MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
February 25, 2010
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. mark for My Articles similar articles
IEEE Spectrum
March 2013
David Kushner
The Real Story of Stuxnet How Kaspersky Lab tracked down the malware that stymied Iran's nuclear-fuel enrichment program mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
PC World
February 21, 2007
Ryan Singel
Zero-Day Malware Attacks You Can't Block No matter how diligently you patch your PC, it may still be vulnerable during the first hours of a previously unseen attack. Here's what you should know about zero-day hazards and the security holes they exploit. mark for My Articles similar articles
InternetNews
December 5, 2008
Richard Adhikari
Latest Facebook Attack Stems from Previous One Businesses with Facebook links must watch out. mark for My Articles similar articles
InternetNews
January 14, 2010
McAfee Fingers Microsoft IE Flaw in Google Attack McAfee's researchers say 'Operation Aurora' used a zero-day vulnerability in Microsoft's browser software to penetrate Google's networks. mark for My Articles similar articles
National Defense
March 2014
Stew Magnuson
Defense Companies Facing Array of New Cyberthreats There are new pitfalls out there for defense companies large and small that face a dizzying array of threats against their networks. mark for My Articles similar articles
InternetNews
August 17, 2005
Tim Gray
Windows Worm Goes Global The Zotob.B virus and its variants are now using chat channels to allow hackers to control infected PCs. mark for My Articles similar articles
National Defense
September 2011
Stew Magnuson
Cyber-Espionage Against U.S. Firms More Widespread than Previously Thought That foreign adversaries are using computer network vulnerabilities to steal military data from the U.S. government and its contractors is well known and hardly surprising. mark for My Articles similar articles
InternetNews
February 26, 2004
Sean Michael Kerner
Worms Continue to Wriggle, Wreak Havoc 'Zero-day' exploits and new styles of viruses send security firms scrambling to patch the latest holes in the network. mark for My Articles similar articles
InternetNews
September 27, 2010
Stuxnet Worm Infests Iranian Nuclear Plant The aggressive and decidedly crafty Stuxnet worm has struck Iran's first nuclear power facility, government officials said Monday. mark for My Articles similar articles
The Motley Fool
January 26, 2011
Rich Smith
Welcome! You've Got Computer Worms! While the U.S. only targeted Stuxnet into Iran's nuclear centrifuge labs, the worm didn't stay stuck on it. Already, the worm has leaked out of Iran and into Symantec's virus filters. mark for My Articles similar articles
PC Magazine
January 1, 2011
Larry Seltzer
Computer Security: How It Looks for 2011 Here are what security vendors predict for 2011. mark for My Articles similar articles
National Defense
December 2011
Stew Magnuson
Defense Department Partners With Industry To Stem Staggering Cybertheft Losses The amount of intellectual property hackers are stealing from U.S. companies and sending to China is said to be staggering. The private sector's crown jewels are being moved off nominally secure networks and transmitted to the Asian nation every day: usually from 9 to 5 -- Beijing time. mark for My Articles similar articles
National Defense
December 2009
Austin Wright
National-Security Infrastructure Faces Relentless Cyberespionage Campaign U.S. government and defense-industry networks face a relentless onslaught from cyber-spies who seek some of the nation's most heavily guarded secrets mark for My Articles similar articles
InternetNews
January 28, 2010
IT Managers Brace for a Barrage of Cyber Attacks Despite increased awareness and new state and federal legislation, most enterprise IT managers expect to be victimized by a major cyber attack in the next five years. mark for My Articles similar articles
InternetNews
November 17, 2010
Stuxnet, Mobile Threats Top 3Q Malware Report Security software vendor McAfee's 3Q Threats Report takes note of some older malware scams from the past and some new and discouraging new ones. mark for My Articles similar articles
InternetNews
December 28, 2010
Security 2010: The Year in Review Stuxnet, embarrassing data leaks and sophisticated phishing attacks dominated the data security landscape in 2010. mark for My Articles similar articles
National Defense
March 2014
Robert Johnston
New Approach Needed to Counter Malicious Software For the better part of a decade, network security has been overly focused on perimeter defenses. This has triggered a change in nation-level techniques for launching cyber-attacks. mark for My Articles similar articles
InternetNews
February 2, 2009
Richard Adhikari
Are Legitimate Sites the Next Malware Threat? Businesses may be exposing their customers to malware by leaving their sites unpatched, IBM warns in a new study. mark for My Articles similar articles
InternetNews
February 26, 2009
Richard Adhikari
Microsoft Clamps Down on Excel Zero-Day Attack Microsoft is taking steps to protect customers from attacks through a zero-day flaw in Microsoft Excel discovered earlier this week. mark for My Articles similar articles
InternetNews
November 20, 2009
Symantec's 'Unlucky 13' Security Trends for 2010 Hackers and malware purveyors are becoming more sophisticated, meaning computer users need to become wiser and more proactive, too. mark for My Articles similar articles
InternetNews
May 8, 2006
David Miller
The Surge in Mac Attacks Just as Apple Computer launched a new ad touting OSX's resilience against viruses, the Macintosh operating system and applications have come under fire for harboring serious security flaws. mark for My Articles similar articles
The Motley Fool
February 25, 2011
David Lee Smith
Big Oil: Hacked From China First it was Google, and now it turns out Chinese hackers have hit Big Oil. mark for My Articles similar articles
InternetNews
April 6, 2010
Vietnam Dismisses Google's Malware Allegations Vietnamese official calls claims by Google and McAfee of a widespread cyber attack against dissident activists "groundless," while China issues a similar denial of an unrelated report of cyber crime in that country. mark for My Articles similar articles
InternetNews
February 27, 2007
Ed Sutherland
Storm Trojan Takes Social Measures Storm Trojan uses Web mail, blogs and message boards as conduits for spreading malware code. mark for My Articles similar articles
Bank Technology News
November 2007
McAfee's Top 10 Threats for 2008 McAfee released its 2008 threat predictions this week. Here's the first half of the list. mark for My Articles similar articles
InternetNews
November 29, 2007
Andy Patrizio
Cyber Crime Grows More Dangerous And Sophisticated McAfee study finds online threats are getting more complex and brazen in what they target, like the U.S. military. mark for My Articles similar articles
InternetNews
February 22, 2008
Andy Patrizio
Yo Quiero Antivirus. Malware Goes Multilingual With BRIC and EMEA markets emerging, the bad guys go after non-American targets. mark for My Articles similar articles
InternetNews
July 6, 2006
Sean Michael Kerner
Trojans on The March Is it all Microsoft's fault? One security vendor suggests that users may well want to switch to a less-targeted OS. mark for My Articles similar articles
InternetNews
October 24, 2007
Andy Patrizio
The 'Storm' That Keeps Blowing The Storm worm seems to unleash one new e-mail flood or denial of service attack every week. Why won't it go away? mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
National Defense
January 2011
Stew Magnuson
Launching Malware Is Just a Few Clicks Away Russian crime syndicates are happy to sell would-be cyber-thieves or spies a basic toolkit for $4,000. mark for My Articles similar articles
InternetNews
January 19, 2011
Researcher Looks to Demystify Stuxnet Threat Securicon's Tom Parker is planning to present research at the Black Hat security conference describing a technical analysis of the feared threat of the Stuxnet worm, offering some tips for mitigation. mark for My Articles similar articles
InternetNews
April 11, 2007
Andy Patrizio
Office Exploits Rear Their Ugly Heads At this rate, Microsoft Office could become a more popular virus target than Windows. mark for My Articles similar articles
InternetNews
August 23, 2007
Andy Patrizio
Storm Worm Gathers Strength on The Internet The Storm worm virus is still around, still causing trouble and stronger than ever six months later. mark for My Articles similar articles
Search Engine Watch
October 5, 2010
Kristi Hines
Safeguarding Your PC When Link Building Here's what you can do to protect your computer while checking out your competitors' backlinks and avoid losing valuable productivity time if your machine gets infected with malware. mark for My Articles similar articles