MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC Magazine
June 20, 2007
Larry Seltzer
Beware Windows Hactivation Threat A new Trojan horse masquerading as a Windows security check is wreaking havoc on PCs. Find out how you can keep your system safe. mark for My Articles similar articles
InternetNews
July 6, 2006
Sean Michael Kerner
Trojans on The March Is it all Microsoft's fault? One security vendor suggests that users may well want to switch to a less-targeted OS. mark for My Articles similar articles
InternetNews
June 3, 2005
Tim Gray
Ever-Morphing Bagle Virus Going Strong A new variant of the Bagle downloader virus is spreading havoc again on unsuspecting users' machines, according to e-mail security firm MessageLabs. mark for My Articles similar articles
InternetNews
October 1, 2009
Internet Never More Dangerous: Study Report finds a 585 percent spike in fake anti-malware and security software programs in the first half of 2009. mark for My Articles similar articles
InternetNews
December 14, 2007
Andy Patrizio
Report: One In Six Computers Has Spyware Infection Internet security vendor Prevx finds that quite a few PCs are infected with rootkits. mark for My Articles similar articles
PC Magazine
June 5, 2008
Malware Everywhere Malicious software attacks, including Trojan horses, bots, and rootkits, are rising at the fastest rate ever. mark for My Articles similar articles
PC Magazine
October 1, 2003
Brett Glass
Don't Let Your PC Become a Porn Zombie Protect your computer from takeover. We tell you how. mark for My Articles similar articles
PC Magazine
September 27, 2006
Robert Lemos
Your Own Personal Matrix How rootkits can take over your computer and steal data under your nose and how to stop them. mark for My Articles similar articles
InternetNews
September 5, 2007
Andy Patrizio
Made in China: Virus-Laden Web Pages A report finds China has the most compromised Web pages serving up malware. mark for My Articles similar articles
Wired
August 23, 2007
John Robb
When Bots Attack If you want to bring down a country's information infrastructure and you don't want anyone to know who did it, the weapon of choice is a distributed denial of service attack. mark for My Articles similar articles
InternetNews
January 15, 2009
Richard Adhikari
The Web's Latest Threat: Smarter 'Zombies' Hacker-controlled PCs are outwitting security software - and are growing in number. mark for My Articles similar articles
InternetNews
September 17, 2007
Andy Patrizio
Have We Reached The End Of The Virus? Not quite. The old-fashioned virus infestation is fading as the biggest nuisance for computer users in favor of Trojans, Symantec's new malware study finds. mark for My Articles similar articles
InternetNews
June 13, 2006
Andy Patrizio
New Means To Root Out Malware Malware continues to be a problem for customers, with many users unaware their systems are infected with some kind of hidden "bot" that steals their personal info or hijack's their computer. mark for My Articles similar articles
PC Magazine
August 7, 2009
Lance Ulanoff
Twitter's Down and It's All Your Fault The micro-blogging service's difficulties are troubling. Why it's suffering through a DDoS attack is even more upsetting. mark for My Articles similar articles
InternetNews
December 16, 2008
Richard Adhikari
Several Attacks Behind CheckFree Data Breach The cybercriminals who breached the CheckFree bill paying service last week used a combination attack that may be almost impossible to stop. mark for My Articles similar articles
InternetNews
April 25, 2007
Andy Patrizio
Microsoft Expands And Unifies Security Efforts Microsoft formally introduced the Malware Protection Center today. mark for My Articles similar articles
InternetNews
February 26, 2009
Richard Adhikari
Microsoft Clamps Down on Excel Zero-Day Attack Microsoft is taking steps to protect customers from attacks through a zero-day flaw in Microsoft Excel discovered earlier this week. mark for My Articles similar articles
Bank Systems & Technology
September 30, 2009
Maria Bruno-Britz
At Least One Part of the Economy is Growing: Cybercrime Several studies are showing growth in new techniques designed to trick users and even anti-virus programs to gain access to personal data. mark for My Articles similar articles
PC Magazine
August 1, 2007
Larry Seltzer
A Long-Ignored Threat: RTF Files A new danger is being exploited by malware. Learn which steps to take in order to avoid becoming a victim... Biggest and worse malicious programs and viruses... mark for My Articles similar articles
InternetNews
March 18, 2004
Colin C. Haley
ISP Gets Tough With 'Zombie' Customers Comcast pushes its broadband customers with virus-infested spam zombies to clean up their act -- or else. mark for My Articles similar articles
InternetNews
June 29, 2009
Alex Goldman
Michael Jackson Malware Has Already Hit the Net Trojans attempt to exploit the postmortem interest around the late King of Pop. mark for My Articles similar articles
PC Magazine
February 1, 2006
Cade Metz
The Sorry State of Security Time to face facts: when it comes to our online safety woes, everybody is to blame. mark for My Articles similar articles
PC Magazine
July 25, 2007
Neil J. Rubenking
GarbageClean 2.0 Don't rely on GarbageClean for malware protection. It doesn't matter how little it costs -- it's still garbage. mark for My Articles similar articles
InternetNews
July 8, 2009
Alex Goldman
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. mark for My Articles similar articles
The Motley Fool
June 28, 2004
Alyce Lomax
No Summer Break for Virus Writers A new development in virus evolution reared its ugly head last week with hackers planting malicious code into the Web servers for several reportedly popular sites. mark for My Articles similar articles
InternetNews
July 28, 2004
Ryan Naraine
Microsoft: Out-of-Cycle Security Patch Coming Due out next week, the patch will fix a software flaw that led to the Download.Ject malware attack. mark for My Articles similar articles
InternetNews
March 8, 2010
CERT Warns of Energizer DUO Trojan U.S. Computer Emergency Readiness Team issues warning that software associated with Energizer DUO USB battery charger contains a Trojan that makes users' PC susceptible to hackers. mark for My Articles similar articles
InternetNews
December 26, 2006
Ed Sutherland
Vista Security Takes a Hit Vista is proving not to be as unsinkable as Microsoft claimed. mark for My Articles similar articles
InternetNews
July 14, 2004
Ryan Naraine
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues. mark for My Articles similar articles
PC World
February 21, 2007
Ryan Singel
Zero-Day Malware Attacks You Can't Block No matter how diligently you patch your PC, it may still be vulnerable during the first hours of a previously unseen attack. Here's what you should know about zero-day hazards and the security holes they exploit. mark for My Articles similar articles
InternetNews
June 11, 2009
Alex Goldman
Malware Keeps Creeping Onto Mac OS X The Apple Mac is still seeing far fewer attacks than Windows experiences, but researchers say there's a disturbing trend at work. mark for My Articles similar articles
InternetNews
September 15, 2009
Malware Ads Hit New York Times Media company's advertising staff approved bogus Vonage ad that distributed malware. mark for My Articles similar articles
InternetNews
February 24, 2009
Richard Adhikari
Hackers Pounce on Excel Vulnerability Hackers have launched a new attack that uses a previously undiscovered flaw in Microsoft Excel to target business executives and government agencies. mark for My Articles similar articles
InternetNews
August 6, 2004
Roy Mark
Trojan Horse Charges PDAs First known backdoor attack on handhelds probably written by Russian virus coder. mark for My Articles similar articles
PC World
June 2005
Scott Spanbauer
Rootkits: Invisible Assault on Windows These clever attacks are not new, but they pose a growing threat to Windows PCs. Since rootkits can work with spyware, viruses, and other malware in blended threats, security vendors are sharpening the tools they'll need for detecting them. mark for My Articles similar articles
InternetNews
June 23, 2006
Sean Michael Kerner
Next-Gen Bank Trojans Are Upon Us Regardless of how much damage they may have done in the past, a new generation of banking Trojans is beginning to appear, and they're game for even more pilfering, according to at least one security researcher. mark for My Articles similar articles
Defense Update
Issue 3, 2005
DARPA gears to Counter Network Worms One of the most imminent threats to C4 systems, particularly mobile ad-hoc and COTS based networks, are large scale attacks by computer worms spreading malicious code. mark for My Articles similar articles
Bank Technology News
April 2007
Rebecca Sausner
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. mark for My Articles similar articles
IEEE Spectrum
November 2005
Lauren Aaronson
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. mark for My Articles similar articles
InternetNews
January 4, 2008
David Needle
Wi-Fi Networks Face Virus Threat? Unprotected routers could spread malicious software rapidly to thousands of computers. mark for My Articles similar articles
InternetNews
May 28, 2009
Alex Goldman
Flood of Fake Western Union E-mails Hide Trojan An influx of malware-laden spam, which started two weeks ago, continues today as hackers seek credit card and banking information. mark for My Articles similar articles
PC World
December 31, 2007
Erik Larkin
Malware Evolving Too Fast for Antivirus Apps Bad guys use sophisticated testing to create malware that can evade even the best security programs. mark for My Articles similar articles
InternetNews
February 23, 2007
Clint Boulton
Want a Contract With Your Key Logger? Malware authors are now offering ongoing support and updates for their goods. mark for My Articles similar articles
InternetNews
March 3, 2009
Richard Adhikari
Digg Hackers Strike Next at YouTube Attacks are on the rise, with malware authors dabbling in spreading worms and scareware via comments. mark for My Articles similar articles
InternetNews
September 7, 2006
Ed Sutherland
Microsoft Investigates Word 2000 Trojan Microsoft said it has launched an investigation into reports of a new Trojan horse targeting Word 2000. mark for My Articles similar articles
PC Magazine
December 12, 2007
Neil J. Rubenking
Security Suites 2008 Threats lined up against your PC have never been worse. But don't panic; there also has never been a better selection of security suites available to keep your system safe. mark for My Articles similar articles
PC World
May 23, 2001
Frank Thorsberg
Sizing Up Cybervandalism: Thousands Hit Monthly Researchers find debilitating hacker attacks cross borders to hit big and small targets... mark for My Articles similar articles
InternetNews
January 4, 2007
Ed Sutherland
Vista Exploit Looking For Achilles' Heel First Vista exploit could mean lasting problems for Microsoft, according to a security vendor. mark for My Articles similar articles
InternetNews
December 2, 2010
Targeted Malware, Spam Will Surge in '11 Security software vendor predicts more malware campaigns will use social media to target mobile devices, apps and industry-specific systems. mark for My Articles similar articles
InternetNews
August 13, 2010
Malware Discovered on Another Red Cross Website The Red Cross of Serbia was targeted by hackers who injected malicious JavaScript files onto several of the organization's web pages. mark for My Articles similar articles