MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC World
February 21, 2007
Ryan Singel
Zero-Day Malware Attacks You Can't Block No matter how diligently you patch your PC, it may still be vulnerable during the first hours of a previously unseen attack. Here's what you should know about zero-day hazards and the security holes they exploit. mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
National Defense
January 2011
Stew Magnuson
Cyberattacks Reaching New Heights of Sophistication The year 2010 may prove to be a watershed for cyber-security. The three incidents: the Aurora operation; the hijacking of data and the Stuxnet virus were all stunning new developments. mark for My Articles similar articles
T.H.E. Journal
December 2002
Vincent Weafer
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous. mark for My Articles similar articles
National Defense
September 2009
Grace V. Jean
In The Fight Against Cybercrime, Weapons Have Short Shelf Lives Even the latest innovations to protect U.S. networks are not enough to counter cybercrimes. mark for My Articles similar articles
BusinessWeek
August 22, 2005
Grow & Hamm
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. mark for My Articles similar articles
Fast Company
Rebecca Greenfield
Antivirus Is Dead. Meet The Next Generation of Anti-Hacker Tools The average time it takes to resolve on attack is 32 days, costing an average of $32,469 per day. Area 1 hopes to catch viruses way before then. mark for My Articles similar articles
PC World
May 2001
Kim Zetter
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... mark for My Articles similar articles
InternetNews
November 27, 2007
Sean Michael Kerner
SANS: Zero-Day Exploits on The Decline Latest Top 20 Vulnerabilities release shows a decrease in actual zero-day attacks, but that's not necessarily a good thing. mark for My Articles similar articles
PC World
August 2006
Andrew Brandt
The 10 Biggest Security Risks You Don't Know About Hackers, scammers, and identity thieves are constantly coming up with new ways to attack your PC and your privacy. Here are the newest perils and how to foil them. mark for My Articles similar articles
Information Today
February 4, 2013
Paula J. Hane
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. mark for My Articles similar articles
National Defense
August 2012
Eric Beidel
Companies Rush to Tailor Products to New Cyber-Attacks The cybersecurity marketplace is flooded with products that tout the ability to keep networks and computers safe from intruders. mark for My Articles similar articles
National Defense
December 2011
Stew Magnuson
Defense Department Partners With Industry To Stem Staggering Cybertheft Losses The amount of intellectual property hackers are stealing from U.S. companies and sending to China is said to be staggering. The private sector's crown jewels are being moved off nominally secure networks and transmitted to the Asian nation every day: usually from 9 to 5 -- Beijing time. mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
InternetNews
February 25, 2010
Malware Thrives Despite Improved Security: IBM Security researchers at IBM's X-Force find 6,601 new software vulnerabilities in 2009, down 11 percent from last, but that hasn't stopped hackers and phishers from finding new ways to rip off consumers. mark for My Articles similar articles
Real Estate Portfolio
Mar/Apr 2002
Scott Laliberte
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... mark for My Articles similar articles
Wall Street & Technology
October 23, 2007
Melanie Rodier
Financial Firms Continue to Struggle to Plug Security Loopholes New technologies, such as pattern analysis, as well as awareness and training can help financial services firms keep hackers at bay. mark for My Articles similar articles
eCFO
December 2000
Karen J. Bannan
Fear of the Black Hats Increasingly, companies are hiring hackers to test their network firewalls. This may not be such a good idea. mark for My Articles similar articles
Entrepreneur
June 2010
Ericka Chickowski
Protect Your Small Business Against Cyber Attacks Cybercrime costs the economy more than $1 trillion per year, and crooks are increasingly setting their sights on small businesses. A look at the most destructive threats to your network - and what you need to do about them. mark for My Articles similar articles
PC World
January 2001
Stuart J. Johnston
Bugs and Fixes: Prevent One-Click Hack Attacks More Internet Explorer and Windows security holes; HP Pavilion ID crisis... mark for My Articles similar articles
CFO
January 30, 2004
Esther Shein
Spy vs. Spy Companies are spending billions on network security, but staying ahead of hackers may be a pipe dream. mark for My Articles similar articles
InternetNews
November 20, 2009
Symantec's 'Unlucky 13' Security Trends for 2010 Hackers and malware purveyors are becoming more sophisticated, meaning computer users need to become wiser and more proactive, too. mark for My Articles similar articles
PC Magazine
March 16, 2004
Leon Erlanger
The Weakest Link Even the best-protected networks are vulnerable if employees unwittingly divulge sensitive information. mark for My Articles similar articles
PC World
December 20, 2001
Matt Berger
Windows Patch Plugs 'Critical' Holes Microsoft issues a fix for a major flaw -- kept secret for five weeks -- that leaves Windows XP, Me, and some 98 systems vulnerable when online... mark for My Articles similar articles
InternetNews
July 14, 2009
Microsoft Blocks Three New Security Holes Microsoft fixed a spate of zero-day holes in its latest Patch Tuesday drop. mark for My Articles similar articles
Registered Rep.
May 24, 2011
Lauren Barack
Cyber-Hackers: Faster, Better Equipped Than You Security should be the responsibility of all employees - not just the chief technology officer, or the principal of an advisory firm. mark for My Articles similar articles
Bank Technology News
April 2007
Rebecca Sausner
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. mark for My Articles similar articles
CRM
October 1, 2005
Marshall Lager
The Hot Skinny on Hackers What do they know, and how do they find out? A recent "hackers convention" revealed some of their secrets. mark for My Articles similar articles
National Defense
June 2013
Tim Larkins
Threats and Opportunities Growing in Cybersecurity The federal government will spend about $10 billion on cybersecurity in fiscal year 2013. That number could grow to $13 billion in fiscal year 2014. mark for My Articles similar articles
InternetNews
March 16, 2004
Sharon Gaudin
Report: Threats Coming from all Sides A Symantec study shows that the number of software security flaws has leveled off over the past year. That sounds like good news until you find out that it's leveled off at seven new vulnerabilities a day, or 2,636 a year. mark for My Articles similar articles
InternetNews
February 2, 2009
Richard Adhikari
Are Legitimate Sites the Next Malware Threat? Businesses may be exposing their customers to malware by leaving their sites unpatched, IBM warns in a new study. mark for My Articles similar articles
PC World
November 2004
Harry McCracken
Is This Any Way to Fix Security Holes? How today's software patching process actually helps hackers do their job. mark for My Articles similar articles
InternetNews
November 29, 2007
Andy Patrizio
Cyber Crime Grows More Dangerous And Sophisticated McAfee study finds online threats are getting more complex and brazen in what they target, like the U.S. military. mark for My Articles similar articles
CIO
October 1, 2003
Art Jahnke
Should Software Vulnerabilities Be Posted Online? Readers weigh in with their opinions on this thorny issue. mark for My Articles similar articles
InternetNews
March 29, 2011
Is McAfee.com Insecure? Security researchers publicly expose vulnerabilities on McAfee's website. mark for My Articles similar articles
National Defense
August 2011
Eric Beidel
Protectors of Critical Networks Look Within For Vulnerabilities The hacker is only one ingredient in a network intrusion. While leaders are rightly concerned about outsiders breaking into their networks, they also realize that their own employees may have as much to do with the next breach as an outsider. mark for My Articles similar articles
InternetNews
April 10, 2007
Andy Patrizio
Three Critical Fixes For Windows Microsoft releases three significant fixes for Windows, but Office remains exposed. mark for My Articles similar articles
CIO
July 20, 2011
Michael Friedenberg
Pundits Were Right About Mobile Cybersecurity Risks Industry pundits predicted escalating cybersecurity threats, and they were right. mark for My Articles similar articles
InternetNews
June 4, 2009
Stuart J. Johnston
Six Critical Microsoft Patches Coming Tuesday Microsoft plans to deliver ten patches, six of them "critical," next Tuesday when it makes its scheduled monthly patch drop - on what's known as "Patch Tuesday." mark for My Articles similar articles
PC Magazine
February 1, 2006
Cade Metz
The Sorry State of Security Time to face facts: when it comes to our online safety woes, everybody is to blame. mark for My Articles similar articles
InternetNews
May 8, 2006
David Miller
The Surge in Mac Attacks Just as Apple Computer launched a new ad touting OSX's resilience against viruses, the Macintosh operating system and applications have come under fire for harboring serious security flaws. mark for My Articles similar articles
InternetNews
November 23, 2009
Zero-Day Exploit a Threat to IE6 & 7 Browsers? Another zero-day hole emerges in key Microsoft software. mark for My Articles similar articles
InternetNews
July 2, 2010
Windows XP Zero-Day Leads to 10,000+ Attacks Microsoft says that the vulnerability, revealed last month, has caught the attention of attackers. mark for My Articles similar articles
Bank Systems & Technology
July 22, 2007
Nancy Feig
Bank's IT Security Vulnerability Growing Improvements in overall security have been achieved in most industry sectors, but the financial services industry has seen an increase in the average number of IT vulnerabilities, according to to a study. mark for My Articles similar articles
InternetNews
February 24, 2009
Richard Adhikari
Hackers Pounce on Excel Vulnerability Hackers have launched a new attack that uses a previously undiscovered flaw in Microsoft Excel to target business executives and government agencies. mark for My Articles similar articles
BusinessWeek
April 17, 2006
Brian Grow
The Mind Games Cybercrooks Play Hackers are exploiting psychological vulnerabilities to gain access to your data. mark for My Articles similar articles
PC World
March 2001
Stuart J. Johnston
Bugs and Fixes: Entertainment--With Hack Included Foil Media Player invaders; trap Outlook worm; patch holes in Explorer... mark for My Articles similar articles
InternetNews
October 23, 2008
Andy Patrizio
Microsoft Rushes Out Urgent Windows Fix Microsoft is rushing out an emergency security fix outside of its regular patch schedule for Windows users. mark for My Articles similar articles
PC World
November 2001
Kim Zetter
PC Security: Holey Software! New security bugs appear weekly, letting hackers attack your data. Here's why apps are so full of holes and how you can protect yourself... mark for My Articles similar articles
InternetNews
March 3, 2011
Stuart J. Johnston
Microsoft Says One Critical Patch Coming Next week's Patch Tuesday will include three fixes in total, but only one Microsoft rates as "critical." What Microsoft software is affected? mark for My Articles similar articles