MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC World
April 9, 2001
Andrew Brandt
Eyes on the Spies Here's how to stop the three most common methods snoops use to monitor you on the Internet... mark for My Articles similar articles
PC World
September 1, 2000
Jeff Sengstack
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. mark for My Articles similar articles
PC World
January 3, 2002
Joris Evers
Peer-to-Peer Apps Shared Trojan Horse Popular file-swapping programs installed spyware software even if users opted out, companies admit... mark for My Articles similar articles
PC World
April 2001
Cameron Crouch & Sean Captain
Is Your PC Safe From the Enemy Within? Does your firewall have a hole in it? New updates fix a potentially disastrous flaw... mark for My Articles similar articles
PC World
December 11, 2000
Sean Captain
Security Crusader Punches Holes in Firewalls Gibson's simple Trojan horse tricks firewalls from McAfee.com, Symantec, Sygate, and more... mark for My Articles similar articles
IEEE Spectrum
November 2005
Lauren Aaronson
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
InternetNews
July 14, 2004
Ryan Naraine
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues. mark for My Articles similar articles
InternetNews
April 23, 2004
Ryan Naraine
'Osama Captured' e-Mail is Malicious Trojan The 'Osama Bin Laden Captured' e-mail hammering your in-box today will attempt to download a Trojan if the embedded URL is clicked. mark for My Articles similar articles
InternetNews
June 25, 2004
Ryan Naraine
Malware Hacker Attack Linked to Spammers Experts warn that a highly sophisticated malicious hacker attack could turn millions of PCs into spam zombies. Infected IIS web servers are spreading the malicious software to Internet Explorer users. mark for My Articles similar articles
PC World
May 2005
Scott Spanbauer
It's Time to Update Your Internet Security Arsenal Every tool you need to secure your Windows PC is free on the Internet. Here's where they are. mark for My Articles similar articles
PC Magazine
December 9, 2003
The Lookout: Faulty Patch Leaves IE Open An incomplete patch has opened a vulnerability in Internet Explorer, and security experts say there are at least four methods attackers can use to compromise vulnerable PCs. mark for My Articles similar articles
PC World
May 2003
Stuart J. Johnston
Bugs and Fixes: Fix Your Browser and Shop Safely Yet another patch for Internet Explorer to keep your data secure. mark for My Articles similar articles
PC Magazine
April 5, 2006
Robert Lemos
This Man Has a Virus Security software can do little about the most dangerous delivery mechanism of all: the user. mark for My Articles similar articles
PC World
May 2001
Stan Miastkowski
Fortress PC Snoops, hackers, and viruses abound online. We identify all the tools you need to defend yourself against these hazards... mark for My Articles similar articles
PC World
May 16, 2002
Sam Costello
Fake Xbox Emulator Hid Trojan Horse Host Angelfire removes Web site that secretly downloaded adware... mark for My Articles similar articles
InternetNews
July 8, 2005
David Needle
CERT Warns on Latest Trojan Horse Attacks Targeted e-mail viruses may be behind some recent Internet outages. The trojan horse viruses can evade anti-virus software and appear to be from a trusted source. mark for My Articles similar articles
PC World
September 2005
Steve Bass
Hassle-Free PC: Four Tips to Make IE More Secure Add a layer of protection against spyware and other malicious code. mark for My Articles similar articles
InternetNews
July 28, 2004
Ryan Naraine
Microsoft: Out-of-Cycle Security Patch Coming Due out next week, the patch will fix a software flaw that led to the Download.Ject malware attack. mark for My Articles similar articles
PC World
December 2003
Scott Spanbauer
Ultimate Network Security: How to Install a Firewall Everything you need to know about selecting and installing a firewall for your PC or network. mark for My Articles similar articles
PC World
February 2002
Andrew Brandt
Privacy Watch: Intruders at the Modem? Wandering the Internet over a cable modem or DSL connection may seem like a joyride, but it could turn into a car wreck if you don't take steps to protect your PC... mark for My Articles similar articles
PC Magazine
November 2, 2005
Michael J. Steinhart
Maximum Security: 94 Essential Tips for Staying Safe Dozens of our best security tips and pointers, broken down by category: system, networking and wireless, e-mail, Web surfing, malware, and mobile. mark for My Articles similar articles
PC World
January 24, 2007
Andrew Brandt
Internet Explorer 7 Is Still Not Safe Enough IE 7 is definitely more secure, but phishing and malicious scripting attacks remain a problem. mark for My Articles similar articles
PC Magazine
October 5, 2004
Sheryl Canter
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. mark for My Articles similar articles
PC World
October 2004
Scott Spanbauer
Tweak Windows XP SP2 Security to Your Advantage Fine-tune the settings in Microsoft's recently released Windows XP Service Pack 2. mark for My Articles similar articles
PC Magazine
May 30, 2006
Neil J. Rubenking
Comodo Personal Firewall 2.0 This sharp-looking free personal firewall outperforms many you'd pay for. mark for My Articles similar articles
InternetNews
December 30, 2004
Tim Gray
Trojan Threatens XP Flaw may leave Windows XP vulnerable to attack. mark for My Articles similar articles
BusinessWeek
March 20, 2006
Stephen H. Wildstrom
Finally, A Safer Explorer Splitting Internet Explorer from Windows means less convenience. mark for My Articles similar articles
PC World
November 2000
Stuart J. Johnston
Java Lets Hackers Attack Your Browser Java security flaws... Money file protection... Trojan horse invades PDAs... mark for My Articles similar articles
InternetNews
June 28, 2004
Ryan Naraine
Malware Attack Thwarted but Danger Lurks Critical IE vulnerability remains unpatched. mark for My Articles similar articles
InternetNews
March 30, 2010
Microsoft Says IE's Defenses Not Unbeatable Microsoft touts 'defense in depth' as an effective deterrent after a white hat hacker last week demonstrated a complete takeover of Windows 7 running Internet Explorer 8. mark for My Articles similar articles
InternetNews
September 7, 2006
Ed Sutherland
Microsoft Investigates Word 2000 Trojan Microsoft said it has launched an investigation into reports of a new Trojan horse targeting Word 2000. mark for My Articles similar articles
InternetNews
October 3, 2005
Tim Gray
Trojan Exploits Office A Trojan Horse attacking Microsoft Office has been around since April. The malicious code is disguised as a Microsoft Access file. mark for My Articles similar articles
BusinessWeek
August 30, 2004
Stephen H. Wildstrom
Windows: Security Is Suddenly Job One By attacking some of the worst security problems in Windows, Windows XP Service Pack 2 could save you a lot of trouble. Bite the bullet and install it -- the sooner the better. mark for My Articles similar articles
InternetNews
May 28, 2009
Alex Goldman
Flood of Fake Western Union E-mails Hide Trojan An influx of malware-laden spam, which started two weeks ago, continues today as hackers seek credit card and banking information. mark for My Articles similar articles
InternetNews
January 28, 2004
Ryan Naraine
New IE Download Spoof Found Malicious Web sites could spoof the file extension of downloadable files. mark for My Articles similar articles
InternetNews
July 27, 2004
Jim Wagner
More Gloom from MyDoom Virus The latest version of the virus is a vehicle for another Trojan horse, which attacks Microsoft.com... Symantec releases a removal tool. mark for My Articles similar articles
PC World
June 2004
Mary Landesman
Bigger Threats, Better Defense Tests of 16 security tools, including firewalls, antivirus software, and anti-spyware programs, that aim to foil worms, viruses, spies, and hackers. mark for My Articles similar articles
PC World
July 2001
Letters to PC World Your take on sharing music files, Trojan horses, and online safety... mark for My Articles similar articles
InternetNews
June 23, 2006
Sean Michael Kerner
Next-Gen Bank Trojans Are Upon Us Regardless of how much damage they may have done in the past, a new generation of banking Trojans is beginning to appear, and they're game for even more pilfering, according to at least one security researcher. mark for My Articles similar articles
Macworld
May 2001
Mel Beckman
Norton Personal Firewall 1.0 Internet-protection software for individual users needs beefing up... mark for My Articles similar articles
PC World
October 2004
Andrew Brandt
Security Tips: Keep Viruses, Worms, and Spyware Off Your PC Closing the gates to these threats before they infect your system. mark for My Articles similar articles
PC Magazine
August 19, 2003
Sheryl Canter
Effective Immunity Viruses keep spreading, and PCs keep getting infected. What can you do to stay secure? mark for My Articles similar articles
PC World
May 2001
Kim Zetter
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... mark for My Articles similar articles
InternetNews
July 2, 2004
Susan Kuchinskas
Microsoft Issues Security Update For Trojan Redmond is urging customers to reconfigure their operating systems right away as it works on bigger patches for IE. mark for My Articles similar articles
PC World
September 26, 2007
Erik Larkin
Five of the Dirtiest Malware Tricks From disguising applets to look like part of Windows to co-opting security tools, Web crooks use a variety of methods to bypass your system's safeguards. mark for My Articles similar articles
PC Magazine
August 30, 2006
Robert Lemos
Gone in a Flash Stop your employees from infecting your systems or pocketing your company's intellectual property. mark for My Articles similar articles
PC World
August 2006
Andrew Brandt
The 10 Biggest Security Risks You Don't Know About Hackers, scammers, and identity thieves are constantly coming up with new ways to attack your PC and your privacy. Here are the newest perils and how to foil them. mark for My Articles similar articles
PC World
April 2004
Scott Spanbauer
Lock Down Your PC Hackers. Spammers. Even rogue coworkers and employees. How can you keep the bad guys out and the good data in? Safeguard your system's perimeter with these 29 beyond-the-basics security steps. mark for My Articles similar articles
BusinessWeek
February 25, 2010
Rich Jaroslovsky
Browser Wars: The Sequel Chrome, Safari, IE 8, Firefox, Opera... there's never been a better time to explore your options. mark for My Articles similar articles