MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Investment Advisor
June 2008
Irace & Mehta
Security in a New Age How to protect your firm from 21st century online criminals mark for My Articles similar articles
T.H.E. Journal
December 2002
Vincent Weafer
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous. mark for My Articles similar articles
PC World
April 2004
Scott Spanbauer
Lock Down Your PC Hackers. Spammers. Even rogue coworkers and employees. How can you keep the bad guys out and the good data in? Safeguard your system's perimeter with these 29 beyond-the-basics security steps. mark for My Articles similar articles
Financial Planning
May 1, 2010
Joel P. Bruckenstein
Doing Battle Because security threats are constantly evolving, advisors must stay on top of the latest developments if they are to protect their firms and clients. mark for My Articles similar articles
T.H.E. Journal
April 2004
Judith Rajala
Computer Virus Protection Simply having virus protection software on your institution's computer system doesn't guarantee safety and security. Instead, protection and prevention is a team effort between the users and the anti-virus software. Includes a list of useful websites. mark for My Articles similar articles
InternetNews
May 15, 2009
Alex Goldman
Facebook Attacks Threaten All Web Sites Why would users want your user name and password? Perhaps because it could give them access to your money and your e-mail. mark for My Articles similar articles
PC World
April 2003
Anne Kandra
Consumer Watch: Manage Passwords Safely -- and Simply Plagued by a plethora of passwords? Here's how to deal with them without driving yourself nuts. mark for My Articles similar articles
Wall Street & Technology
January 5, 2005
David Tan
Combating Blended Threats Security experts agree that blended threats will continue to grow in frequency, complexity and severity. mark for My Articles similar articles
PC World
June 2006
Scott Dunn
Security Is Up to You: Perfect Your Passwords Set up strong password policies for your PC's users... A freeware tool can give you greater control over passwords and more. mark for My Articles similar articles
InternetNews
January 4, 2008
David Needle
Wi-Fi Networks Face Virus Threat? Unprotected routers could spread malicious software rapidly to thousands of computers. mark for My Articles similar articles
PC Magazine
April 19, 2006
Robert Lemos
Password Policies A simple password could be the weak link that leaves your data open to attack. mark for My Articles similar articles
PC World
September 2004
Andrew Brandt
Privacy Watch: Two Passwords Double Your Privacy 'Two-factor authentication' is the computer equivalent of the security provided by a safety deposit box: Neither you nor the bank alone can open the box; both parties need to use their keys at the same time. mark for My Articles similar articles
PC Magazine
November 2, 2005
Michael J. Steinhart
Maximum Security: 94 Essential Tips for Staying Safe Dozens of our best security tips and pointers, broken down by category: system, networking and wireless, e-mail, Web surfing, malware, and mobile. mark for My Articles similar articles
HBS Working Knowledge
October 20, 2003
Wendy Guild Swearingen
New Rules for Information Security In a new book from Harvard Business School Press, Digital Defense, Thomas J. Parenty explains how security technologies are changing the rules of business. Plus: Q&A mark for My Articles similar articles
PC World
May 2005
Andrew Brandt
Do Passwords Provide True Protection? Don't Count on It Here are tools that protect your data and computer when your passwords don't. mark for My Articles similar articles
InternetNews
April 27, 2010
Passwords Should Be Last Line of Defense Longer passwords with numbers and capitalizations may make life a bit more difficult for identity thieves, but the truth is the relative strength or weakness of users' passwords should be beside the point. mark for My Articles similar articles
Registered Rep.
February 1, 2013
Megan Leonhardt
Ten Tips That Could Prevent Cyber Criminals from Hijacking Client Data As tablet ownership continues to grow -- doubling since 2011 -- and more than half of U.S. consumers owning a smartphone, according to a 2013 Forrester Research report, advisors need to be more vigilant about data security now more than ever. mark for My Articles similar articles
T.H.E. Journal
August 2001
Joyce Lambert
New Aspects of Test Security Have you ever considered the new ways in which your tests are vulnerable to unauthorized access if you store your test files on an office or home computer? mark for My Articles similar articles
PC World
August 2006
Andrew Brandt
The 10 Biggest Security Risks You Don't Know About Hackers, scammers, and identity thieves are constantly coming up with new ways to attack your PC and your privacy. Here are the newest perils and how to foil them. mark for My Articles similar articles
PC Magazine
September 9, 2008
Neil J. Rubenking
Norton Internet Security 2009 This is definitely the slimmest, most unobtrusive Norton ever, but its protection is top-notch where it counts. mark for My Articles similar articles
Bank Technology News
August 2003
Karen Krebsbach
BugBear.B Virus Hits Up to 14 Banks Firms scramble to keep breaches plugged mark for My Articles similar articles
The Motley Fool
June 18, 2011
Anders Bylund
How to Thwart Digital Thieves and Stay Safe Online You wouldn't give your keys to a stranger on the street, right? Then don't do it online. mark for My Articles similar articles
PC Magazine
September 23, 2008
Matthew D. Sarrel
A Day in the Life of a Web 2.0 Hacker They harvest data about you, your family, your friends, and your work directly from the Web apps you use and the sites you visit. Here's how they do it. mark for My Articles similar articles
Real Estate Portfolio
Mar/Apr 2002
Scott Laliberte
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... mark for My Articles similar articles
PC Magazine
August 4, 2006
Neil J. Rubenking
Norton Confidential Norton Confidential reveals fraud sites, securely stores security credentials, and kicks malware out of memory. mark for My Articles similar articles
T.H.E. Journal
August 2004
Ozkan & Gunay
Minimizing Security Vulnerabilities in High-Tech Classrooms Emerging technologies are quickly becoming part of our daily learning and teaching endeavors in academia, however only a few students, faculty members and administrators are aware of the risks and vulnerabilities that exist in their network operating systems. mark for My Articles similar articles
PC Magazine
December 28, 2004
Larry J. Seltzer
Are Pa55.W0rd5 Dead? Passphrases are more complex but easier to remember. Are they better protection than passwords? mark for My Articles similar articles
AskMen.com
August 1, 2001
Justin Becker
Keep Your Computer Virus-Free Call the doctor and head for the hospital: you've just been infected by a computer virus that's erasing your entire hard drive, as you speak. It's time to protect yourself before this happens, and take the necessary steps to make your computer virus-free... mark for My Articles similar articles
Popular Mechanics
April 2009
Seth Porges
How to Make Your Webmail Secure Web-mail users need to be especially careful when it comes to their cyber security. Here's how. mark for My Articles similar articles
PC World
June 13, 2002
Sam Costello
First JPEG Virus Identified McAfee studies lab virus that could change the way digital infections spread -- and are contained. mark for My Articles similar articles
PC World
December 2000
Kim Zetter
Computer Viruses: The Next Generation What will be the next virulent outbreak? No one knows, except that it's guaranteed to be more lethal than ever... mark for My Articles similar articles
InternetNews
April 1, 2004
Sharon Gaudin
Study: Virus Attacks Up But Infections Hold Steady Last year more -- and more dangerous -- viruses raced across the Internet than ever, according to a new study. But there was a glimmer of good news. mark for My Articles similar articles
InternetNews
August 6, 2004
Roy Mark
Trojan Horse Charges PDAs First known backdoor attack on handhelds probably written by Russian virus coder. mark for My Articles similar articles
The Motley Fool
June 28, 2004
Alyce Lomax
No Summer Break for Virus Writers A new development in virus evolution reared its ugly head last week with hackers planting malicious code into the Web servers for several reportedly popular sites. mark for My Articles similar articles
PC World
October 1, 2002
Paul Roberts
New E-Mail Virus Targets Windows, IE Virus is attached to e-mail messages with a wide variety of subject lines, making it harder for antivirus apps to detect. mark for My Articles similar articles
InternetNews
October 29, 2004
Ryan Naraine
It's Bagle Day, Again Anti-virus firms have raised the alarm after spotting three new strains of the Bagle virus rapidly spreading through e-mail inboxes. mark for My Articles similar articles
CIO
July 15, 2001
Mark Gembicki
The Safety Dance A freelance technology strategist answers readers' questions on security and virus protection... mark for My Articles similar articles
PC World
March 2006
Anne Kandra
Banking on the Web: Risky Business? The reality behind the risks, plus how to keep your online transactions secure. mark for My Articles similar articles
T.H.E. Journal
October 2008
Andy McDonough
More Is More No one solution can defend K-12 computer networks against the proliferation of digital threats. A multilayered strategy that addresses cyber safety on many fronts is a district's best hope. mark for My Articles similar articles
PC Magazine
January 20, 2009
Matthew D. Sarrel
Smartphone Security Measures Even the simplest cell phones carry enough data to be dangerous in the wrong hands. mark for My Articles similar articles
PC World
March 2004
Andrew Brandt
E@4#N or E@4#W? How to Remember Strong Passwords Tips for creating and keeping track of a passel of passwords. mark for My Articles similar articles
Inc.
November 1, 2009
Michael Fitzgerald
Are Your Passwords Too Weak? Hacked passwords can compromise company data security. Strategies for creating the best passwords mark for My Articles similar articles
PC Magazine
December 9, 2003
Leon Erlanger
Top Five Myths About Safe Surfing Don't let a false sense of security put you in danger. mark for My Articles similar articles
Technology Research News
August 10, 2005
Kimberly Patch
Plug-in Protects Passwords Researchers have created a browser plug-in, dubbed PwdHash, that produces a different password for each website you visit without requiring the you to remember more than a single password. mark for My Articles similar articles
PC World
August 2004
Andrew Brandt
Does Your Online Profile Say Something You Wouldn't? Sneaky hackers can put undesirable links and images into your personal profile page without your knowledge. mark for My Articles similar articles
The Motley Fool
July 6, 2010
Anders Bylund
Apple Gets Hacked Apple wipes egg off its face and makes one Fool think about safer online security standards. mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
PC World
December 2003
Andrew Brandt
Privacy Watch: A Latte, a Wi-Fi Link, and a Hacker That person sipping coffee at the next table could be hacking your log-in info as you type. mark for My Articles similar articles
PC World
July 2, 2002
Andrew Brandt
Klez: The Virus That Won't Die? Brace yourself for another round: A variant of the resilient worm is wriggling alive this week. mark for My Articles similar articles
PC World
October 2003
Scott Spanbauer
Can You Pass the PC World Password Safety Test? Password rules and tools; clear your passwords; cache news to read offline; update your media players. mark for My Articles similar articles