warfare mark for My Articles similar articles
Scientific American
June 2009
Michael Moyer
What Conficker Reveals About Internet Crime The worm exposes the sophisticated international criminal networks behind modern computer viruses mark for My Articles similar articles
InternetNews
January 27, 2010
Cyber Terrorists Target U.S. Oil Industry Three of the world's largest U.S.-based oil and natural gas companies were hoodwinked by an extremely sophisticated malware attack designed to steal key proprietary data related to the whereabouts of new oil reserves. mark for My Articles similar articles
PC World
September 18, 2001
Frank Thorsberg
Multi-Fanged Worm Starts Global Attack New mass-mailing worm starts sophisticated attack on PCs and servers worldwide... mark for My Articles similar articles
PC World
May 9, 2002
Brian Sullivan
'Cute' Trojan Horse Spreading by E-Mail Worm has been rated low risk, but could damage firewall and security programs on infected PCs... mark for My Articles similar articles
National Defense
January 2011
Stew Magnuson
Cyberattacks Reaching New Heights of Sophistication The year 2010 may prove to be a watershed for cyber-security. The three incidents: the Aurora operation; the hijacking of data and the Stuxnet virus were all stunning new developments. mark for My Articles similar articles
InternetNews
May 19, 2010
'Lost' Finale Gives Cyber Crooks New Bait With the end of the popular ABC drama, hackers are exploiting viewers' interest to spread all sorts of malware. mark for My Articles similar articles
InternetNews
March 27, 2009
Alex Goldman
Conficker Countdown: Experts Stress Caution Malware code has infected millions of PCs and will activate on April 1. What do security insiders say users need to know? mark for My Articles similar articles
PC World
October 24, 2007
Erik Larkin
The Internet's Public Enemy Number One The Storm Worm has infected so many machines that it's now one of the most powerful supercomputers. mark for My Articles similar articles
InternetNews
November 23, 2009
Facebook Hit With New CSRF Worm Latest exploit replicates itself through bogus wall postings; security researchers wonder what else is out there. mark for My Articles similar articles
PC World
October 31, 2001
Sam Costello
Nimda Variant Spreads Across Net Virus author claims ownership rights and asserts name: 'CV'... mark for My Articles similar articles
InternetNews
November 3, 2009
'Scareware' and Worms Top Corporate Threat List Despite headway, IT still has their security work cut out for them. mark for My Articles similar articles
InternetNews
June 11, 2009
Alex Goldman
Malware Keeps Creeping Onto Mac OS X The Apple Mac is still seeing far fewer attacks than Windows experiences, but researchers say there's a disturbing trend at work. mark for My Articles similar articles
InternetNews
August 6, 2009
Did Koobface Cause Twitter, Facebook Outages? A new variant of the widespread Internet worm Koobface made its debut today - just as Twitter and Facebook were hit by denial-of-service attacks. mark for My Articles similar articles
InternetNews
July 8, 2009
Alex Goldman
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. mark for My Articles similar articles
InternetNews
August 18, 2005
Tim Gray
Warily Watching Worm Variants Versions of the Zotob worm continue to slam corporate networks while security vendors and Microsoft play defense. mark for My Articles similar articles
CIO
October 15, 2003
Paul Roberts
Virus Attacks What a month. Human frailty, spam and a dangerous Microsoft Windows vulnerability combined to produce four major Internet worm attacks in August. A rundown. mark for My Articles similar articles
InternetNews
June 13, 2006
Sean Michael Kerner
Worm Has a Yen For Yahoo Mail Worm wrigglers have apparently targeted Yahoo's popular Webmail with a new virus. But so far, it's a bust. mark for My Articles similar articles
PC Magazine
October 14, 2003
The Lookout: Blaster and SoBig Move In The Blaster worm continued to tear through the Internet in August, followed almost immediately by an improved version of the SoBig worm, as security experts struggled to find and fix infected systems. mark for My Articles similar articles
InternetNews
August 15, 2005
Jim Wagner
Zotob Targets Windows Update Laggards A critical vulnerability in Microsoft's plug-and-play code can wreak havoc on unpatched PCs. mark for My Articles similar articles
Parameters
Autumn 2007
Christopher Hemmer
Responding to a Nuclear Iran What should American foreign policy be if current efforts to discourage Iran from developing nuclear weapons fail? mark for My Articles similar articles
IEEE Spectrum
January 2008
Mark Anderson
What a Wi-Fi Worm Outbreak Would Look Like A future form of computer malware might infect Wi-Fi routers and steal data. mark for My Articles similar articles
PC Magazine
June 21, 2006
Neil J. Rubenking
Expert View: Security's Shaky Structure Whatever happened to trustworthy computing? mark for My Articles similar articles
Parameters
Autumn 2004
Richard L. Russell
Iran in Iraq's Shadow: Dealing with Tehran's Nuclear Weapons Bid The Iraq war is the backdrop for the evolving policy debate on Iran. Tehran might be tempted to harness the threat of nuclear weapons for leverage in the political-military struggle against the United States for power and influence in the Persian Gulf. mark for My Articles similar articles
InternetNews
September 30, 2010
'Here You Have' Worm Takes Toll In September The new version of an old malware trick was the single largest security threat to enterprise IT departments last month. mark for My Articles similar articles
PC World
November 27, 2002
Paul Roberts
New E-Mail Worm Causing Severe Damage Winevar could delete all the files on a computer's hard drive, while also mocking the user. mark for My Articles similar articles
Science News
October 12, 2002
A Prized Worm This year's Nobel Prize in physiology or medicine went to researchers who pioneered the use of the tiny worm Caenorhabditis elegans as an animal model for exploring basic processes involved in the development and behavior of multicellular organisms. mark for My Articles similar articles
InternetNews
February 12, 2009
Richard Adhikari
Microsoft Rounds Up Posse to Nab Conficker In a worldwide effort to bring down what experts warn may be the worst malware now facing the Internet, big names from the computer industry, academia and law enforcement are teaming up to go after the Conficker worm. mark for My Articles similar articles