MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC World
March 2004
Andrew Brandt
E@4#N or E@4#W? How to Remember Strong Passwords Tips for creating and keeping track of a passel of passwords. mark for My Articles similar articles
PC World
October 2003
Andrew Brandt
Privacy Watch: California Law Protects Us All From Security Breaches New identity theft statute likely to help consumers everywhere. mark for My Articles similar articles
PC World
April 2004
Andrew Brandt
Soon, Your Cell Phone May Be Tracking You GPS chips in handsets make cell phone tracking services a reality. mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
PC World
November 2002
Andrew Brandt
Privacy Watch: Don't Let Digital Hobos Camp on Your Wireless Network Any individuals running a wireless network -- from administrators in large offices to families -- should expect strangers to try to hop onto their network. Don't wait until your data has been stolen to protect your network. mark for My Articles similar articles
BusinessWeek
March 14, 2005
Stephen H. Wildstrom
New Weapons To Stop Identity Thieves That may explain why phishing incidents continue to proliferate despite the concerted efforts of software publishers to make it harder. And it is why the time has come to attack the problem at its root: the inadequacy of passwords. mark for My Articles similar articles
Popular Mechanics
April 2009
Seth Porges
How to Make Your Webmail Secure Web-mail users need to be especially careful when it comes to their cyber security. Here's how. mark for My Articles similar articles
The Motley Fool
August 17, 2009
Rick Aristotle Munarriz
Free Wi-Fi and the Two-Faced Mermaid Starbucks' boasts of online generosity seem hypocritical. mark for My Articles similar articles
PC World
September 2004
Andrew Brandt
Privacy Watch: Two Passwords Double Your Privacy 'Two-factor authentication' is the computer equivalent of the security provided by a safety deposit box: Neither you nor the bank alone can open the box; both parties need to use their keys at the same time. mark for My Articles similar articles
PC World
December 20, 2006
Kirk Steers
Be a PC Crime Fighter: Keep Your Hardware Safe A variety of products and strategies will protect your PC from theft. mark for My Articles similar articles
PC World
April 2003
Anne Kandra
Consumer Watch: Manage Passwords Safely -- and Simply Plagued by a plethora of passwords? Here's how to deal with them without driving yourself nuts. mark for My Articles similar articles
PC World
July 16, 2007
Becky Waring
Automate Hotspot Log-ins Connecting to Wi-Fi hotspots is a chore. A quick download can save you time and a lot of hassle next time you want to connect. mark for My Articles similar articles
InternetNews
April 27, 2010
Passwords Should Be Last Line of Defense Longer passwords with numbers and capitalizations may make life a bit more difficult for identity thieves, but the truth is the relative strength or weakness of users' passwords should be beside the point. mark for My Articles similar articles
PC World
November 2003
Kandra & Brandt
The Great American Privacy Makeover An exclusive PC World survey reveals that even savvy Web users can do more to safeguard their privacy and data. Take the quiz and find out how vulnerable you are; then use our tips to improve your score. mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
InternetNews
February 22, 2005
Sean Michael Kerner
Hilton's T-Mobile Hack a Password Wake-Up Along with phone numbers of celebrities in the socialite's Sidekick, the hacking incident exposes the need for strong passwords. mark for My Articles similar articles
PC World
September 2002
Scott Dunn
Windows Tips: Keep Prying Eyes at Bay With Windows' Passwords Get the upper hand on Windows' password options. mark for My Articles similar articles
Investment Advisor
October 2010
Dan Skiles
Four Security Best Practices That All Advisors Should Implement Common sense security will make your firm a tough target for hackers. mark for My Articles similar articles
PC Magazine
March 16, 2004
Leon Erlanger
Five Tricks Hackers Use on You 5 tricks to what out for that hackers use to access your system. mark for My Articles similar articles
PC Magazine
September 20, 2006
Russell Morgan
Business Travel Tips Make the most of your time on the road without sacrificing security. We show you how to protect your privacy. mark for My Articles similar articles
PC World
October 2003
Scott Spanbauer
Can You Pass the PC World Password Safety Test? Password rules and tools; clear your passwords; cache news to read offline; update your media players. mark for My Articles similar articles
InternetNews
August 18, 2010
Facebook Kit Makes Hacking Logins Easy Security software vendor BitDefender says it's found a new malware kit that lets hackers easily access logins and passwords for Facebook and other unsecured credentials. mark for My Articles similar articles
The Motley Fool
February 11, 2008
Timothy M. Otte
Starbucks Gets Wired to AT&T The coffeehouse operator will offer AT&T wireless service at 7,000 U.S. locations. mark for My Articles similar articles
InternetNews
May 27, 2005
Tim Gray
Wi-Fi Still A Corporate Risk The strategic advantages of constantly connected employees also present some high-risk problems for corporate America. mark for My Articles similar articles
PC World
September 2004
Anne Kandra
Don't Get Burned Paying for a Hotspot Public Wi-Fi connections are great, but do your homework before you log on. mark for My Articles similar articles
Technology Research News
August 10, 2005
Kimberly Patch
Plug-in Protects Passwords Researchers have created a browser plug-in, dubbed PwdHash, that produces a different password for each website you visit without requiring the you to remember more than a single password. mark for My Articles similar articles
Fast Company
David Lumb
Google Reveals A Pay-Per-GB Wireless Service Google has just confirmed its wireless service, called Project Fi. mark for My Articles similar articles
PC World
April 2004
Scott Spanbauer
Lock Down Your PC Hackers. Spammers. Even rogue coworkers and employees. How can you keep the bad guys out and the good data in? Safeguard your system's perimeter with these 29 beyond-the-basics security steps. mark for My Articles similar articles
BusinessWeek
January 19, 2004
Roger O. Crockett
For Now, Wi-Fi Is A Hacker's Delight Keeping wireless networks secure has become one of the technology industry's biggest problems. The players who make wireless equipment are racing to limit the potential for damage. mark for My Articles similar articles
Information Today
May 16, 2011
Laplink Rolls Out New Data Protection Software Laplink Software, Inc. announced the release of PC Lock, data encryption software with cloud management and high security encryption to protect sensitive data from hackers and thieves. mark for My Articles similar articles
Salon.com
March 5, 2002
Paul Boutin
Waiting for Wi-Fi Outside of airports and Starbucks, the wireless Net is still hanging fire. You can build your own node, but who'll hook you up with the rest of the world? mark for My Articles similar articles
InternetNews
April 7, 2004
Vince Barnes
An Hour with Kevin Mitnick, Part 2 We conclude our talk with Kevin Mitnick as he provides a glimpse into the mindset of a hacker, discusses attitudes toward security spending and gives a reason to think twice before taking caller ID at face value. mark for My Articles similar articles
PC World
May 2005
Andrew Brandt
Do Passwords Provide True Protection? Don't Count on It Here are tools that protect your data and computer when your passwords don't. mark for My Articles similar articles
Inc.
November 1, 2009
Michael Fitzgerald
Are Your Passwords Too Weak? Hacked passwords can compromise company data security. Strategies for creating the best passwords mark for My Articles similar articles
InternetNews
December 23, 2004
Brian Livingston
Protect Your Passwords -- Part 2 USB keys may free us from having to remember passwords at all. mark for My Articles similar articles
PC Magazine
November 30, 2005
Neil J. Rubenking
Managing Password Manager How to prevent the Password Manager from automatically entering a password within Firefox after you have given it permission to do so. mark for My Articles similar articles
BusinessWeek
May 30, 2005
Mara Der Hovanesian
Hackers And Phishers And Frauds, Oh My! How consumers can protect themselves against cybercrime. mark for My Articles similar articles
PC World
May 2006
Andrew Brandt
Protect Your Data, System With a Fingerprint Reader Here's how to use a biometric device to its fullest potential. mark for My Articles similar articles
PC World
May 2001
Kim Zetter
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... mark for My Articles similar articles
Inc.
August 2005
David H. Freedman
Security Lapse Managers ask the question: Is our data safe? Any honest expert can give you the answer - without knowing a thing about your systems. No, your data is not safe. mark for My Articles similar articles
The Motley Fool
July 15, 2005
Tom Taulli
Bank of America Fights the Hackers In light of recent breaches, Bank of America is rolling out a new security system for its website. The bottom line, though, is that log-in protection is just part of a company's security concerns. mark for My Articles similar articles
PC World
November 2002
Scott Spanbauer
Internet Tips: Lock Out Internet Pests, Lock In Network Security Enhance your wireless network's security; safely share files; block spam in Outlook cooperatively. mark for My Articles similar articles
PC Magazine
November 2, 2004
Neil J. Rubenking
Revealing Passwords The passwords saved on your computer are more vulnerable than you think. mark for My Articles similar articles
PC Magazine
August 31, 2010
Eric Griffith
Password Protection: How to Create Strong Passwords Every password you have is important. Every one. Here's how to make your passwords uncrackable. mark for My Articles similar articles
InternetNews
September 13, 2010
CCNY Student Data Exposed in Laptop Heist Some 7,000-plus students attending the City College of New York are learning that some of their most sensitive personal information was exposed when a school laptop was stolen last month. mark for My Articles similar articles
PC World
February 8, 2001
Cameron Crouch
Tips for Keeping a Leash on Your PDA's Data Built-in and third-party security tools can help protect your PDA, even if you let it out of your hands... mark for My Articles similar articles
AskMen.com
Patrick Rowlings
The Most Stolen Cars Of 2004 While a number of factors contribute to car theft, certain vehicles are more likely than others to be stolen. In today's feature, we look at the five most stolen cars among newer model vehicles. While these statistics are for the year 2004, obviously not every car on the list is a 2004 model mark for My Articles similar articles
InternetNews
September 27, 2006
Ed Sutherland
GE Employee Data Stolen From Laptop General Electric alerted 50,000 current and former employees that a stolen laptop held names and Social Security numbers. mark for My Articles similar articles
Popular Mechanics
February 2006
Brian Krebs
It's 10 PM. Do You Know Where Your Identity Is? Global identity thieves may know their way around your computer better than you do. Learn how to protect yourself in the scary new world of zombies, RATs, Trojan horses and evil twins. mark for My Articles similar articles
Searcher
November 2005
Carol Ebbinghouse
Another Phine Kettle of Phish: Identity Theft Prevention Ten things to do today to protect yourself against identity theft. mark for My Articles similar articles