MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
National Defense
March 2013
Stew Magnuson
Iran's Ability to Carry Out Attacks in Cyberspace May Be Improving The ability to carry out attacks from across the world that can do real physical or economic damage without ever launching a jet fighter or sending in suicide squads is tempting for adversaries such as Iran, U.S. officials and cybersecurity experts have pointed out. mark for My Articles similar articles
InternetNews
February 25, 2010
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. mark for My Articles similar articles
National Defense
December 2013
Yasmin Tadjdeh
Industry, Military Emphasize Need for 'Cyberwarrior' Training as Attacks Increase Government and military leaders have for years warned of increasingly pervasive and nefarious cyber-attacks. The network intrusions, perpetrated by nation states, hacktivists and thieves, are growing rapidly, experts have said. mark for My Articles similar articles
National Defense
March 2014
Robert Johnston
New Approach Needed to Counter Malicious Software For the better part of a decade, network security has been overly focused on perimeter defenses. This has triggered a change in nation-level techniques for launching cyber-attacks. mark for My Articles similar articles
Fast Company
Neal Ungerleider
China Allegedly Arrested Hackers To Comply With The U.S. Government's Demands Whether China will actually prosecute the hackers is a whole other issue; it's possible the country only made the arrests to skirt the economic sanctions that President Obama was lording over China. mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
Fast Company
Neal Ungerleider
Facebook Tipped Off The U.S. Government To Iranian Hackers State Department officials were tipped off by Facebook's new notifications when Iranian hackers compromised their Facebook accounts. mark for My Articles similar articles
PC World
May 2001
Kim Zetter
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... mark for My Articles similar articles
National Defense
June 2013
Stew Magnuson
Defense Industrial Base Wary of Cybersecurity Laws That hackers are intent on stealing U.S. trade secrets -- particularly those pertaining to the military -- is a given. That the United States is capable of responding to this threat remains to be seen. mark for My Articles similar articles
Bank Systems & Technology
September 15, 2007
Sharon Gaudin
Number Of Hackers Attacking Banks Jumps 81% Hackers no longer need to be technical wizards to set up an operation to steal people's banking information and then rob their accounts. mark for My Articles similar articles
Information Today
February 4, 2013
Paula J. Hane
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. mark for My Articles similar articles
National Defense
October 2013
Yasmin Tadjdeh
Fears of Devastating Cyber-Attacks on Electric Grid, Critical Infrastructure Grow Department of Homeland Security Secretary Janet Napolitano warned that the United States faces "a major cyber-event that will have a serious effect on our lives, our economy and the everyday functioning of our society." mark for My Articles similar articles
BusinessWeek
April 5, 2004
Stanley Reed
Aramco: Behind The Numbers Saudi Aramco says it has 260 billion barrels of proved reserves. Since there is no independent auditor to vouch for them, many analysts are suspicious. mark for My Articles similar articles
CIO
April 25, 2014
Lucian Constantin
5 Things You Need to Know About Cybersecurity Insurance Cybersecurity insurance transfers some of the financial risk of a security breach to the insurer. But it doesn't do a good job of covering the reputation damage and business downturn that can be triggered by a security breach. mark for My Articles similar articles
Fast Company
Daniel Terdiman
AP Report: U.S. Power Grid Subject To Repeated Foreign Hacks The U.S. power grid is subject to being hacked from abroad, and foreign hackers have gained remote access to American power operations about a dozen times over the last decade. mark for My Articles similar articles