MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
CIO
August 1, 2005
Grant Gross
VoIP Security Debate Heats Up Voice over IP (VoIP) telephony and malicious software for mobile devices are among the most-hyped IT security threats, according to Gartner. mark for My Articles similar articles
InternetNews
September 20, 2005
Roy Mark
Malicious Code For Profit New trend finds shifts toward attacks seeking confidential information. mark for My Articles similar articles
Inc.
March 2007
What We're Worrying About These days, computer security threats are coming from all directions. Here's what is keeping entrepreneurs up at night, according to a recent survey by the research firm Forrester. mark for My Articles similar articles
InternetNews
April 16, 2009
David Needle
Top VoIP Threats Detailed by Security Firm The growing use of Voice over IP telephony services in the enterprise make it an inviting target for the bad guys. mark for My Articles similar articles
InternetNews
June 16, 2005
Tim Gray
Browser-Based Attacks on the Rise Browser-based attacks such as pharming and phishing scams are now the fastest-growing security threat on the Internet. mark for My Articles similar articles
InternetNews
December 2, 2010
Targeted Malware, Spam Will Surge in '11 Security software vendor predicts more malware campaigns will use social media to target mobile devices, apps and industry-specific systems. mark for My Articles similar articles
Bank Technology News
December 2005
Glen Fest
Voip Security Threats: Swimming With The Sleeping Sharks? Banks' enthusiasm for installing VoIP shows no signs of waning. Will hackers, spammers, phishers and other criminals soon notice and start to take advantage? mark for My Articles similar articles
InternetNews
September 23, 2005
Tim Gray
Symantec Lands Anti-Phish Firm Security software giant Symantec is expanding its line of products with the acquisition of behavior-based security and anti-phishing firm WholeSecurity. mark for My Articles similar articles
InternetNews
July 18, 2005
Tim Gray
Trend Micro Stops Spam at The Network Antivirus vendor Trend Micro began rolling out Network Reputation Services, a portfolio of network-based, anti-spam services designed to complement the company's existing anti-spam offerings. mark for My Articles similar articles
InternetNews
September 25, 2006
Ed Sutherland
Report: Home Users Blind To Hackers According to a new status report from security vendor Symantec, home users are the target of 86 percent of attacks. Financial services ranked second, the target of 84 percent of phishing attempts in the first half of 2006. mark for My Articles similar articles
InternetNews
September 17, 2007
Andy Patrizio
Have We Reached The End Of The Virus? Not quite. The old-fashioned virus infestation is fading as the biggest nuisance for computer users in favor of Trojans, Symantec's new malware study finds. mark for My Articles similar articles
Inc.
October 2005
John Fried
How to Avoid Scammers, Spammer and the Rest of the Bad E-guys Before anything else, you need to know who the on-line scammers are and how to keep them out. mark for My Articles similar articles
InternetNews
March 16, 2004
Sharon Gaudin
Report: Threats Coming from all Sides A Symantec study shows that the number of software security flaws has leveled off over the past year. That sounds like good news until you find out that it's leveled off at seven new vulnerabilities a day, or 2,636 a year. mark for My Articles similar articles
InternetNews
June 14, 2005
Tim Gray
Trend Micro Acquires Kelkea Antivirus vendor Trend Micro hopes to tackle more Internet security issues, such as spam, phishing, and pharming. mark for My Articles similar articles
InternetNews
May 26, 2006
Tim Scannell
Jamie de Guerre, Director, Partner Programs, Cloudmark Spam isn't going anywhere, and Jamie de Guerre's company is tracking its trails through our inboxes. mark for My Articles similar articles
CIO
September 15, 2005
Susannah Patton
Dial VoIP For Vulnerability Voice over Internet Protocol offers great savings in long-distance calls. But without extensive safeguards, VoIP can expose your phone system to the havoc affecting the rest of the Web. mark for My Articles similar articles
Entrepreneur
August 2006
Amanda C. Kooser
Fast Talk VoIP is wasting no time in going wireless. mark for My Articles similar articles
InternetNews
May 28, 2004
Sean Michael Kerner
Financial Firms in Hackers' Crosshairs A new survey says IT security attacks on financial institutions have doubled. mark for My Articles similar articles
InternetNews
April 8, 2008
Andy Patrizio
Malware Problem Shows no Sign of Slowing It's easier than ever to write a phishing virus that looks like a Facebook app thanks to virus writer's toolkits, Symantec finds. mark for My Articles similar articles
InternetNews
April 13, 2004
Sharon Gaudin
Browser-based Attacks 'Surging' Virulent viruses and worms aren't the only things to watch out for. Security analysts say browser-based attacks are escalating in frequency and damage. And now a new study backs up the warnings. mark for My Articles similar articles
PC World
February 3, 2003
Paul Roberts
The Net Is Dangerous, Research Says Attack rates decline, but worms and software flaws keep cyberspace hazardous, Symantec reports. mark for My Articles similar articles
InternetNews
October 3, 2006
Roy Mark
Cyber Criminals Turn to Home Users Phishing and spam are on a dramatic rise as home users become the prime targets of online criminals. Attacks are up 81 percent over the last six months and spam jumped 50 percent over the same period. mark for My Articles similar articles
Fast Company
October 2005
Scott Kirsner
Sweating In the Hot Zone Imagine what life would be like if your product were never finished, if your work were never done, if your market shifted 30 times a day. The computer-virus hunters at Symantec don't have to imagine. mark for My Articles similar articles
Entrepreneur
July 2005
Amanda C. Kooser
Pharm's Way Learn how to protect yourself from the latest internet attack, pharming, which can lead to hijacked accounts or identity theft. mark for My Articles similar articles
InternetNews
January 27, 2005
Jim Wagner
Postini: Spam Building Muscle Trends in e-mail security threats in 2004 point to more difficulties in 2005. mark for My Articles similar articles
InternetNews
January 14, 2004
Sharon Gaudin
Last Year's Security Problems May Balloon in 2004 If 2003 was the worst year in history for viruses and spam, hold onto your hat. This year, according to security experts, is setting up to see the malicious problems that appeared last year grow and fester into major security problems for 2004. mark for My Articles similar articles
InternetNews
June 8, 2009
Alex Goldman
Symantec Says Phishers Have New Tools Automated toolkits are making it easier to attack services such as Facebook, Twitter and financial services brands. mark for My Articles similar articles
Information Today
June 2005
Phillip Britt
No Phishing Allowed Today, the biggest threats for companies and consumers are the new crimes with funny-looking names: phishing, pharming, and spim. mark for My Articles similar articles
InternetNews
October 27, 2010
Malware Scams Pick Up In Retail Sector Targeted attacks are becoming more and more common as hackers seek out specific individuals or groups to steal proprietary information. mark for My Articles similar articles
T.H.E. Journal
April 2004
Security Leaders Launch Initiative to Combat Emerging Threats An industrywide collaboration led by Cisco Systems Inc. is trying to limit damage from emerging security threats such as viruses and worms. mark for My Articles similar articles
PC Magazine
June 21, 2006
Neil J. Rubenking
Buying Guide: Security Suites Cherry-pick firewall, antivirus, and antispyware utilities from different vendors and you risk incompatibility. mark for My Articles similar articles
The Motley Fool
October 21, 2004
Tom Taulli
Our Money, Our Lost Identities There are many threats to our pocketbooks in the online world. Entrust's plan to put a stop to it can have a big impact for e-commerce. The company posted revenues of $21.3 million, which was a 6% increase from the same period a year ago. mark for My Articles similar articles
Inc.
February 18, 2003
Anne Stuart
Security Issues with VoIP Are voice-over Internet protocol phone systems vulnerable to hackers? Can calls be intercepted? Unfortunately, yes. Here's a list VoIP Web sites you can dial into for more information on VoIP and its related security issues. mark for My Articles similar articles
T.H.E. Journal
February 2005
Patrick Hinojosa
Information Security: Where We've Been and Where We Need to Go Proactive technologies that can protect against new, unknown threats without human intervention must be deployed to ensure the integrity of IT systems. mark for My Articles similar articles
InternetNews
May 31, 2006
David Miller
Security Software Gains Many Facets New software releases offer bundled features you might not expect in a security solution. mark for My Articles similar articles
InternetNews
April 14, 2010
Symantec Debuts New Enterprise Security Apps New security suites aim to better protect businesses' networks from evolving cyber threats. mark for My Articles similar articles
InternetNews
January 16, 2006
Sean Michael Kerner
Online Shopping Boosted By Security Confidence According to a new survey, security concerns did not inhibit consumers from making online purchases. mark for My Articles similar articles
Wall Street & Technology
July 26, 2004
Kerry Massaro
Fast Facts From Radicati Group Learn some statistics about instant messaging, e-mail and spam, and voice over internet protocol. mark for My Articles similar articles
T.H.E. Journal
August 2004
Ozkan & Gunay
Minimizing Security Vulnerabilities in High-Tech Classrooms Emerging technologies are quickly becoming part of our daily learning and teaching endeavors in academia, however only a few students, faculty members and administrators are aware of the risks and vulnerabilities that exist in their network operating systems. mark for My Articles similar articles
InternetNews
April 20, 2010
Targeted, DIY Malware Here to Stay: Symantec Symantec's latest threat report provides plenty of disconcerting news for IT managers charged with safeguarding critical enterprise data. mark for My Articles similar articles
PC World
May 2003
Andrew Brandt
What Your Antivirus Software Won't Tell You Some security apps ignore surveillance programs. mark for My Articles similar articles
InternetNews
February 24, 2009
Richard Adhikari
Hackers Pounce on Excel Vulnerability Hackers have launched a new attack that uses a previously undiscovered flaw in Microsoft Excel to target business executives and government agencies. mark for My Articles similar articles
InternetNews
September 14, 2006
Roy Mark
U.S. Unprepared for Internet Attack Recovery Cyber security experts cite lack of leadership from government and cooperation from private sector. mark for My Articles similar articles
InternetNews
December 6, 2004
Tim Gray
Phishing Grows with Holiday Shopping Spike Attacks jumped 80 percent in November and now target the workplace. mark for My Articles similar articles
The Motley Fool
July 12, 2006
Matt Koppenheffer
Securing Your Portfolio Data security has been a major area of interest and investment over the past decade, but it's been a tough place to be an investor. Want to play the data-security market? Seek out the gorillas. mark for My Articles similar articles
PC Magazine
August 3, 2004
Computer Security: Who Is Responsible? There are ways to protect your computer and your office, as well as ways of shielding your kids from online dangers. No solution is perfect, but you'll be more secure if you follow the basics. mark for My Articles similar articles
National Defense
August 2012
Eric Beidel
Companies Rush to Tailor Products to New Cyber-Attacks The cybersecurity marketplace is flooded with products that tout the ability to keep networks and computers safe from intruders. mark for My Articles similar articles
Insurance & Technology
April 19, 2005
Anthony O'Donnell
Closing the Gate Defense solutions are beginning to place more focus on rejecting spam before they enter an enterprise's network. mark for My Articles similar articles
InternetNews
January 23, 2006
IronPort's Web Reputation Security Can a 'credit check' for your e-mail eliminate phishing and virus threats? mark for My Articles similar articles
InternetNews
July 19, 2010
Zscaler Leverages the Cloud for Email Security The Zscaler cloud-based security suite now includes real-time filtering to block spam and phishing attacks. mark for My Articles similar articles