MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
IEEE Spectrum
November 2005
Lauren Aaronson
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. mark for My Articles similar articles
InternetNews
September 30, 2010
FBI Busts International Cybercrime Syndicate After a year-long investigation, the FBI and local law enforcement charges 37 hackers with using Zeus Trojan to steal more than $3 million from U.S. banks. mark for My Articles similar articles
InternetNews
June 29, 2007
Andy Patrizio
Spammers Are Playing Your Boss For A Sucker Spammers now target C-level execs, figuring they won't know better. mark for My Articles similar articles
InternetNews
July 27, 2004
Jim Wagner
More Gloom from MyDoom Virus The latest version of the virus is a vehicle for another Trojan horse, which attacks Microsoft.com... Symantec releases a removal tool. mark for My Articles similar articles
InternetNews
January 27, 2010
Cyber Terrorists Target U.S. Oil Industry Three of the world's largest U.S.-based oil and natural gas companies were hoodwinked by an extremely sophisticated malware attack designed to steal key proprietary data related to the whereabouts of new oil reserves. mark for My Articles similar articles
BusinessWeek
March 21, 2005
Israel Cracks Down On Dirty Money The largest money-laundering investigation in Israel's history continues to grow in scope. mark for My Articles similar articles
PC Magazine
August 19, 2003
Sheryl Canter
Effective Immunity Viruses keep spreading, and PCs keep getting infected. What can you do to stay secure? mark for My Articles similar articles
Commercial Investment Real Estate
Jul/Aug 2008
International Report Tel Aviv Is Newest Real Estate Hot Spot... Most-Expensive Office Markets... First Industrial Goes Global... Czech Republic Retail Overview... Asia Pacific Key Performance Indicators... The Second Silicon Valley... mark for My Articles similar articles
InternetNews
July 8, 2005
David Needle
CERT Warns on Latest Trojan Horse Attacks Targeted e-mail viruses may be behind some recent Internet outages. The trojan horse viruses can evade anti-virus software and appear to be from a trusted source. mark for My Articles similar articles
AskMen.com
Bernie Alexander
Cyber Crime: The Wild West, Online Forget about breaking and entering, aggravated assault and armed robbery. Cyber crime is taking over. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
InternetNews
July 14, 2004
Ryan Naraine
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues. mark for My Articles similar articles