Similar Articles |
|
InternetNews February 25, 2010 |
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. |
IEEE Spectrum March 2013 David Kushner |
The Real Story of Stuxnet How Kaspersky Lab tracked down the malware that stymied Iran's nuclear-fuel enrichment program |
Search Engine Watch January 20, 2010 Jason King |
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. |
PC World February 21, 2007 Ryan Singel |
Zero-Day Malware Attacks You Can't Block No matter how diligently you patch your PC, it may still be vulnerable during the first hours of a previously unseen attack. Here's what you should know about zero-day hazards and the security holes they exploit. |
InternetNews December 5, 2008 Richard Adhikari |
Latest Facebook Attack Stems from Previous One Businesses with Facebook links must watch out. |
InternetNews January 14, 2010 |
McAfee Fingers Microsoft IE Flaw in Google Attack McAfee's researchers say 'Operation Aurora' used a zero-day vulnerability in Microsoft's browser software to penetrate Google's networks. |
National Defense March 2014 Stew Magnuson |
Defense Companies Facing Array of New Cyberthreats There are new pitfalls out there for defense companies large and small that face a dizzying array of threats against their networks. |
InternetNews August 17, 2005 Tim Gray |
Windows Worm Goes Global The Zotob.B virus and its variants are now using chat channels to allow hackers to control infected PCs. |
National Defense September 2011 Stew Magnuson |
Cyber-Espionage Against U.S. Firms More Widespread than Previously Thought That foreign adversaries are using computer network vulnerabilities to steal military data from the U.S. government and its contractors is well known and hardly surprising. |
InternetNews February 26, 2004 Sean Michael Kerner |
Worms Continue to Wriggle, Wreak Havoc 'Zero-day' exploits and new styles of viruses send security firms scrambling to patch the latest holes in the network. |
InternetNews September 27, 2010 |
Stuxnet Worm Infests Iranian Nuclear Plant The aggressive and decidedly crafty Stuxnet worm has struck Iran's first nuclear power facility, government officials said Monday. |
The Motley Fool January 26, 2011 Rich Smith |
Welcome! You've Got Computer Worms! While the U.S. only targeted Stuxnet into Iran's nuclear centrifuge labs, the worm didn't stay stuck on it. Already, the worm has leaked out of Iran and into Symantec's virus filters. |
PC Magazine January 1, 2011 Larry Seltzer |
Computer Security: How It Looks for 2011 Here are what security vendors predict for 2011. |
National Defense December 2011 Stew Magnuson |
Defense Department Partners With Industry To Stem Staggering Cybertheft Losses The amount of intellectual property hackers are stealing from U.S. companies and sending to China is said to be staggering. The private sector's crown jewels are being moved off nominally secure networks and transmitted to the Asian nation every day: usually from 9 to 5 -- Beijing time. |
National Defense December 2009 Austin Wright |
National-Security Infrastructure Faces Relentless Cyberespionage Campaign U.S. government and defense-industry networks face a relentless onslaught from cyber-spies who seek some of the nation's most heavily guarded secrets |
InternetNews January 28, 2010 |
IT Managers Brace for a Barrage of Cyber Attacks Despite increased awareness and new state and federal legislation, most enterprise IT managers expect to be victimized by a major cyber attack in the next five years. |
InternetNews November 17, 2010 |
Stuxnet, Mobile Threats Top 3Q Malware Report Security software vendor McAfee's 3Q Threats Report takes note of some older malware scams from the past and some new and discouraging new ones. |
InternetNews December 28, 2010 |
Security 2010: The Year in Review Stuxnet, embarrassing data leaks and sophisticated phishing attacks dominated the data security landscape in 2010. |
National Defense March 2014 Robert Johnston |
New Approach Needed to Counter Malicious Software For the better part of a decade, network security has been overly focused on perimeter defenses. This has triggered a change in nation-level techniques for launching cyber-attacks. |
InternetNews February 2, 2009 Richard Adhikari |
Are Legitimate Sites the Next Malware Threat? Businesses may be exposing their customers to malware by leaving their sites unpatched, IBM warns in a new study. |
InternetNews February 26, 2009 Richard Adhikari |
Microsoft Clamps Down on Excel Zero-Day Attack Microsoft is taking steps to protect customers from attacks through a zero-day flaw in Microsoft Excel discovered earlier this week. |
InternetNews November 20, 2009 |
Symantec's 'Unlucky 13' Security Trends for 2010 Hackers and malware purveyors are becoming more sophisticated, meaning computer users need to become wiser and more proactive, too. |
InternetNews May 8, 2006 David Miller |
The Surge in Mac Attacks Just as Apple Computer launched a new ad touting OSX's resilience against viruses, the Macintosh operating system and applications have come under fire for harboring serious security flaws. |
The Motley Fool February 25, 2011 David Lee Smith |
Big Oil: Hacked From China First it was Google, and now it turns out Chinese hackers have hit Big Oil. |
InternetNews April 6, 2010 |
Vietnam Dismisses Google's Malware Allegations Vietnamese official calls claims by Google and McAfee of a widespread cyber attack against dissident activists "groundless," while China issues a similar denial of an unrelated report of cyber crime in that country. |
InternetNews February 27, 2007 Ed Sutherland |
Storm Trojan Takes Social Measures Storm Trojan uses Web mail, blogs and message boards as conduits for spreading malware code. |
Bank Technology News November 2007 |
McAfee's Top 10 Threats for 2008 McAfee released its 2008 threat predictions this week. Here's the first half of the list. |
InternetNews November 29, 2007 Andy Patrizio |
Cyber Crime Grows More Dangerous And Sophisticated McAfee study finds online threats are getting more complex and brazen in what they target, like the U.S. military. |
InternetNews February 22, 2008 Andy Patrizio |
Yo Quiero Antivirus. Malware Goes Multilingual With BRIC and EMEA markets emerging, the bad guys go after non-American targets. |
InternetNews July 6, 2006 Sean Michael Kerner |
Trojans on The March Is it all Microsoft's fault? One security vendor suggests that users may well want to switch to a less-targeted OS. |
InternetNews October 24, 2007 Andy Patrizio |
The 'Storm' That Keeps Blowing The Storm worm seems to unleash one new e-mail flood or denial of service attack every week. Why won't it go away? |
Insurance & Technology May 14, 2005 Michael Cohn |
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. |
National Defense January 2011 Stew Magnuson |
Launching Malware Is Just a Few Clicks Away Russian crime syndicates are happy to sell would-be cyber-thieves or spies a basic toolkit for $4,000. |
InternetNews January 19, 2011 |
Researcher Looks to Demystify Stuxnet Threat Securicon's Tom Parker is planning to present research at the Black Hat security conference describing a technical analysis of the feared threat of the Stuxnet worm, offering some tips for mitigation. |
InternetNews April 11, 2007 Andy Patrizio |
Office Exploits Rear Their Ugly Heads At this rate, Microsoft Office could become a more popular virus target than Windows. |
InternetNews August 23, 2007 Andy Patrizio |
Storm Worm Gathers Strength on The Internet The Storm worm virus is still around, still causing trouble and stronger than ever six months later. |
Search Engine Watch October 5, 2010 Kristi Hines |
Safeguarding Your PC When Link Building Here's what you can do to protect your computer while checking out your competitors' backlinks and avoid losing valuable productivity time if your machine gets infected with malware. |