MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
February 23, 2007
Clint Boulton
Want a Contract With Your Key Logger? Malware authors are now offering ongoing support and updates for their goods. mark for My Articles similar articles
InternetNews
July 29, 2009
Spam Learns a New Language While spam levels are at their highest levels in years, much of it is the same - just translated for different countries. mark for My Articles similar articles
InternetNews
June 29, 2009
Alex Goldman
Botnet Blight: Hacked PCs Create 83.2% of Spam A MessageLabs report finds spammers are hard at work with increasingly sophisticated, attack-resistant botnets. mark for My Articles similar articles
InternetNews
March 25, 2010
Symantec: China Is Tops in Targeted Malware Symantec's latest report pinpoints China as the leading source of malware tailored to hoodwink execs in specific industries. mark for My Articles similar articles
InternetNews
May 31, 2005
Jim Wagner
Latest Espionage Case Underlines Threat One of the biggest cases of industrial espionage in Israel throws a spotlight on the shadowy world of corporate competition and how easy it is to fall victim to a Trojan horse attached to e-mail. mark for My Articles similar articles
IEEE Spectrum
November 2005
Lauren Aaronson
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. mark for My Articles similar articles
InternetNews
June 3, 2005
Tim Gray
Ever-Morphing Bagle Virus Going Strong A new variant of the Bagle downloader virus is spreading havoc again on unsuspecting users' machines, according to e-mail security firm MessageLabs. mark for My Articles similar articles
InternetNews
June 29, 2009
Alex Goldman
Michael Jackson Malware Has Already Hit the Net Trojans attempt to exploit the postmortem interest around the late King of Pop. mark for My Articles similar articles
InternetNews
November 17, 2010
Stuxnet, Mobile Threats Top 3Q Malware Report Security software vendor McAfee's 3Q Threats Report takes note of some older malware scams from the past and some new and discouraging new ones. mark for My Articles similar articles
InternetNews
March 2, 2011
PDF Malware on the Rise: MessageLabs Latest report from security vendor Symantec's MessageLabs unit highlights surge in malicious software hiding in PDF attachments, while overall email threats are on the rise. mark for My Articles similar articles
InternetNews
June 26, 2006
Andy Patrizio
MessageLabs Takes Malware Fight To The Clouds New Web Security Services tries to catch malware before it hits your computer. mark for My Articles similar articles
InternetNews
March 30, 2007
Andy Patrizio
SMBs Playing The Ostrich When It Comes To Security Small to medium-sized businesses often don't have the security policies, systems or know-how in place of their larger enterprise brethren, and that's a lurking danger. mark for My Articles similar articles
InternetNews
October 27, 2010
Malware Scams Pick Up In Retail Sector Targeted attacks are becoming more and more common as hackers seek out specific individuals or groups to steal proprietary information. mark for My Articles similar articles
InternetNews
March 31, 2004
Ryan Naraine
New Netsky Mutant Preps DoS Attack The Kazaa file-sharing network is being targeted for a DoS attack by the newest Netsky strain. mark for My Articles similar articles
PC Magazine
August 1, 2007
Larry Seltzer
A Long-Ignored Threat: RTF Files A new danger is being exploited by malware. Learn which steps to take in order to avoid becoming a victim... Biggest and worse malicious programs and viruses... mark for My Articles similar articles
InternetNews
July 6, 2006
Sean Michael Kerner
Trojans on The March Is it all Microsoft's fault? One security vendor suggests that users may well want to switch to a less-targeted OS. mark for My Articles similar articles
InternetNews
February 2, 2011
Rustock, Phishing Scams Boost Spam in January A flurry of new malicious spam campaigns and the return of the Rustock botnet elevated spam activity in latter half of January. mark for My Articles similar articles
InternetNews
January 27, 2010
Cyber Terrorists Target U.S. Oil Industry Three of the world's largest U.S.-based oil and natural gas companies were hoodwinked by an extremely sophisticated malware attack designed to steal key proprietary data related to the whereabouts of new oil reserves. mark for My Articles similar articles
InternetNews
April 22, 2004
Sean Michael Kerner
Who's Taking the Bait: 'Phishing' Skyrockets Online security groups say the scamming technique used for identity theft is proliferating as fast as viruses, with attacks up over a thousand percent since September. mark for My Articles similar articles
InternetNews
January 14, 2004
Sharon Gaudin
Last Year's Security Problems May Balloon in 2004 If 2003 was the worst year in history for viruses and spam, hold onto your hat. This year, according to security experts, is setting up to see the malicious problems that appeared last year grow and fester into major security problems for 2004. mark for My Articles similar articles
InternetNews
May 28, 2009
Alex Goldman
Flood of Fake Western Union E-mails Hide Trojan An influx of malware-laden spam, which started two weeks ago, continues today as hackers seek credit card and banking information. mark for My Articles similar articles
InternetNews
November 15, 2010
Malicious Spam Surges in 3Q: Report Kaspersky Lab report finds the volume of malicious spam soared in the third quarter, keeping security software firms and consumers on high alert. mark for My Articles similar articles
InternetNews
November 20, 2009
Symantec's 'Unlucky 13' Security Trends for 2010 Hackers and malware purveyors are becoming more sophisticated, meaning computer users need to become wiser and more proactive, too. mark for My Articles similar articles
InternetNews
October 17, 2005
Tim Gray
IRCbot Trojan Spoofing Skype Researchers discover a new variant of the IRCbot Trojan disguised as the latest release of the popular Skype VoIP software client version 1.4. mark for My Articles similar articles
CFO
January 30, 2004
Esther Shein
Spy vs. Spy Companies are spending billions on network security, but staying ahead of hackers may be a pipe dream. mark for My Articles similar articles
InternetNews
November 16, 2004
Jim Wagner
Spam Spikes This Holiday Season Recent stats by Symantec show spam volumes leveling off, but think of it as the calm before the holiday storm. mark for My Articles similar articles
InternetNews
May 18, 2009
Alex Goldman
Legit Sites Riskier Than Web's Back Alleys New reports say that while users may fear fly-by-night Web sites, they're more likely to be infected by the sites they trust. mark for My Articles similar articles
InternetNews
October 30, 2008
Richard Adhikari
Spammers Hit MobileMe, Google Blogspots With new automated tools to help them, spammers are getting better at cracking CAPTCHA - a program that protects Web sites by generating and grading tests that humans can pass but computers cannot mark for My Articles similar articles
InternetNews
December 2, 2010
Targeted Malware, Spam Will Surge in '11 Security software vendor predicts more malware campaigns will use social media to target mobile devices, apps and industry-specific systems. mark for My Articles similar articles
InternetNews
May 5, 2004
Sharon Gaudin
Record Broken: 82% of U.S. Email is Spam Outdoing most analysts' worst predictions, spam accounted for 82 percent of all U.S. email last month. mark for My Articles similar articles
InternetNews
October 21, 2009
Auto Industry a Spam Magnet: Study Panda Security survey finds that only one-tenth of one percent of all e-mail received by auto industry is legitimate. mark for My Articles similar articles
CIO
July 15, 2006
Michael Schrage
Visibility for the Board With boards of directors under increased scrutiny by regulators and other entities, CIOs should consider creating a digital dashboard that gives them a view into the key performance indicators of the business. mark for My Articles similar articles
InternetNews
July 1, 2009
David Needle
Google Spouts Scary Spam Stats Google digs deep to uncover the latest spam trends. mark for My Articles similar articles
InternetNews
May 26, 2009
Alex Goldman
Spam Now More Than 90% of All E-Mail Spammers are increasingly directing users to compromised social networks while botnets' influence grows, according to MessageLabs. mark for My Articles similar articles
InternetNews
July 26, 2004
Jim Wagner
Search Engine Virus Spells 'Doom' A new strain of the old virus, MyDoom, is spreading throughout the Internet. This time, it's targeting search engines like Google. mark for My Articles similar articles
InternetNews
June 23, 2006
Sean Michael Kerner
Next-Gen Bank Trojans Are Upon Us Regardless of how much damage they may have done in the past, a new generation of banking Trojans is beginning to appear, and they're game for even more pilfering, according to at least one security researcher. mark for My Articles similar articles
InternetNews
May 19, 2009
Alex Goldman
Spammers Find 'Healthy' New Tactics With Acai Zombie networks and botnets are ramping up spam and using sophisticated filter penetration tactics -- to sell Acai drinks? mark for My Articles similar articles
InternetNews
June 11, 2010
Symantec Warns of Latest World Cup Malware Researchers at software-security firm detect a two-pronged malware attack targeting executives at major Brazilian firms, using the World Cup as a lure. mark for My Articles similar articles
InternetNews
May 28, 2009
Alex Goldman
Small Businesses Under Siege by Spammers Real-world data compiled shows that money scams are growing as the recession continues - and small firms aren't exempt. mark for My Articles similar articles
InternetNews
July 8, 2005
David Needle
CERT Warns on Latest Trojan Horse Attacks Targeted e-mail viruses may be behind some recent Internet outages. The trojan horse viruses can evade anti-virus software and appear to be from a trusted source. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
CIO
November 2, 2011
Maryfran Johnson
Why CIOs Detest the Phrase "IT and the Business" Here's why it's time to dump this polarizing phrase and make IT and business people equal partners. mark for My Articles similar articles
InternetNews
April 27, 2006
David Miller
Bouncebacks: The Hidden Cost of Spam A nasty side effect of spam and e-mailed viruses is costing companies an estimated $5 billion per year in IT resources, according to security services company IronPort. mark for My Articles similar articles
InternetNews
December 23, 2008
Richard Adhikari
Subject Lines Spammers Can't Resist Any time you see an e-mail with one of these subject lines, delete it without opening if you want to stay safe. mark for My Articles similar articles
InternetNews
April 29, 2010
China Slides Out of Spam Top 12 While China is widely regarded as the unofficial headquarters for hacking and digital espionage, the country doesn't even crack Sophos' Top 12 for spam production. mark for My Articles similar articles
InternetNews
April 27, 2005
Tim Gray
Google Typo Crashes Systems Spyware authors and phishing fraudsters have taken advantage of misspellings of google.com to infect computers with trojans and adware. mark for My Articles similar articles