MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
October 27, 2010
Malware Scams Pick Up In Retail Sector Targeted attacks are becoming more and more common as hackers seek out specific individuals or groups to steal proprietary information. mark for My Articles similar articles
PC Magazine
September 23, 2008
Matthew D. Sarrel
A Day in the Life of a Web 2.0 Hacker They harvest data about you, your family, your friends, and your work directly from the Web apps you use and the sites you visit. Here's how they do it. mark for My Articles similar articles
InternetNews
March 3, 2009
Richard Adhikari
Digg Hackers Strike Next at YouTube Attacks are on the rise, with malware authors dabbling in spreading worms and scareware via comments. mark for My Articles similar articles
CRM
May 2007
Barton Goldenberg
A CRM Initiative's Bermuda Triangle Two best practice suggestions for preventing -- permanently -- CRM user-adoption disappearance. mark for My Articles similar articles
InternetNews
June 11, 2010
Symantec Warns of Latest World Cup Malware Researchers at software-security firm detect a two-pronged malware attack targeting executives at major Brazilian firms, using the World Cup as a lure. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
InternetNews
December 30, 2009
Malware Targeting Adobe, Social Sites in 2010 Security player McAfee runs down its picks for malware creators' highest-priority targets in the coming year. mark for My Articles similar articles
InternetNews
June 2, 2010
Blackhat SEO Scam Hits Mop.com Gaming Site One of the world's most popular online gaming sites is under siege from a creative malware scam that attempts to swindle players' personal information and gaming credits. mark for My Articles similar articles
InternetNews
January 14, 2010
McAfee Fingers Microsoft IE Flaw in Google Attack McAfee's researchers say 'Operation Aurora' used a zero-day vulnerability in Microsoft's browser software to penetrate Google's networks. mark for My Articles similar articles
InternetNews
January 18, 2011
Attack Toolkits Spark New Malware Strains Do-it-yourself malware kits are all the rage online and they're making life much easier for cyber-criminals looking to turn a quick buck. mark for My Articles similar articles
Wall Street & Technology
October 23, 2007
Melanie Rodier
Financial Firms Continue to Struggle to Plug Security Loopholes New technologies, such as pattern analysis, as well as awareness and training can help financial services firms keep hackers at bay. mark for My Articles similar articles
InternetNews
February 25, 2010
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. mark for My Articles similar articles
InternetNews
March 21, 2011
Sean Michael Kerner
Detecting Malware Without Software? New service from Trusteer can pinpoint remote malware running on client PCs. mark for My Articles similar articles
InternetNews
February 11, 2009
Richard Adhikari
Spammers Hijack Facebook Group of 1.5 Million Facebook site is taken over by get-rich-quick and other familiar spam. mark for My Articles similar articles
InternetNews
June 4, 2010
Hackers Zero In On Execs With World Cup Scam A flurry of malware scams are using e-mails related to the upcoming World Cup to target executives at companies and organizations around the world. mark for My Articles similar articles
InternetNews
November 17, 2010
Stuxnet, Mobile Threats Top 3Q Malware Report Security software vendor McAfee's 3Q Threats Report takes note of some older malware scams from the past and some new and discouraging new ones. mark for My Articles similar articles
InternetNews
February 25, 2010
Malware Thrives Despite Improved Security: IBM Security researchers at IBM's X-Force find 6,601 new software vulnerabilities in 2009, down 11 percent from last, but that hasn't stopped hackers and phishers from finding new ways to rip off consumers. mark for My Articles similar articles
Home Theater
April 1, 2010
Mark Fleischmann
Smart Meters Maybe Not So Smart Security holes may let hackers steal your juice. mark for My Articles similar articles
InternetNews
January 29, 2010
Another Bogus Virus Warning Disrupts Facebook The clever scam had Facebook users sharing and posting the bogus virus alert throughout the social networking site. mark for My Articles similar articles
InternetNews
March 25, 2010
Symantec: China Is Tops in Targeted Malware Symantec's latest report pinpoints China as the leading source of malware tailored to hoodwink execs in specific industries. mark for My Articles similar articles
InternetNews
January 4, 2008
David Needle
Wi-Fi Networks Face Virus Threat? Unprotected routers could spread malicious software rapidly to thousands of computers. mark for My Articles similar articles
InternetNews
November 8, 2010
Spam Surges 28 Percent in October: AppRiver Hundreds of millions of spam emails were distributed every day in October and most of them originated in the United States. mark for My Articles similar articles
PC World
June 1, 2008
Erik Larkin
Web 2.0 Sites a Thriving Marketplace for Malware Malicious software makers are using social networks, video sites, and blogs to peddle their wares to other online criminals. mark for My Articles similar articles
InternetNews
January 11, 2011
ID Theft Scam Targets Coke Fans Here's the latest in a long line of smash-and-grab phishing campaigns is using the soda giant as a lure to steal people's personal information. mark for My Articles similar articles
InternetNews
August 11, 2010
Malware Scams Hit New Peak in First Half Security software vendor McAfee says the number of new pieces of malware circulating on the Internet reached an all-time high in the first six months of this year. mark for My Articles similar articles
InternetNews
April 27, 2010
Passwords Should Be Last Line of Defense Longer passwords with numbers and capitalizations may make life a bit more difficult for identity thieves, but the truth is the relative strength or weakness of users' passwords should be beside the point. mark for My Articles similar articles
PC Magazine
March 20, 2009
Matthew D. Sarrel
I Stole My Friend's Identity If you've not yet jumped into the great abyss of social networking, then you haven't created any accounts that can be compromised, and you're safe, right? Not! mark for My Articles similar articles
InternetNews
April 20, 2010
Targeted, DIY Malware Here to Stay: Symantec Symantec's latest threat report provides plenty of disconcerting news for IT managers charged with safeguarding critical enterprise data. mark for My Articles similar articles
InternetNews
September 21, 2010
Microsoft Rushes to Fix Windows Server Flaw Researchers discover a hole in Microsoft's implementation of the Advanced Encryption Standard. mark for My Articles similar articles
Bank Technology News
April 2007
Michael Dumiak
Security: Malware Grows Up, Gets Hard To Stop Malware is now coming in a variety of new strains, making it more difficult to locate and repel. mark for My Articles similar articles
InternetNews
February 23, 2009
Richard Adhikari
Malware Authors Exploit Facebook App Is a bogus application making the rounds on Facebook just a failed marketing ploy? Or something more dangerous? mark for My Articles similar articles
InternetNews
July 7, 2010
Hackers Snipe Back in Microsoft Security Row Bruised by Microsoft's criticism dismissing the work of third-party security researchers, a band of hackers has begun a campaign to publish proof-of-concept vulnerabilities in the software giant's products. mark for My Articles similar articles
CRM
January 2004
David Myron
The Customer-Centric Enterprise True CRM is creating an organization that revolves around its customers. But not just for customers' sake -- for the good of the company as well. mark for My Articles similar articles
CIO
March 15, 2004
Christopher Lindquist
Model Hacker Behavior - Under Development Forget about patches. Researchers at the Florida Institute of Technology are looking for ways to fight hackers by modeling their methods, or "exploits." The research could eventually lead to new types of security tools capable of stopping attacks that hackers haven't even invented yet. mark for My Articles similar articles
InternetNews
June 14, 2010
SeaMicro Debuts Novel Cloud-Computing Server SeaMicro emerges from stealth mode with SM1000, a Web server it claims will substantially reduce power consumption by bolting together hundreds of small, efficient CPUs. mark for My Articles similar articles
InternetNews
December 3, 2010
Phony Holiday Tweets Hide Malware Shortened URLs posted on Twitter may not lead to the holiday-themed sites listed. mark for My Articles similar articles
InternetNews
December 5, 2008
Richard Adhikari
Latest Facebook Attack Stems from Previous One Businesses with Facebook links must watch out. mark for My Articles similar articles
InternetNews
February 17, 2009
Sean Gallagher
Social Networks a Magnet for Malware Just like the crooks robbed the banks because that's where the money is, malware will go where the people are. mark for My Articles similar articles
InternetNews
August 13, 2010
Malware Discovered on Another Red Cross Website The Red Cross of Serbia was targeted by hackers who injected malicious JavaScript files onto several of the organization's web pages. mark for My Articles similar articles
InternetNews
June 2, 2010
Facebook Users Fend Off 'Likejacking' Attacks Hackers looking to take over Web sessions via Facebook are hiding malware under click-inducing, socially engineered links. mark for My Articles similar articles
InternetNews
December 30, 2009
Twitter Blacklists 370 Shoddy Passwords To protect its users from themselves, Twitter is preventing new users from selecting some common or easily hacked passwords for their accounts. mark for My Articles similar articles
InternetNews
December 28, 2010
Security 2010: The Year in Review Stuxnet, embarrassing data leaks and sophisticated phishing attacks dominated the data security landscape in 2010. mark for My Articles similar articles
Bank Technology News
April 2007
Rebecca Sausner
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. mark for My Articles similar articles
InternetNews
August 27, 2010
Latest Malware Trap: Bogus Celebrity Deaths After mastering the art of rigging search engine results to spread malware when breaking news and celebrity gossip is trending hot, hackers have decided to just cut out the middleman. mark for My Articles similar articles
InternetNews
June 11, 2009
Alex Goldman
Malware Keeps Creeping Onto Mac OS X The Apple Mac is still seeing far fewer attacks than Windows experiences, but researchers say there's a disturbing trend at work. mark for My Articles similar articles
InternetNews
February 7, 2007
Ed Sutherland
Internet 'Didn't Crumble' Under DNS Attacks Internet users barely felt a ripple yesterday when hackers launched a concerted attack on several key Domain Name System servers. mark for My Articles similar articles
InternetNews
July 30, 2004
Ryan Naraine
'Critical' IE Patch Released Microsoft goes out-of-cycle to fix software flaws that led to last month's malware attack. mark for My Articles similar articles