MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC Magazine
June 22, 2004
Robert P. Lipschutz
Business Security Our buying guide sorts out the technologies and explains the best ways to protect yourself. mark for My Articles similar articles
IEEE Spectrum
May 2005
Riordan, Wespi & Zamboni
How to Hook Worms Because a computer network cannot ward off every last Internet worm, it must sound an alarm the minute one slithers inside. mark for My Articles similar articles
Insurance & Technology
July 19, 2004
Peggy Bresnick Kendler
Victory Over Viruses? Insurers must rely on a combination of tools - such as e-mail filters and firewalls - training and common sense to safeguard their systems and their operations from viruses and worms. mark for My Articles similar articles
InternetNews
April 7, 2006
Tim Scannell
Norm Laudermilch, CTO, Trust Digital Most companies aren't prepared to prevent malicious code from hopping from cell phones to enterprise networks, or tracking it when it happens. mark for My Articles similar articles
T.H.E. Journal
December 2002
Vincent Weafer
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous. mark for My Articles similar articles
PC World
December 2000
Kim Zetter
Computer Viruses: The Next Generation What will be the next virulent outbreak? No one knows, except that it's guaranteed to be more lethal than ever... mark for My Articles similar articles
InternetNews
May 6, 2004
Ryan Naraine
MS to Help Zap Worms Automatically Microsoft is working on a plan to distribute worm removal tools within automatic updates by the end of this year. mark for My Articles similar articles
Science News
August 25, 2007
Julie J. Rehmeyer
Math Trek: Squashing Worms A mathematician and theoretical computer scientist at Microsoft Research has mathematically analyzed the question of which computers to patch first when a mutating worm is spreading through the Internet. mark for My Articles similar articles
Defense Update
Issue 3, 2005
DARPA gears to Counter Network Worms One of the most imminent threats to C4 systems, particularly mobile ad-hoc and COTS based networks, are large scale attacks by computer worms spreading malicious code. mark for My Articles similar articles
National Defense
March 2014
Robert Johnston
New Approach Needed to Counter Malicious Software For the better part of a decade, network security has been overly focused on perimeter defenses. This has triggered a change in nation-level techniques for launching cyber-attacks. mark for My Articles similar articles
Wall Street & Technology
January 5, 2005
David Tan
Combating Blended Threats Security experts agree that blended threats will continue to grow in frequency, complexity and severity. mark for My Articles similar articles
PC Magazine
February 1, 2006
Cade Metz
The Sorry State of Security Time to face facts: when it comes to our online safety woes, everybody is to blame. mark for My Articles similar articles
PC Magazine
November 4, 2003
The PC Innovations Just Don't Stop Contrary to conventional wisdom, PCs just keep getting better. mark for My Articles similar articles
Scientific American
June 2009
Michael Moyer
What Conficker Reveals About Internet Crime The worm exposes the sophisticated international criminal networks behind modern computer viruses mark for My Articles similar articles
PC World
October 1, 2002
Paul Roberts
New E-Mail Virus Targets Windows, IE Virus is attached to e-mail messages with a wide variety of subject lines, making it harder for antivirus apps to detect. mark for My Articles similar articles
PC World
August 12, 2002
Tom Mainelli
Symantec Unveils Automated Norton AntiVirus Updated program zaps latest worms, seeks out instant messaging nasties, and doesn't bother you with the details. mark for My Articles similar articles
CIO
June 15, 2003
Dylan Tweney
Defensive Postures Intrusion prevention systems offer the latest countermeasures in the war against hackers, worms and viruses. mark for My Articles similar articles
PC Magazine
August 19, 2003
Sheryl Canter
Effective Immunity Viruses keep spreading, and PCs keep getting infected. What can you do to stay secure? mark for My Articles similar articles
PC World
March 2006
Andrew Sullivan
Programs in Peril Popular applications have more security flaws than Windows does. mark for My Articles similar articles
Knowledge@Wharton
September 10, 2003
System Alert: You've Got... Worms Was the recent spate of attacks just more of the same -- or are virus writers beginning to infect computers with other gains in mind? Experts at Wharton and elsewhere weigh in on possible motives and defenses against them. mark for My Articles similar articles
T.H.E. Journal
November 2001
Sharon Ruckman
Computer Parasitology: 8 Proactive Steps for Protection Computer worms pose a great threat to school network systems. Over the next decade they will change the nature of anti-virus software and require paradigm shifts in network infrastructure. Here are eight proactive steps your institution can take for protection... mark for My Articles similar articles
PC World
November 2005
Erik Larkin
Threat Alert: Antivirus Killers Savvy invaders can erode your PC's defenses and make it even more vulnerable. mark for My Articles similar articles
PC Magazine
August 2, 2006
Robert Lemos
Legion of Doom Attackers are adopting open-source development practices, creating malware faster, and giving defenders less time to react... Tips to protect your PC against malicious software... mark for My Articles similar articles
PC World
July 2, 2002
Andrew Brandt
Klez: The Virus That Won't Die? Brace yourself for another round: A variant of the resilient worm is wriggling alive this week. mark for My Articles similar articles
T.H.E. Journal
February 2005
Patrick Hinojosa
Information Security: Where We've Been and Where We Need to Go Proactive technologies that can protect against new, unknown threats without human intervention must be deployed to ensure the integrity of IT systems. mark for My Articles similar articles
PC Magazine
May 17, 2006
Robert Lemos
A Moving Target Today, cell-phone viruses are not a big deal. But if you think your phone will always be safe, think again. mark for My Articles similar articles
PC Magazine
November 2, 2005
Seltzer Rubenking
The Zero-Day Attack StarForce's Personal Safe'n'Sec... Prevx Pro 2005... Panda's TruPrevent... PivX preEmpt... Tips for installing behavior blocking software... ZoneAlarm Internet Security Suite 6... McAfee Internet Security Suite 2006... BitDefender 9 Internet Security... Panda Platinum 2006 Internet Security... Norton Internet Security 2006... Trend Micro PC-cillin Internet Security 2006... mark for My Articles similar articles
InternetNews
May 28, 2004
Sean Michael Kerner
Financial Firms in Hackers' Crosshairs A new survey says IT security attacks on financial institutions have doubled. mark for My Articles similar articles
Entrepreneur
June 2010
Ericka Chickowski
Protect Your Small Business Against Cyber Attacks Cybercrime costs the economy more than $1 trillion per year, and crooks are increasingly setting their sights on small businesses. A look at the most destructive threats to your network - and what you need to do about them. mark for My Articles similar articles
PC Magazine
November 29, 2006
Robert Lemos
Hacking for Dollars Viruses and worms are so last-decade. Today's PC users have to worry more about online burglary than stolen bandwidth. mark for My Articles similar articles
PC World
August 23, 2002
Frank Thorsberg
The World's Worst Viruses Check out our list of nasty computer viruses -- and find out how to save your PC from infection. mark for My Articles similar articles
The Motley Fool
June 28, 2004
Alyce Lomax
No Summer Break for Virus Writers A new development in virus evolution reared its ugly head last week with hackers planting malicious code into the Web servers for several reportedly popular sites. mark for My Articles similar articles
PC Magazine
February 2, 2005
Robert P. Lipschutz
Lock Down Your Network When it comes to security, small and midsize businesses (SMBs) often find themselves in an uncomfortable position. They share many of the same security fears that threaten multinational enterprises. mark for My Articles similar articles
PC Magazine
October 5, 2004
Sheryl Canter
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. mark for My Articles similar articles
PC World
December 4, 2002
Paul Roberts
Klez Worm Was Worst of 2002 The prolific virus was reported more than any other this year, and simple human error likely caused its spread. mark for My Articles similar articles
InternetNews
June 16, 2005
Tim Gray
Browser-Based Attacks on the Rise Browser-based attacks such as pharming and phishing scams are now the fastest-growing security threat on the Internet. mark for My Articles similar articles
PC World
October 13, 2000
Kim Zetter
How It Works: Viruses They're the "common cold" for computers; we'll show you how they operate and how to protect your PC... mark for My Articles similar articles
T.H.E. Journal
August 2004
Ozkan & Gunay
Minimizing Security Vulnerabilities in High-Tech Classrooms Emerging technologies are quickly becoming part of our daily learning and teaching endeavors in academia, however only a few students, faculty members and administrators are aware of the risks and vulnerabilities that exist in their network operating systems. mark for My Articles similar articles
PC Magazine
July 13, 2004
Alexandra Robbins
The Virus Wars As the problem continues to escalate, the future direction of the virus wars is something of an unknown, because it depends on so many variables, including the shifting motivations for virus writing. mark for My Articles similar articles
InternetNews
February 9, 2005
Tim Gray
Check Point Releases Two Security Measures The security company updates Integrity and secures event management with Eventia Analyzer. mark for My Articles similar articles
IEEE Spectrum
November 2005
Lauren Aaronson
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. mark for My Articles similar articles
CIO
November 1, 2003
Scott Berinato
FrankenPatch The more you patch, the more you need to patch, and the more kludgy and terrifyingly unpredictable your systems and applications become. Is there any way to escape this horror? mark for My Articles similar articles
Insurance & Technology
September 14, 2004
Peggy Bresnick Kendler
Framework for Security Insurers need effective security infrastructures to withstand online threats from hackers and cyber criminals, as well as lapses by unaware internal users. mark for My Articles similar articles
PC World
November 2003
Stuart J. Johnston
Halt Worms and Viruses in Their Tracks Take the steps necessary to protect your PC from Internet nasties. mark for My Articles similar articles
PC World
September 2002
Andrew Brandt
Klez: The Virus That Won't Die Already the most prolific virus ever, Klez continues to wreak havoc. mark for My Articles similar articles
Information Today
February 2001
Marshall Breeding
A Prescription for Computer Health We finished the year with little to no damage to our computer systems. Read on to learn more about how to develop a successful strategy for computing in an increasingly dangerous world... mark for My Articles similar articles
PC Magazine
November 25, 2003
Under Attack! If you're not running software to protect your PC, you should be! We test 12 products that will protect your PC and those with which it shares cyberspace. mark for My Articles similar articles
InternetNews
April 12, 2004
Sean Michael Kerner
Beware of Browser-based Attacks Hackers entering through holes in browsers 'may pose the next significant security threat to IT operations,' a new report warns. mark for My Articles similar articles
New Architect
May 2002
Jay Lyman
to Catch a Thief Effective incident response against network intruders... mark for My Articles similar articles
InternetNews
March 19, 2004
Ryan Naraine
It is Time for Some 'Friendly' Worms Let's face it folks, the virus writers have the upper hand these days. Is it time for the industry to be bold and imaginative about fighting back? mark for My Articles similar articles