MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
T.H.E. Journal
November 2005
Williams & Krueger
Is Your Network Safe? Why educators should care about cybersecurity - and what they should do about it. mark for My Articles similar articles
T.H.E. Journal
December 2002
Vincent Weafer
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous. mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
T.H.E. Journal
February 2009
John K. Waters
IT Security: Target: The Web No longer focused on the network, hackers have a bull's eye now trained squarely on web-based applications. What, if anything, can school districts do to thwart them? mark for My Articles similar articles
CFO
January 30, 2004
Esther Shein
Spy vs. Spy Companies are spending billions on network security, but staying ahead of hackers may be a pipe dream. mark for My Articles similar articles
InternetNews
April 12, 2004
Sean Michael Kerner
Beware of Browser-based Attacks Hackers entering through holes in browsers 'may pose the next significant security threat to IT operations,' a new report warns. mark for My Articles similar articles
Wall Street & Technology
January 5, 2005
David Tan
Combating Blended Threats Security experts agree that blended threats will continue to grow in frequency, complexity and severity. mark for My Articles similar articles
PC Magazine
June 22, 2004
Robert P. Lipschutz
Business Security Our buying guide sorts out the technologies and explains the best ways to protect yourself. mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
T.H.E. Journal
June 1, 2010
Rama Ramaswami
Nothing to LOL About Schools fear the predatory behavior that lurks around social networking sites can make users sitting ducks for hackers, thieves, cyberbullies, and scammers. So they're caught in what appears to be an all-or-nothing choice. mark for My Articles similar articles
PC World
January 2003
Andrew Brandt
Privacy Watch: The Dangers of Do-It-Yourself Security Beware the misuse of vulnerability-testing software. mark for My Articles similar articles
PC World
May 2001
Kim Zetter
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... mark for My Articles similar articles
T.H.E. Journal
August 2004
Ozkan & Gunay
Minimizing Security Vulnerabilities in High-Tech Classrooms Emerging technologies are quickly becoming part of our daily learning and teaching endeavors in academia, however only a few students, faculty members and administrators are aware of the risks and vulnerabilities that exist in their network operating systems. mark for My Articles similar articles
PC Magazine
November 29, 2006
Robert Lemos
Hacking for Dollars Viruses and worms are so last-decade. Today's PC users have to worry more about online burglary than stolen bandwidth. mark for My Articles similar articles
T.H.E. Journal
October 2008
Andy McDonough
More Is More No one solution can defend K-12 computer networks against the proliferation of digital threats. A multilayered strategy that addresses cyber safety on many fronts is a district's best hope. mark for My Articles similar articles
PC World
April 2003
Zetter & Tweney
Internet Fixes Sneakier spam, wilier worms, more aggravating ads... no wonder it feels like your PC is under assault. Fight back with these simple steps for keeping the latest pests at bay. mark for My Articles similar articles
CIO
July 15, 2001
Mark Gembicki
The Safety Dance A freelance technology strategist answers readers' questions on security and virus protection... mark for My Articles similar articles
InternetNews
February 26, 2004
Sean Michael Kerner
Worms Continue to Wriggle, Wreak Havoc 'Zero-day' exploits and new styles of viruses send security firms scrambling to patch the latest holes in the network. mark for My Articles similar articles
PC World
November 2003
Andrew Brandt
Privacy Watch: Make Sure Your Firewall Is Sturdy Test your firewall to find out if it has any holes -- and then plug them up. mark for My Articles similar articles
Real Estate Portfolio
Mar/Apr 2002
Scott Laliberte
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... mark for My Articles similar articles
InternetNews
March 31, 2005
Tim Gray
Symantec Fixes Security Holes The firm releases fixes for two vulnerabilities found in its anti-virus products. mark for My Articles similar articles
Bank Technology News
April 2001
Maria Bruno
Hackers Steal 1 Million Card Numbers Teams of Russian and Ukrainian hackers stole more than 1 million credit card numbers from 40 American e-businesses in recent months, according to the Federal Bureau of Investigation... mark for My Articles similar articles
InternetNews
March 16, 2004
Ryan Naraine
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. mark for My Articles similar articles
Global Services
May 27, 2007
Raj Chaturvedi
Defining Security Expectations Documenting and sign offs on security expectations are an essential part of any sourcing deal. mark for My Articles similar articles
InternetNews
January 11, 2005
Tim Gray
Microsoft Patches Three Holes, Offers Removal Tool The company issues fixes for Internet Explorer vulnerabilities and offers a free anti-malicious software removal tool. mark for My Articles similar articles
InternetNews
January 14, 2004
Sharon Gaudin
Last Year's Security Problems May Balloon in 2004 If 2003 was the worst year in history for viruses and spam, hold onto your hat. This year, according to security experts, is setting up to see the malicious problems that appeared last year grow and fester into major security problems for 2004. mark for My Articles similar articles
PC Magazine
August 17, 2005
Sebastian Rupley
Beyond Viruses The cost to U.S. companies of doing battle with network attacks has fallen significantly. mark for My Articles similar articles
T.H.E. Journal
August 2004
Total Traffic Control 5.0 This updated network security software features new tools for detecting and blocking viruses, spyware, spam and inappropriate Web content. mark for My Articles similar articles
CRM
October 1, 2005
Marshall Lager
The Hot Skinny on Hackers What do they know, and how do they find out? A recent "hackers convention" revealed some of their secrets. mark for My Articles similar articles
Entrepreneur
February 2002
Mike Hogan
Bad Reception Employees' PDAs and portables pluck information off your wireless network all the time--now it's the hackers' turn. mark for My Articles similar articles
CIO
April 15, 2004
Eric Knorr
Guard the Application Layer Firewalls alone are no longer enough to protect your online assets mark for My Articles similar articles
Information Today
February 2001
Marshall Breeding
A Prescription for Computer Health We finished the year with little to no damage to our computer systems. Read on to learn more about how to develop a successful strategy for computing in an increasingly dangerous world... mark for My Articles similar articles
Bank Systems & Technology
July 5, 2004
Peggy Bresnick Kendler
Virus Vigilance A virus can grind a bank's operations to a halt and expose billions of dollars. To really safeguard their systems, banks must implement strict security policies - and communicate them to employees and technology partners. mark for My Articles similar articles
InternetNews
July 12, 2005
Jim Wagner
Microsoft Patch Day Plugs 3 The fixes plug security holes in Word, IE and Windows. mark for My Articles similar articles
InternetNews
August 5, 2004
Ryan Naraine
Critical Flaws Spoil Opera Tune Opera updates its flagship browser to plug a series of potentially serious security holes. mark for My Articles similar articles
InternetNews
October 11, 2004
Ryan Naraine
Web Servers, BIND Top 2004 Vulnerabilities List The SANS institute breaks down the top 10 vulnerabilities in Windows and Unix systems. mark for My Articles similar articles
Entrepreneur
June 2010
Ericka Chickowski
Protect Your Small Business Against Cyber Attacks Cybercrime costs the economy more than $1 trillion per year, and crooks are increasingly setting their sights on small businesses. A look at the most destructive threats to your network - and what you need to do about them. mark for My Articles similar articles
Knowledge@Wharton
September 10, 2003
System Alert: You've Got... Worms Was the recent spate of attacks just more of the same -- or are virus writers beginning to infect computers with other gains in mind? Experts at Wharton and elsewhere weigh in on possible motives and defenses against them. mark for My Articles similar articles
InternetNews
May 1, 2006
David Miller
Zero-Day Attacks an Ongoing Menace Security report from the SANS Institute details biggest Internet vulnerabilities. mark for My Articles similar articles
InternetNews
April 20, 2004
Ryan Naraine
Exploit for Windows SSL Flaw Circulating Unpatched systems are at risk of DoS attacks but security experts warn the threat level could grow considerably. mark for My Articles similar articles
Entrepreneur
January 2004
Frank J. Ohlhorst
Hold the Fort Safeguard your networks and PCs from invasions by worms, viruses and other dangerous agents. mark for My Articles similar articles
T.H.E. Journal
September 2005
Robert Yost
Flexible Network Infrastructure Helps Meet District's Changing Needs IP telephony system improves student safety and staff productivity of northern Virginia district. mark for My Articles similar articles
PC Magazine
December 30, 2003
Matthew D. Sarrel
Network Security: Know Your Weaknesses Vulnerability scanners identify your network's insecurities. Which one of these 6 tested products will watch your back? mark for My Articles similar articles
InternetNews
January 4, 2006
Tim Gray
RIM's Image Problem Research In Motion is warning that vulnerabilities in its BlackBerry Enterprise Server software may allow for malicious attacks. mark for My Articles similar articles
InternetNews
November 22, 2005
Sean Michael Kerner
Hackers Change Course A new SANS 2005 Top 20 list of Internet vulnerabilities shows a shift in what attackers are going after. And it's not just operating systems anymore. mark for My Articles similar articles
BusinessWeek
August 22, 2005
Grow & Hamm
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. mark for My Articles similar articles
InternetNews
February 15, 2007
Andy Patrizio
Another Week, Another MS Word Exploit Emerges Microsoft is investigating new public reports of "very limited, targeted attacks" against Microsoft Word. mark for My Articles similar articles
T.H.E. Journal
January 2009
Flourish by Ablenet Ablenet now offers Flourish software to help teachers and administrators collect and analyze data for tracking and managing the progress of special education students. mark for My Articles similar articles
BusinessWeek
February 19, 2007
Stephen H. Wildstrom
Mischief-Proofing Your PC Vista comes with only some of the protection you'll need. mark for My Articles similar articles
OCC Bulletin
May 15, 2000
Infrastructure Threats -- Intrusion Risks This bulletin provides guidance to financial institutions on how to prevent, detect, and respond to intrusions into bank computer systems... mark for My Articles similar articles