MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Fast Company
Pavithra Mohan
Obama Administration Proposes Sanctions In Retaliation For Chinese Cyberhacks In an effort to curb cyberhacking, the White House is currently developing economic sanctions that would impede the operations of Chinese companies in the U.S., the Washington Post reports. mark for My Articles similar articles
Information Today
February 4, 2013
Paula J. Hane
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. mark for My Articles similar articles
InternetNews
January 28, 2009
Richard Adhikari
Monster Breach Shows Security Needs Rethinking Is corporate security fighting yesterday's war with last decade's weapons? mark for My Articles similar articles
InternetNews
November 30, 2010
WikiLeaks Cables Tie China to Google Attacks Whistleblower website begins publishing leaked diplomatic cables describing longstanding program of computer espionage and hacking orchestrated by the Chinese government. mark for My Articles similar articles
Fast Company
Nikita Richardson
Fingerprints of 5.6 Million Government Employees Stolen In Cyberattack Since it was announced in June that hackers had breached the U.S. Government's Office of Personnel Management database, the full breadth of the crippling cyberattack has gone from bad to worse. mark for My Articles similar articles
Fast Company
June 2013
From MIT To WikiLeaks: A Brief History Of Hacking A survey of news about hacking and hackers, both good and bad, from the 1950s to the present. mark for My Articles similar articles
InternetNews
September 30, 2010
FBI Busts International Cybercrime Syndicate After a year-long investigation, the FBI and local law enforcement charges 37 hackers with using Zeus Trojan to steal more than $3 million from U.S. banks. mark for My Articles similar articles
Bank Technology News
April 2007
Rebecca Sausner
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. mark for My Articles similar articles
The Motley Fool
February 25, 2011
David Lee Smith
Big Oil: Hacked From China First it was Google, and now it turns out Chinese hackers have hit Big Oil. mark for My Articles similar articles
BusinessWeek
April 10, 2008
China's Response to BusinessWeek A spokesperson of the Chinese Embassy to the United States responds to questions sent to authorities in Beijing and Washington regarding cyber crimes. mark for My Articles similar articles
InternetNews
July 20, 2005
Tim Gray
Hackers Head to School in Droves Universities appear to be the new favorite target of hackers, as the University of Southern California becomes the latest to get hit. mark for My Articles similar articles
Fast Company
Neal Ungerleider
Italian Surveillance Firm Called HackingTeam Gets Hacked An Italian company that sells sophisticated tools for spying on Internet users to the world's most repressive governments appears to have just been the target of a massive hacker attack mark for My Articles similar articles
Popular Mechanics
January 13, 2010
Glenn Derene
Why China Needs Google More Than Google Needs China Yesterday Google announced that Gmail accounts of Chinese dissidents had been hacked as part of a broad spying operation apparently tied to the Chinese government. mark for My Articles similar articles
National Defense
July 2013
Yasmin Tadjdeh
Cyberspies Can Destroy, Corrupt Data as Easily as They Snoop If hackers can steal a company's top-secret data, they can just as easily destroy a company's network, experts said recently. mark for My Articles similar articles
Bank Systems & Technology
September 15, 2007
Sharon Gaudin
Number Of Hackers Attacking Banks Jumps 81% Hackers no longer need to be technical wizards to set up an operation to steal people's banking information and then rob their accounts. mark for My Articles similar articles
Reason
January 2008
Jacob Sullum
Data: High Risk Overall, marijuana arrests in the U.S. have increased more than 150% since 1990. mark for My Articles similar articles
Fast Company
Pavithra Mohan
Hackers Threaten To Expose Private Information Of Ashley Madison Users A team of hackers has stolen data from AshleyMadison.com, an online dating site targeted at people who are already in relationships. mark for My Articles similar articles
InternetNews
January 15, 2010
David Needle
VeriSign Ties Google Attack to China Government Security firm cite sources claiming hackers acted on official authority from Chinese government. mark for My Articles similar articles
Bank Technology News
April 2001
Maria Bruno
Hackers Steal 1 Million Card Numbers Teams of Russian and Ukrainian hackers stole more than 1 million credit card numbers from 40 American e-businesses in recent months, according to the Federal Bureau of Investigation... mark for My Articles similar articles
The Motley Fool
August 24, 2009
Tim Beyers
The Uncomfortable Truth About Credit Cards Even if you can't stop a hacker, you can protect yourself. mark for My Articles similar articles
The Motley Fool
December 5, 2010
Dean Takahashi.
WikiLeaks Reveals How Google Was Targeted in China Documents lay bare vast hacking attempts by Chinese leaders. mark for My Articles similar articles
InternetNews
February 4, 2010
Firewall Mishap Puts Iowa Workers' Data at Risk More than 80,000 people affiliated with the Hawkeye State's casino and racing industry were victimized by a cyber attack that most likely originated in China. mark for My Articles similar articles
InternetNews
April 20, 2010
Hackers Breached Google's Password Hub: Report New report cites source close to investigation claiming that hackers in China were able to compromise the password service that acts as gateway to Google's Web products and services. mark for My Articles similar articles
InternetNews
June 2, 2011
Google Blames China for Gmail Hack According to Google, their security systems discovered a phishing campaign that had targeted Gmail in an effort to obtain user passwords. mark for My Articles similar articles
InternetNews
March 25, 2010
Symantec: China Is Tops in Targeted Malware Symantec's latest report pinpoints China as the leading source of malware tailored to hoodwink execs in specific industries. mark for My Articles similar articles
AskMen.com
Bernie Alexander
Cyber Crime: The Wild West, Online Forget about breaking and entering, aggravated assault and armed robbery. Cyber crime is taking over. mark for My Articles similar articles
National Defense
June 2013
Stew Magnuson
Defense Industrial Base Wary of Cybersecurity Laws That hackers are intent on stealing U.S. trade secrets -- particularly those pertaining to the military -- is a given. That the United States is capable of responding to this threat remains to be seen. mark for My Articles similar articles
InternetNews
December 23, 2004
Jim Wagner
Cyber Criminals Prove Elusive Law enforcement efforts to snare virus writers are improving, but the most destructive ones have evaded capture. mark for My Articles similar articles
Salon.com
October 27, 2000
Andrew Leonard
Who cracked Microsoft? Many free-software hackers make no attempt to hide their hatred of Bill Gates -- could they be the culprits? mark for My Articles similar articles
The Motley Fool
June 16, 2011
Rich Smith
America Hacked! Hackers are progressing, attacking our government websites with impunity. mark for My Articles similar articles
PC Magazine
September 26, 2008
Corinne Iozzio
The 10 Most Mysterious Cyber Crimes The best criminal hacker is the one that isn't caught or even identified. These are 10 of the most infamous unsolved computer crimes (that we know about). mark for My Articles similar articles
National Defense
July 2012
Stew Magnuson
Al-Qaida May Have Plans to Manipulate Anonymous Hacking Group Anonymous, a loosely organized group of hackers that has targeted big businesses and governments, could be co-opted by nation states and terrorist groups that want to use it for their own ends, cybersecurity experts said. mark for My Articles similar articles
The Motley Fool
August 28, 2006
Jack Uldrich
Yahoo! Takes a Hack at a New Idea Opening up the company to hackers could generate new ideas. It seems like a promising proposal to gain some creative knowledge. mark for My Articles similar articles
InternetNews
February 18, 2010
Kneber Botnet Pierces 2,500 Organizations So-called 'Kneber' botnet collects log-in credentials to online financial systems, social networking sites and e-mail systems to break into accounts and steal corporate and government data at an astonishing pace. mark for My Articles similar articles
InternetNews
April 8, 2010
Massive Cyber Spy Ring Seen Operating in China New report details the activities of the "Shadow network," a sophisticated group of cyber criminals traced back to China, prompting denial from a state official. mark for My Articles similar articles
InternetNews
November 3, 2006
Ed Sutherland
FBI: Twilight For Bank Phishermen U.S. and Poland hackers had targeted a major financial institution. mark for My Articles similar articles
PC World
April 10, 2001
Hacking's History From phone phreaks to Web attacks, hacking has been a part of computing for 40 years... mark for My Articles similar articles
The Motley Fool
March 1, 2011
Gary Cassady
More Hacking From Inside China, Trading Opportunities Is there a way to profit off of the misfortune of cyberattacks? mark for My Articles similar articles
Fast Company
Daniel Terdiman
AP Report: U.S. Power Grid Subject To Repeated Foreign Hacks The U.S. power grid is subject to being hacked from abroad, and foreign hackers have gained remote access to American power operations about a dozen times over the last decade. mark for My Articles similar articles
InternetNews
June 9, 2009
Alex Goldman
T-Mobile Hacked? Although a blog reported yesterday that T-Mobile was hacked, all the hackers actually seemed to have was a list of T-Mobile server names. mark for My Articles similar articles