MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
September 18, 2009
Hackers Hit 'Curious George' on PBS Web Site Malicious code aimed to infect visitors to the site. mark for My Articles similar articles
InternetNews
March 3, 2005
Sean Michael Kerner
Searchmeup Targets Weak PCs A new adware exploit takes advantage of IE LoadImage vulnerability. mark for My Articles similar articles
InternetNews
August 13, 2010
Malware Discovered on Another Red Cross Website The Red Cross of Serbia was targeted by hackers who injected malicious JavaScript files onto several of the organization's web pages. mark for My Articles similar articles
PC Magazine
March 7, 2008
Larry Seltzer
ID Theft: The Next Level The new virus Trojan.Silentbanker regularly patrols the Internet for banking sites it can manipulate. mark for My Articles similar articles
InternetNews
June 26, 2006
Sean Michael Kerner
Is Browsezilla a Malware Magnet? PandaLabs alleges the freely available Browsezilla Web browser intentionally inserts malware onto a user's PC. Browsezilla developers dispute the allegation. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
InternetNews
December 10, 2009
Fast-Moving SQL Attack Hits 125,000-Plus Sites Nasty SQL injection attack has ties to a credit card-snatching trojan - and may just be getting started. mark for My Articles similar articles
PC Magazine
June 20, 2007
Larry Seltzer
Beware Windows Hactivation Threat A new Trojan horse masquerading as a Windows security check is wreaking havoc on PCs. Find out how you can keep your system safe. mark for My Articles similar articles
PC World
December 31, 2007
Erik Larkin
Malware Evolving Too Fast for Antivirus Apps Bad guys use sophisticated testing to create malware that can evade even the best security programs. mark for My Articles similar articles
InternetNews
February 26, 2009
Richard Adhikari
Microsoft Clamps Down on Excel Zero-Day Attack Microsoft is taking steps to protect customers from attacks through a zero-day flaw in Microsoft Excel discovered earlier this week. mark for My Articles similar articles
InternetNews
September 5, 2007
Andy Patrizio
Made in China: Virus-Laden Web Pages A report finds China has the most compromised Web pages serving up malware. mark for My Articles similar articles
InternetNews
March 3, 2009
Richard Adhikari
Digg Hackers Strike Next at YouTube Attacks are on the rise, with malware authors dabbling in spreading worms and scareware via comments. mark for My Articles similar articles
PC Magazine
December 12, 2007
Neil J. Rubenking
Security Suites 2008 Threats lined up against your PC have never been worse. But don't panic; there also has never been a better selection of security suites available to keep your system safe. mark for My Articles similar articles
InternetNews
December 30, 2004
Tim Gray
Trojan Threatens XP Flaw may leave Windows XP vulnerable to attack. mark for My Articles similar articles
InternetNews
July 14, 2004
Ryan Naraine
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues. mark for My Articles similar articles
InternetNews
September 19, 2005
Tim Gray
New Worm Uses The Force Security firm PandaLabs says a worm that spoofs Google is winding its way through the Internet via P2P networks. mark for My Articles similar articles
InternetNews
July 6, 2006
Sean Michael Kerner
Trojans on The March Is it all Microsoft's fault? One security vendor suggests that users may well want to switch to a less-targeted OS. mark for My Articles similar articles
InternetNews
January 16, 2008
Andy Patrizio
A Particularly Nasty Week For Malware From Excel to the revitalized Storm worm to a severe banking Trojan, it's enough to make you nostalgic for the days of BBSes. mark for My Articles similar articles
InternetNews
July 8, 2009
Alex Goldman
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. mark for My Articles similar articles
InternetNews
April 27, 2005
Tim Gray
Google Typo Crashes Systems Spyware authors and phishing fraudsters have taken advantage of misspellings of google.com to infect computers with trojans and adware. mark for My Articles similar articles
InternetNews
October 21, 2009
Auto Industry a Spam Magnet: Study Panda Security survey finds that only one-tenth of one percent of all e-mail received by auto industry is legitimate. mark for My Articles similar articles
Fast Company
Michael Grothaus
For First Time, Cyber Attack Causes Widespread Electricity Blackout The first known cyber attack to cause widespread public blackouts has occurred in Ukraine, it is believed. mark for My Articles similar articles
PC Magazine
November 2, 2005
Seltzer Rubenking
The Zero-Day Attack StarForce's Personal Safe'n'Sec... Prevx Pro 2005... Panda's TruPrevent... PivX preEmpt... Tips for installing behavior blocking software... ZoneAlarm Internet Security Suite 6... McAfee Internet Security Suite 2006... BitDefender 9 Internet Security... Panda Platinum 2006 Internet Security... Norton Internet Security 2006... Trend Micro PC-cillin Internet Security 2006... mark for My Articles similar articles
PC World
September 26, 2007
Erik Larkin
Five of the Dirtiest Malware Tricks From disguising applets to look like part of Windows to co-opting security tools, Web crooks use a variety of methods to bypass your system's safeguards. mark for My Articles similar articles
InternetNews
May 12, 2010
Firm Finds Flaws in Popular Antivirus Software Putting the security software offerings from 35 different vendors through their paces, researchers at Matousec conclude that all are susceptible to an exploit that could hobble Windows-based devices. mark for My Articles similar articles
IEEE Spectrum
November 2005
Lauren Aaronson
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. mark for My Articles similar articles
The Motley Fool
June 13, 2011
Arunava De
Are Hackers the Next Threat to Your Portfolio? Before you respond to a malicious attack on one of your investments in your portfolios, measure the impact that such an attack can have on the company. mark for My Articles similar articles
PC Magazine
August 1, 2007
Larry Seltzer
A Long-Ignored Threat: RTF Files A new danger is being exploited by malware. Learn which steps to take in order to avoid becoming a victim... Biggest and worse malicious programs and viruses... mark for My Articles similar articles
InternetNews
September 7, 2006
Ed Sutherland
Microsoft Investigates Word 2000 Trojan Microsoft said it has launched an investigation into reports of a new Trojan horse targeting Word 2000. mark for My Articles similar articles
InternetNews
March 31, 2010
Black Market Spawns Cyber Crime for Dummies New study from PandaLabs pins the escalating severity of attacks carried out by relatively unskilled hackers on a thriving black market offering ready-made tools. mark for My Articles similar articles
Science News
April 25, 2009
Science Past From The Issue Of April 25, 1959 There appears to be a strong link between the behavior of a man with regard to his business and social activities and his chances of being a victim of a heart attack. mark for My Articles similar articles
T.H.E. Journal
February 2005
Product Watch - 3 new security solutions from Panda Software Panda Software has launched three new security solutions: Titanium Antivirus 2005, Platinum Internet Security 2005 and TruPrevent Personal 2005. mark for My Articles similar articles
InternetNews
February 27, 2007
Ed Sutherland
Storm Trojan Takes Social Measures Storm Trojan uses Web mail, blogs and message boards as conduits for spreading malware code. mark for My Articles similar articles
PC Magazine
September 23, 2008
Matthew D. Sarrel
A Day in the Life of a Web 2.0 Hacker They harvest data about you, your family, your friends, and your work directly from the Web apps you use and the sites you visit. Here's how they do it. mark for My Articles similar articles
PC World
August 2006
Andrew Brandt
The 10 Biggest Security Risks You Don't Know About Hackers, scammers, and identity thieves are constantly coming up with new ways to attack your PC and your privacy. Here are the newest perils and how to foil them. mark for My Articles similar articles
InternetNews
May 28, 2009
Alex Goldman
Flood of Fake Western Union E-mails Hide Trojan An influx of malware-laden spam, which started two weeks ago, continues today as hackers seek credit card and banking information. mark for My Articles similar articles
InternetNews
March 15, 2006
Sean Michael Kerner
New Trojan is Holding Data Ransom If you're the unlucky victim of the new cryzip Trojan making the rounds, it'll cost you $300 to get your data back from the Trojan's author. mark for My Articles similar articles
InternetNews
August 16, 2010
Symantec Uncovers Another Sneaky Spam Scam Latest Trojan conceals itself in innocent-looking attachments designed to get you or someone you know to open up the offending file. mark for My Articles similar articles
PC Magazine
June 9, 2010
Neil J. Rubenking
Panda Cloud Antivirus 1.1 Review & Rating Panda Security has spent the last few years mastering behavior-based detection, cloud-based antivirus scanning, and free security software. Panda Cloud Antivirus 1.1 (free, direct) brings all these threads together. mark for My Articles similar articles