MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC World
May 9, 2002
Brian Sullivan
'Cute' Trojan Horse Spreading by E-Mail Worm has been rated low risk, but could damage firewall and security programs on infected PCs... mark for My Articles similar articles
InternetNews
October 26, 2006
Ed Sutherland
Zombies Control Half of Windows PCs Software giant Microsoft has crowned the "zombie" PC the greatest threat to Windows users. mark for My Articles similar articles
PC Magazine
March 7, 2008
Larry Seltzer
ID Theft: The Next Level The new virus Trojan.Silentbanker regularly patrols the Internet for banking sites it can manipulate. mark for My Articles similar articles
PC Magazine
August 7, 2009
Lance Ulanoff
Twitter's Down and It's All Your Fault The micro-blogging service's difficulties are troubling. Why it's suffering through a DDoS attack is even more upsetting. mark for My Articles similar articles
InternetNews
July 14, 2004
Ryan Naraine
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues. mark for My Articles similar articles
InternetNews
July 28, 2004
Ryan Naraine
Microsoft: Out-of-Cycle Security Patch Coming Due out next week, the patch will fix a software flaw that led to the Download.Ject malware attack. mark for My Articles similar articles
InternetNews
July 8, 2009
Alex Goldman
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. mark for My Articles similar articles
Wired
August 23, 2007
John Robb
When Bots Attack If you want to bring down a country's information infrastructure and you don't want anyone to know who did it, the weapon of choice is a distributed denial of service attack. mark for My Articles similar articles
InternetNews
September 17, 2007
Andy Patrizio
Have We Reached The End Of The Virus? Not quite. The old-fashioned virus infestation is fading as the biggest nuisance for computer users in favor of Trojans, Symantec's new malware study finds. mark for My Articles similar articles
InternetNews
August 12, 2005
Tim Gray
Attack Launches 19 Forms of Malware A highly complex Trojan was discovered on a U.S. site with a Russian-registered domain. mark for My Articles similar articles
InternetNews
February 24, 2009
Richard Adhikari
Hackers Pounce on Excel Vulnerability Hackers have launched a new attack that uses a previously undiscovered flaw in Microsoft Excel to target business executives and government agencies. mark for My Articles similar articles
InternetNews
February 26, 2009
Richard Adhikari
Microsoft Clamps Down on Excel Zero-Day Attack Microsoft is taking steps to protect customers from attacks through a zero-day flaw in Microsoft Excel discovered earlier this week. mark for My Articles similar articles
InternetNews
June 28, 2004
Ryan Naraine
Malware Attack Thwarted but Danger Lurks Critical IE vulnerability remains unpatched. mark for My Articles similar articles
InternetNews
June 3, 2005
Tim Gray
Ever-Morphing Bagle Virus Going Strong A new variant of the Bagle downloader virus is spreading havoc again on unsuspecting users' machines, according to e-mail security firm MessageLabs. mark for My Articles similar articles
InternetNews
November 20, 2009
Symantec's 'Unlucky 13' Security Trends for 2010 Hackers and malware purveyors are becoming more sophisticated, meaning computer users need to become wiser and more proactive, too. mark for My Articles similar articles
InternetNews
May 18, 2007
Sean Michael Kerner
Estonia Under Russian Cyber Attack? Data by a security research firm clearly shows that a full-scale assault is under way, but the attackers' identity and location is still uncertain. mark for My Articles similar articles
IEEE Spectrum
November 2005
Lauren Aaronson
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. mark for My Articles similar articles
InternetNews
May 28, 2009
Alex Goldman
Flood of Fake Western Union E-mails Hide Trojan An influx of malware-laden spam, which started two weeks ago, continues today as hackers seek credit card and banking information. mark for My Articles similar articles
InternetNews
December 29, 2005
Roy Mark
Oregon Man Cops Plea in eBay DDOS Attack A 21-year-old Oregon man faces up to 10 years in prison after pleading guilty this week for his role in launching a distributed denial of service attack on eBay in 2003. mark for My Articles similar articles
PC World
May 23, 2001
Frank Thorsberg
Sizing Up Cybervandalism: Thousands Hit Monthly Researchers find debilitating hacker attacks cross borders to hit big and small targets... mark for My Articles similar articles
PC Magazine
August 20, 2008
Matthew D. Sarrel
There's a Bot in Your PC Aiding the rise of blended threats around the world, botnets are digging in and using your network as a base of operations. mark for My Articles similar articles
InternetNews
December 16, 2008
Richard Adhikari
Several Attacks Behind CheckFree Data Breach The cybercriminals who breached the CheckFree bill paying service last week used a combination attack that may be almost impossible to stop. mark for My Articles similar articles
InternetNews
August 28, 2009
New Trojan Snags Skype Calls on Windows PCs Trojan.Peskyspy beats Skype encryption through Windows API attack. How serious is the threat? mark for My Articles similar articles
InternetNews
June 29, 2009
Alex Goldman
Michael Jackson Malware Has Already Hit the Net Trojans attempt to exploit the postmortem interest around the late King of Pop. mark for My Articles similar articles
InternetNews
August 6, 2004
Roy Mark
Trojan Horse Charges PDAs First known backdoor attack on handhelds probably written by Russian virus coder. mark for My Articles similar articles
PC World
December 31, 2007
Erik Larkin
Malware Evolving Too Fast for Antivirus Apps Bad guys use sophisticated testing to create malware that can evade even the best security programs. mark for My Articles similar articles
PC World
January 3, 2002
Joris Evers
Peer-to-Peer Apps Shared Trojan Horse Popular file-swapping programs installed spyware software even if users opted out, companies admit... mark for My Articles similar articles
InternetNews
July 27, 2004
Jim Wagner
More Gloom from MyDoom Virus The latest version of the virus is a vehicle for another Trojan horse, which attacks Microsoft.com... Symantec releases a removal tool. mark for My Articles similar articles
InternetNews
August 6, 2009
Did Koobface Cause Twitter, Facebook Outages? A new variant of the widespread Internet worm Koobface made its debut today - just as Twitter and Facebook were hit by denial-of-service attacks. mark for My Articles similar articles
InternetNews
November 29, 2004
Jim Wagner
SCO Site Cracked The homepage for the SCO Group's Web site is back to normal Monday after attackers defaced images on the site. mark for My Articles similar articles
InternetNews
December 30, 2004
Tim Gray
Trojan Threatens XP Flaw may leave Windows XP vulnerable to attack. mark for My Articles similar articles
Bank Technology News
January 2010
John Adams
Results First, Pay Later A growing wave of malware is plaguing Web banking, and new attacks are so effective that the market for a second line of defense is buzzing with activity. mark for My Articles similar articles
InternetNews
September 15, 2009
Malware Ads Hit New York Times Media company's advertising staff approved bogus Vonage ad that distributed malware. mark for My Articles similar articles
PC World
September 24, 2001
Matt Berger
Microsoft Offers Windows XP 'Family' Discount Bowing to customer request, Microsoft grants multicopy discount for purchases of home edition... mark for My Articles similar articles
PC World
August 17, 2001
Andrew Brandt
Code Red Worm Crawls Again Here's how to protect your systems from the potential menace's monthly emergence... mark for My Articles similar articles
InternetNews
February 27, 2007
Ed Sutherland
Storm Trojan Takes Social Measures Storm Trojan uses Web mail, blogs and message boards as conduits for spreading malware code. mark for My Articles similar articles
InternetNews
October 1, 2009
Internet Never More Dangerous: Study Report finds a 585 percent spike in fake anti-malware and security software programs in the first half of 2009. mark for My Articles similar articles
PC Magazine
March 16, 2005
Larry Seltzer
Validating Windows What does the Windows Genuine Advantage program mean for users? Maybe not much. mark for My Articles similar articles
Bank Technology News
July 2008
Rebecca Sausner
Could the U.S. Be the Next Estonia? Gadi Evron, former Israeli Government Internet Security Operations Manager, went to Estonia during the crippling DDOS attacks last May. Here he talks about whether the U.S. is vulnerable to such an attack, and the role banks and home computers play in protecting critical infrastructure. mark for My Articles similar articles
InternetNews
January 9, 2004
Sean Michael Kerner
Fake Microsoft Service Pack is Xombe Trojan Another day, another virus. Unsuspecting Internet users were greeted Friday with an e-mail message purportedly from [email protected] to update their computers. Problem is, the message isn't from Microsoft and the patch is actually a back door Trojan. mark for My Articles similar articles
PC World
July 19, 2001
Matt Berger
Microsoft Backs Off Strict Copy Controls in Win XP Customer outcry prompts Microsoft to make changes in countdown before launch... mark for My Articles similar articles
PC World
September 26, 2007
Erik Larkin
Five of the Dirtiest Malware Tricks From disguising applets to look like part of Windows to co-opting security tools, Web crooks use a variety of methods to bypass your system's safeguards. mark for My Articles similar articles
InternetNews
September 7, 2006
Ed Sutherland
Microsoft Investigates Word 2000 Trojan Microsoft said it has launched an investigation into reports of a new Trojan horse targeting Word 2000. mark for My Articles similar articles
InternetNews
July 7, 2009
Alex Goldman
Symantec: USB Keys Threaten the Enterprise As criminals innovate to attack PCs, Symantec promised to continue to fight them. mark for My Articles similar articles
InternetNews
October 27, 2010
Malware Scams Pick Up In Retail Sector Targeted attacks are becoming more and more common as hackers seek out specific individuals or groups to steal proprietary information. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
InternetNews
March 10, 2009
Sean Michael Kerner
Symantec Pifts.exe: Blame Human Error The kerfuffle over an alleged cover-up may be put to bed. mark for My Articles similar articles
InternetNews
June 8, 2009
Alex Goldman
Symantec Says Phishers Have New Tools Automated toolkits are making it easier to attack services such as Facebook, Twitter and financial services brands. mark for My Articles similar articles
InternetNews
April 8, 2008
Andy Patrizio
Malware Problem Shows no Sign of Slowing It's easier than ever to write a phishing virus that looks like a Facebook app thanks to virus writer's toolkits, Symantec finds. mark for My Articles similar articles
InternetNews
January 18, 2011
Attack Toolkits Spark New Malware Strains Do-it-yourself malware kits are all the rage online and they're making life much easier for cyber-criminals looking to turn a quick buck. mark for My Articles similar articles