MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Fast Company
Chris Gayomali
The Celeb Photo Leak: Is Using ICloud Safe? Right now, the safest way to send a salacious photo is to literally never take one. Security is still not a top priority for everyone from established Fortune 500 companies to new and trendy startups. It is an afterthought. mark for My Articles similar articles
InternetNews
May 15, 2009
Alex Goldman
Facebook Attacks Threaten All Web Sites Why would users want your user name and password? Perhaps because it could give them access to your money and your e-mail. mark for My Articles similar articles
Fast Company
Chris Gayomali
All Your Most Pressing Heartbleed Questions Answered Heartbleed is the devastating two-year-old bug that was only revealed Monday. It is quickly snowballing into the single biggest security vulnerability in Internet history. Here's what you need to know about it mark for My Articles similar articles
InternetNews
April 16, 2009
Alex Goldman
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. mark for My Articles similar articles
InternetNews
September 15, 2008
Richard Adhikari
Hackers Hit BusinessWeek With Malware The BusinessWeek.com site was hit by a SQL injection attack and connects users to a sleeper site. mark for My Articles similar articles
InternetNews
April 20, 2010
Hackers Breached Google's Password Hub: Report New report cites source close to investigation claiming that hackers in China were able to compromise the password service that acts as gateway to Google's Web products and services. mark for My Articles similar articles
PC World
May 2001
Kim Zetter
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... mark for My Articles similar articles
InternetNews
November 30, 2005
Tim Gray
Phishers Play on IRS Web Site Thieves are exploiting the fear of Uncle Sam's most notorious agency to steal identities. mark for My Articles similar articles
Investment Advisor
June 2008
Irace & Mehta
Security in a New Age How to protect your firm from 21st century online criminals mark for My Articles similar articles
PC Magazine
September 26, 2008
Corinne Iozzio
The 10 Most Mysterious Cyber Crimes The best criminal hacker is the one that isn't caught or even identified. These are 10 of the most infamous unsolved computer crimes (that we know about). mark for My Articles similar articles
InternetNews
February 22, 2005
Sean Michael Kerner
Hilton's T-Mobile Hack a Password Wake-Up Along with phone numbers of celebrities in the socialite's Sidekick, the hacking incident exposes the need for strong passwords. mark for My Articles similar articles
InternetNews
January 5, 2009
Richard Adhikari
Phishers Hit Twitter Users Obama, Britney Spears and Bill O'Reilly among reported victims of phony Twitter messages that also included an iPhone scam. mark for My Articles similar articles
Fast Company
Neal Ungerleider
Anonymous Hacks Paris Climate Talks Anonymous-affiliated hackers leaked account and personal information from more than a thousand attendees at the Paris climate summit earlier this week in retaliation for the arrest of protesters mark for My Articles similar articles
Information Today
February 4, 2013
Paula J. Hane
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. mark for My Articles similar articles
InternetNews
July 13, 2010
New Malware Scam Picks On eBay Fans Hackers know where people like to go online and what brands the average Internet user responds to when they conceive their illicit plots. This time around, it's eBay users they've targeted. mark for My Articles similar articles
PC Magazine
April 19, 2006
Robert Lemos
Password Policies A simple password could be the weak link that leaves your data open to attack. mark for My Articles similar articles
Fast Company
Daniel Terdiman
AP Report: U.S. Power Grid Subject To Repeated Foreign Hacks The U.S. power grid is subject to being hacked from abroad, and foreign hackers have gained remote access to American power operations about a dozen times over the last decade. mark for My Articles similar articles
InternetNews
November 22, 2006
Sean Michael Kerner
Phishers Lurk For Firefox 2.0 Password Manager Using password manager to keep passwords in Firefox? You could be at risk. mark for My Articles similar articles
InternetNews
June 24, 2009
David Needle
Guy Kawasaki's Tweet Gone Wild The social media expert and former Apple evangelist's Twitter account distributed a porn link leading to a Trojan. Who's to blame? mark for My Articles similar articles
The Motley Fool
June 16, 2011
Rich Smith
America Hacked! Hackers are progressing, attacking our government websites with impunity. mark for My Articles similar articles
CIO
July 14, 2008
Jarina D'Auria
Five Things Kevin Mitnick Has Learned About Computer Security Legendary former hacker on hacking, being hacked, and companies that turn a blind eye to security. mark for My Articles similar articles
CIO
January 1, 2002
Sarah D. Scalet
How to Not Recover from Getting Hacked (A Loser's Guide to Failure) A guide for what not to do when you get hacked. Take a moment to learn from the mistakes that others have made. mark for My Articles similar articles
eCFO
December 2000
Karen J. Bannan
Fear of the Black Hats Increasingly, companies are hiring hackers to test their network firewalls. This may not be such a good idea. mark for My Articles similar articles
InternetNews
October 9, 2008
Sean Michael Kerner
No/Low/High-Tech Hacking: It All Matters Don't point the finger at hackers for all security woes. Point hacker tools at yourself to see what's wrong with your stuff, instead. mark for My Articles similar articles