MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC Magazine
June 5, 2008
Malware Everywhere Malicious software attacks, including Trojan horses, bots, and rootkits, are rising at the fastest rate ever. mark for My Articles similar articles
Information Today
September 23, 2014
LexisNexis Introduces Identity Challenges Resource LexisNexis Risk Solutions created a thought leadership platform to educate government agencies and officials about solutions to their identity challenges. mark for My Articles similar articles
Entrepreneur
August 2007
Jacquelyn Lynn
Small Business Owners Risk Identity Theft Insuring your identity makes it easier to get it back. mark for My Articles similar articles
PC Magazine
May 1, 2009
Matthew D. Sarrel
Identity Theft: It's Out of Your Hands The most important thing you have is you, right? And online, you are your identity. If xyz.com doesn't value you enough to keep you safe, then does that company really deserve your business? mark for My Articles similar articles
PC Magazine
February 15, 2006
Robert Lemos
Caught by Phish Falling prey to online identity theft takes only a few minutes, but the cost can be high. mark for My Articles similar articles
PC World
January 2002
Steve Bass
Wily Tricks to Thwart E-Thieves Keep your money -- and your identity -- safe while you're on the Web... mark for My Articles similar articles
Inc.
August 2003
Robert X. Cringely
They've Got Your Number Identity theft using a combination of computer technology and government information is a major crime just waiting to happen. mark for My Articles similar articles
The Motley Fool
June 13, 2011
Arunava De
Are Hackers the Next Threat to Your Portfolio? Before you respond to a malicious attack on one of your investments in your portfolios, measure the impact that such an attack can have on the company. mark for My Articles similar articles
CRM
December 2013
Ray Wang
Why the Battle for Identity Will Affect Customer Experience Merging identities across environments is no easy task. Facebook, Google, and Twitter dominate most social log-ins. Users expect their identity to be transportable from personal to work environments. These implications carry over to customer experience. mark for My Articles similar articles
CIO
August 1, 2005
Grant Gross
VoIP Security Debate Heats Up Voice over IP (VoIP) telephony and malicious software for mobile devices are among the most-hyped IT security threats, according to Gartner. mark for My Articles similar articles
InternetNews
July 19, 2007
Roy Mark
DoJ Sends ID Theft Bill to Congress The Bush administration sent proposed legislation to Congress today that aims to update and improve federal identity theft laws. mark for My Articles similar articles
OCC Bulletin
September 8, 2004
FFIEC Customer Brochure To assist depository institutions' efforts in raising customer awareness of identity theft and similar crimes, "Protecting Customers' Personal Financial Information" outlines steps bank customers should take to reduce the risk of identity theft. mark for My Articles similar articles
InternetNews
March 19, 2007
Andy Patrizio
What's a New Identity Cost? Less Than a CD. Symantec probes the identity-trading underground and finds personal IDs selling for $14. mark for My Articles similar articles
Salon.com
October 2, 2001
Katharine Mieszkowski
Wanted: Your name and number The hijackers in the terrorist attacks were masters of identity theft. Now lawmakers are worried about copycat persona stealing... mark for My Articles similar articles
PC Magazine
June 20, 2008
Larry Seltzer
Hacked Through the Heart Even medical gadgetry is subject to outside hacking. mark for My Articles similar articles
PC Magazine
March 20, 2009
Matthew D. Sarrel
I Stole My Friend's Identity If you've not yet jumped into the great abyss of social networking, then you haven't created any accounts that can be compromised, and you're safe, right? Not! mark for My Articles similar articles
InternetNews
October 28, 2008
Richard Adhikari
Yahoo Tightens HotJobs After Hackers Hit In a move that could have saved thousands of potential victims of identity theft, Yahoo techs have fixed a flaw in it's HotJobs Web site, one of the leading online job sites with thousands of subscribers. mark for My Articles similar articles
InternetNews
April 23, 2010
SMBs Often a Weak Link in Cyber Security Lax data security and a lack of resources could be exposing small and midsized businesses - and their customers - to risk. mark for My Articles similar articles
InternetNews
October 27, 2010
Malware Scams Pick Up In Retail Sector Targeted attacks are becoming more and more common as hackers seek out specific individuals or groups to steal proprietary information. mark for My Articles similar articles
The Motley Fool
October 21, 2004
Tom Taulli
Our Money, Our Lost Identities There are many threats to our pocketbooks in the online world. Entrust's plan to put a stop to it can have a big impact for e-commerce. The company posted revenues of $21.3 million, which was a 6% increase from the same period a year ago. mark for My Articles similar articles
The Motley Fool
February 23, 2007
Mary Dalrymple
Hassled to the Maxx The identity theft saga involving T.J. Maxx continues: Consumers need to be on the lookout for evidence that their identity, credit card, or debit card information has slipped into the wrong hands. mark for My Articles similar articles
InternetNews
August 25, 2005
Clint Boulton
China Sites Said Behind U.S. Network Attacks Report says the latest spate of attacks from China-based sites on U.S. government networks raises new concerns. But one analyst wonders about the alarm. mark for My Articles similar articles
InternetNews
May 20, 2010
Novell Offers Cloud-Based Identity Manager With this new release, Novell's identity management tools/framework cover the move of services and identity floating in the clouds, and more tools for access and security on the way. mark for My Articles similar articles
InternetNews
February 24, 2010
Cyber Attacks Hit 75% of Enterprises in 2009 Symantec's latest report has more unsettling news for IT security administrators. mark for My Articles similar articles
Bank Technology News
April 2009
Rebecca Sausner
Compliance, IAM Top Security Plans Security regulatory compliance and identity and access management were the top two security initiatives in financial services in 2008, just as they were the year before. mark for My Articles similar articles
InternetNews
January 29, 2007
Michael Hickins
Microsoft Warns of New Zero-Day Flaw Microsoft is investigating new public reports of limited "zero-day" attacks using a vulnerability in Microsoft Word 2000. mark for My Articles similar articles
InternetNews
April 23, 2007
Roy Mark
A New Fight Against ID Theft Improved cyber security, increased law enforcement and public education top the recommendations of President Bush's Identity Theft Task Force plan issued today. mark for My Articles similar articles
AskMen.com
Michael Hirsch
How To: Deal With Identity Theft You probably don't think about it, but transactions you take for granted every day put you at risk for identity theft. mark for My Articles similar articles
CRM
September 7, 2012
Dale Dabbs
Protect Your Most Valuable Business Assets--Your Customers Optimal CRM incorporates data protection best practices to curtail identity theft. mark for My Articles similar articles
InternetNews
February 27, 2006
Clint Boulton
Manage Your Own Identity Online Companies like Microsoft join Harvard in the Higgins Project, which is designed to help people control their identity info online. mark for My Articles similar articles
The Motley Fool
June 16, 2005
Tim Beyers
Hackers Aim for AIM Is instant messaging really that safe? Not so much. The startling lack of IM shielding from major vendors such as Symantec and McAfee has left many users vulnerable. mark for My Articles similar articles
InternetNews
January 12, 2009
Richard Adhikari
Vendors See More DLP with ID Management CA's recent acquisition is a sign of more product adds to come. mark for My Articles similar articles
PC Magazine
October 28, 2003
Sebastian Rupley
Lock 'Em Out Take steps to protect yourself from identity theft. mark for My Articles similar articles
T.H.E. Journal
May 2005
Microsoft Launches `Web Watchers' Initiative With High-Tech Partners This program provides educators with age- and curriculum-appropriate lessons that will help students understand the opportunities and risks of the Internet, including how to avoid installation of malicious software and how to protect their online identity. mark for My Articles similar articles
InternetNews
May 1, 2006
David Miller
Zero-Day Attacks an Ongoing Menace Security report from the SANS Institute details biggest Internet vulnerabilities. mark for My Articles similar articles
InternetNews
February 12, 2010
Study Puts Identity Theft Cost at $54B in 2009 Research firm Javelin estimates that more than 11 million Americans were victims of identity theft last year, a 12 percent increase that led to tens of billions of dollars in costs. mark for My Articles similar articles
InternetNews
September 15, 2008
Richard Adhikari
Hackers Hit BusinessWeek With Malware The BusinessWeek.com site was hit by a SQL injection attack and connects users to a sleeper site. mark for My Articles similar articles
InternetNews
July 5, 2005
Roy Mark
Finance Firms To Give FTC ID Theft Data The financial services industry is pooling its own data on identity theft victims with the Federal Trade Commission and law enforcement groups. mark for My Articles similar articles
Knowledge@Wharton
May 21, 2003
Ignoring Your Corporate Identity Can Sabotage Strategic Change Identity is a crucial component of all firms, but it often goes ignored until a crisis forces a company to confront change. mark for My Articles similar articles
PC Magazine
November 29, 2006
Robert Lemos
Hacking for Dollars Viruses and worms are so last-decade. Today's PC users have to worry more about online burglary than stolen bandwidth. mark for My Articles similar articles
Search Engine Watch
April 14, 2011
Kristine Schachinger
3 Website Exploits - Are You Protected? Examining three common attacks that can hurt your visitors and rankings, and tips on how to prevent your site from being hacked. mark for My Articles similar articles
InternetNews
December 30, 2004
Tim Gray
Trojan Threatens XP Flaw may leave Windows XP vulnerable to attack. mark for My Articles similar articles
Inc.
March 2007
What We're Worrying About These days, computer security threats are coming from all directions. Here's what is keeping entrepreneurs up at night, according to a recent survey by the research firm Forrester. mark for My Articles similar articles
Bank Technology News
February 2005
Holly Sraeel
Hot on the ID Theft Trail: Will the Real Jane Doe Stand Up? Welcome to the world of identity theft, where the snatch of an individual's social security number begins that unsuspecting individual's downward financial spiral. mark for My Articles similar articles
InternetNews
September 18, 2009
Hackers Hit 'Curious George' on PBS Web Site Malicious code aimed to infect visitors to the site. mark for My Articles similar articles
InternetNews
February 20, 2008
Larry Barrett
Can Oracle's Identity Manager Tackle Compliance? Oracle on Wednesday announced the release of the latest version of its Identity Manager software, a key security and access management component of its Fusion middleware platform. mark for My Articles similar articles
Bank Systems & Technology
March 7, 2005
Cynthia Ramsaran
ID Theft Hits Paper Harder Despite growing fears of online fraud related to Web-based banking services, the increase in identity theft is hitting consumers closer to home than in cyberspace. Identity theft crimes are more often committed off-line rather than online. mark for My Articles similar articles
PC World
October 2002
Anne Kandra
Don't Let Them Steal Your Good Name Identity theft is skyrocketing -- and it's even being used to fund terrorism. The Web can be a real boon for identity thieves, helping them find information about victims and profit from the crime. mark for My Articles similar articles
Bank Systems & Technology
July 12, 2007
Larry Greenemeier
Link Between Data Breaches And ID Theft Unclear, GAO Reports A U.S. Government Accountability Office report indicates that while the amount of information lost or stolen is disturbing, it's difficult to prove that these breaches lead to identity theft. mark for My Articles similar articles
Bank Systems & Technology
April 7, 2006
Peggy Bresnick Kendler
Security Outlook A plethora of high-profile data breaches and concerns about identity theft have put the banking industry on high alert. To secure their information assets, banks must implement a cross-channel, multilayered approach that extends beyond technology. mark for My Articles similar articles