Similar Articles |
|
PC Magazine June 22, 2004 Robert P. Lipschutz |
Business Security Our buying guide sorts out the technologies and explains the best ways to protect yourself. |
IEEE Spectrum May 2005 Riordan, Wespi & Zamboni |
How to Hook Worms Because a computer network cannot ward off every last Internet worm, it must sound an alarm the minute one slithers inside. |
Insurance & Technology July 19, 2004 Peggy Bresnick Kendler |
Victory Over Viruses? Insurers must rely on a combination of tools - such as e-mail filters and firewalls - training and common sense to safeguard their systems and their operations from viruses and worms. |
InternetNews April 7, 2006 Tim Scannell |
Norm Laudermilch, CTO, Trust Digital Most companies aren't prepared to prevent malicious code from hopping from cell phones to enterprise networks, or tracking it when it happens. |
T.H.E. Journal December 2002 Vincent Weafer |
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous. |
PC World December 2000 Kim Zetter |
Computer Viruses: The Next Generation What will be the next virulent outbreak? No one knows, except that it's guaranteed to be more lethal than ever... |
InternetNews May 6, 2004 Ryan Naraine |
MS to Help Zap Worms Automatically Microsoft is working on a plan to distribute worm removal tools within automatic updates by the end of this year. |
Science News August 25, 2007 Julie J. Rehmeyer |
Math Trek: Squashing Worms A mathematician and theoretical computer scientist at Microsoft Research has mathematically analyzed the question of which computers to patch first when a mutating worm is spreading through the Internet. |
Defense Update Issue 3, 2005 |
DARPA gears to Counter Network Worms One of the most imminent threats to C4 systems, particularly mobile ad-hoc and COTS based networks, are large scale attacks by computer worms spreading malicious code. |
National Defense March 2014 Robert Johnston |
New Approach Needed to Counter Malicious Software For the better part of a decade, network security has been overly focused on perimeter defenses. This has triggered a change in nation-level techniques for launching cyber-attacks. |
Wall Street & Technology January 5, 2005 David Tan |
Combating Blended Threats Security experts agree that blended threats will continue to grow in frequency, complexity and severity. |
PC Magazine February 1, 2006 Cade Metz |
The Sorry State of Security Time to face facts: when it comes to our online safety woes, everybody is to blame. |
PC Magazine November 4, 2003 |
The PC Innovations Just Don't Stop Contrary to conventional wisdom, PCs just keep getting better. |
Scientific American June 2009 Michael Moyer |
What Conficker Reveals About Internet Crime The worm exposes the sophisticated international criminal networks behind modern computer viruses |
PC World October 1, 2002 Paul Roberts |
New E-Mail Virus Targets Windows, IE Virus is attached to e-mail messages with a wide variety of subject lines, making it harder for antivirus apps to detect. |
PC World August 12, 2002 Tom Mainelli |
Symantec Unveils Automated Norton AntiVirus Updated program zaps latest worms, seeks out instant messaging nasties, and doesn't bother you with the details. |
CIO June 15, 2003 Dylan Tweney |
Defensive Postures Intrusion prevention systems offer the latest countermeasures in the war against hackers, worms and viruses. |
PC Magazine August 19, 2003 Sheryl Canter |
Effective Immunity Viruses keep spreading, and PCs keep getting infected. What can you do to stay secure? |
PC World March 2006 Andrew Sullivan |
Programs in Peril Popular applications have more security flaws than Windows does. |
Knowledge@Wharton September 10, 2003 |
System Alert: You've Got... Worms Was the recent spate of attacks just more of the same -- or are virus writers beginning to infect computers with other gains in mind? Experts at Wharton and elsewhere weigh in on possible motives and defenses against them. |
T.H.E. Journal November 2001 Sharon Ruckman |
Computer Parasitology: 8 Proactive Steps for Protection Computer worms pose a great threat to school network systems. Over the next decade they will change the nature of anti-virus software and require paradigm shifts in network infrastructure. Here are eight proactive steps your institution can take for protection... |
PC World November 2005 Erik Larkin |
Threat Alert: Antivirus Killers Savvy invaders can erode your PC's defenses and make it even more vulnerable. |
PC Magazine August 2, 2006 Robert Lemos |
Legion of Doom Attackers are adopting open-source development practices, creating malware faster, and giving defenders less time to react... Tips to protect your PC against malicious software... |
PC World July 2, 2002 Andrew Brandt |
Klez: The Virus That Won't Die? Brace yourself for another round: A variant of the resilient worm is wriggling alive this week. |
T.H.E. Journal February 2005 Patrick Hinojosa |
Information Security: Where We've Been and Where We Need to Go Proactive technologies that can protect against new, unknown threats without human intervention must be deployed to ensure the integrity of IT systems. |
PC Magazine May 17, 2006 Robert Lemos |
A Moving Target Today, cell-phone viruses are not a big deal. But if you think your phone will always be safe, think again. |
PC Magazine November 2, 2005 Seltzer Rubenking |
The Zero-Day Attack StarForce's Personal Safe'n'Sec... Prevx Pro 2005... Panda's TruPrevent... PivX preEmpt... Tips for installing behavior blocking software... ZoneAlarm Internet Security Suite 6... McAfee Internet Security Suite 2006... BitDefender 9 Internet Security... Panda Platinum 2006 Internet Security... Norton Internet Security 2006... Trend Micro PC-cillin Internet Security 2006... |
InternetNews May 28, 2004 Sean Michael Kerner |
Financial Firms in Hackers' Crosshairs A new survey says IT security attacks on financial institutions have doubled. |
Entrepreneur June 2010 Ericka Chickowski |
Protect Your Small Business Against Cyber Attacks Cybercrime costs the economy more than $1 trillion per year, and crooks are increasingly setting their sights on small businesses. A look at the most destructive threats to your network - and what you need to do about them. |
PC Magazine November 29, 2006 Robert Lemos |
Hacking for Dollars Viruses and worms are so last-decade. Today's PC users have to worry more about online burglary than stolen bandwidth. |
PC World August 23, 2002 Frank Thorsberg |
The World's Worst Viruses Check out our list of nasty computer viruses -- and find out how to save your PC from infection. |
The Motley Fool June 28, 2004 Alyce Lomax |
No Summer Break for Virus Writers A new development in virus evolution reared its ugly head last week with hackers planting malicious code into the Web servers for several reportedly popular sites. |
PC Magazine February 2, 2005 Robert P. Lipschutz |
Lock Down Your Network When it comes to security, small and midsize businesses (SMBs) often find themselves in an uncomfortable position. They share many of the same security fears that threaten multinational enterprises. |
PC Magazine October 5, 2004 Sheryl Canter |
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. |
PC World December 4, 2002 Paul Roberts |
Klez Worm Was Worst of 2002 The prolific virus was reported more than any other this year, and simple human error likely caused its spread. |
InternetNews June 16, 2005 Tim Gray |
Browser-Based Attacks on the Rise Browser-based attacks such as pharming and phishing scams are now the fastest-growing security threat on the Internet. |
PC World October 13, 2000 Kim Zetter |
How It Works: Viruses They're the "common cold" for computers; we'll show you how they operate and how to protect your PC... |
T.H.E. Journal August 2004 Ozkan & Gunay |
Minimizing Security Vulnerabilities in High-Tech Classrooms Emerging technologies are quickly becoming part of our daily learning and teaching endeavors in academia, however only a few students, faculty members and administrators are aware of the risks and vulnerabilities that exist in their network operating systems. |
PC Magazine July 13, 2004 Alexandra Robbins |
The Virus Wars As the problem continues to escalate, the future direction of the virus wars is something of an unknown, because it depends on so many variables, including the shifting motivations for virus writing. |
InternetNews February 9, 2005 Tim Gray |
Check Point Releases Two Security Measures The security company updates Integrity and secures event management with Eventia Analyzer. |
IEEE Spectrum November 2005 Lauren Aaronson |
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. |
CIO November 1, 2003 Scott Berinato |
FrankenPatch The more you patch, the more you need to patch, and the more kludgy and terrifyingly unpredictable your systems and applications become. Is there any way to escape this horror? |
Insurance & Technology September 14, 2004 Peggy Bresnick Kendler |
Framework for Security Insurers need effective security infrastructures to withstand online threats from hackers and cyber criminals, as well as lapses by unaware internal users. |
PC World November 2003 Stuart J. Johnston |
Halt Worms and Viruses in Their Tracks Take the steps necessary to protect your PC from Internet nasties. |
PC World September 2002 Andrew Brandt |
Klez: The Virus That Won't Die Already the most prolific virus ever, Klez continues to wreak havoc. |
Information Today February 2001 Marshall Breeding |
A Prescription for Computer Health We finished the year with little to no damage to our computer systems. Read on to learn more about how to develop a successful strategy for computing in an increasingly dangerous world... |
PC Magazine November 25, 2003 |
Under Attack! If you're not running software to protect your PC, you should be! We test 12 products that will protect your PC and those with which it shares cyberspace. |
InternetNews April 12, 2004 Sean Michael Kerner |
Beware of Browser-based Attacks Hackers entering through holes in browsers 'may pose the next significant security threat to IT operations,' a new report warns. |
New Architect May 2002 Jay Lyman |
to Catch a Thief Effective incident response against network intruders... |
InternetNews March 19, 2004 Ryan Naraine |
It is Time for Some 'Friendly' Worms Let's face it folks, the virus writers have the upper hand these days. Is it time for the industry to be bold and imaginative about fighting back? |