MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Wired
November 2006
Scott Berinato
Attack of the Bots The latest threat to the Net: autonomous software programs that combine forces to perpetrate mayhem, fraud, and espionage on a global scale. How one company fought the new Internet mafia - and lost. mark for My Articles similar articles
BusinessWeek
August 13, 2009
Joel Schectman
Computer Hacking Made Easy Botnet attacks like the one that took down Twitter are becoming so easy and cheap, almost anyone can do it. mark for My Articles similar articles
PC World
May 23, 2001
Frank Thorsberg
Sizing Up Cybervandalism: Thousands Hit Monthly Researchers find debilitating hacker attacks cross borders to hit big and small targets... mark for My Articles similar articles
InternetNews
May 18, 2007
Sean Michael Kerner
Estonia Under Russian Cyber Attack? Data by a security research firm clearly shows that a full-scale assault is under way, but the attackers' identity and location is still uncertain. mark for My Articles similar articles
InternetNews
January 15, 2009
Richard Adhikari
The Web's Latest Threat: Smarter 'Zombies' Hacker-controlled PCs are outwitting security software - and are growing in number. mark for My Articles similar articles
PC Magazine
August 20, 2008
Matthew D. Sarrel
There's a Bot in Your PC Aiding the rise of blended threats around the world, botnets are digging in and using your network as a base of operations. mark for My Articles similar articles
InternetNews
June 15, 2007
Andy Patrizio
Four Bot Herders Get Put Out To Pasture Your spam filters have ever so slightly less work to do today, thanks to several arrests of bot herders by the FBI. mark for My Articles similar articles
PC Magazine
August 7, 2009
Lance Ulanoff
Twitter's Down and It's All Your Fault The micro-blogging service's difficulties are troubling. Why it's suffering through a DDoS attack is even more upsetting. mark for My Articles similar articles
PC World
October 24, 2007
Erik Larkin
The Internet's Public Enemy Number One The Storm Worm has infected so many machines that it's now one of the most powerful supercomputers. mark for My Articles similar articles
InternetNews
March 17, 2006
Sean Michael Kerner
Botnets on The Run? Security researchers have identified numerous botnets of zombies in recent days and in at least one case ended their reign of the undead. mark for My Articles similar articles
PC Magazine
June 20, 2007
Larry Seltzer
Beware Windows Hactivation Threat A new Trojan horse masquerading as a Windows security check is wreaking havoc on PCs. Find out how you can keep your system safe. mark for My Articles similar articles
Bank Technology News
May 2006
Holly Sraeel
If Financial Crime is Rising, Then Security is Job #1 Furthered along by a loosely knit network of criminals, cybercrime is being waged by hackers and botmasters for profit in ways that are often not easily tracked by financial institutions, law enforcement authorities and governments. mark for My Articles similar articles
Bank Technology News
April 2007
Rebecca Sausner
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
InternetNews
October 25, 2006
Roy Mark
Floridian Charged in Akamai Attack A 32-year-old Floridian faces charges in Massachusetts for his alleged role in launching a distributed denial of service attack on Akamai Technologies. mark for My Articles similar articles
InternetNews
June 3, 2005
Tim Gray
Ever-Morphing Bagle Virus Going Strong A new variant of the Bagle downloader virus is spreading havoc again on unsuspecting users' machines, according to e-mail security firm MessageLabs. mark for My Articles similar articles
InternetNews
October 26, 2006
Ed Sutherland
Zombies Control Half of Windows PCs Software giant Microsoft has crowned the "zombie" PC the greatest threat to Windows users. mark for My Articles similar articles
Information Today
February 4, 2013
Paula J. Hane
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. mark for My Articles similar articles
Popular Mechanics
June 2007
Joel Johnson
Hack Attack: Is the Whole Internet at Risk? Some hackers recently tried to take down the entire World Wide Web. You didn't even notice because the Internet is so robust. mark for My Articles similar articles
InternetNews
August 29, 2006
Roy Mark
Botnet Perp Hit With Three-Year Prison Term Adware scam results in damaged computers at Seattle hospital and U.S. military installations. mark for My Articles similar articles
PC Magazine
December 14, 2004
Jay Munro
Bots March In These worms could "zombify" your computer, but you can give bots the boot. mark for My Articles similar articles
InternetNews
August 6, 2009
Twitter, Facebook Hit in Denial-of-Service Attacks Social media phenoms Twitter and Facebook this morning suffered bouts of downtime - with each blaming a denial-of-service (DDoS) attack for its woes. mark for My Articles similar articles
InternetNews
October 3, 2007
Andy Patrizio
Symantec Adds Bot Hunting to Managed Services By using a traceback method, Symantec can look for hidden botnets within a corporate network. mark for My Articles similar articles
The Motley Fool
July 13, 2009
Rich Smith
Welcome! You've Got Hackers! Someone threw a cyber war this week. It's great to know that the government is spending billions hardening the IT system against more competent attackers, but what we really need here is a solution to the real problem: Identifying who the attackers are. mark for My Articles similar articles
InternetNews
April 27, 2009
Alex Goldman
Conficker Awakens With Scareware and Spam The new activity on the Conficker botnet shows that the criminal economy is functioning well. mark for My Articles similar articles
Wired
August 21, 2007
Joshua Davis
Hackers Take Down the Most Wired Country in Europe How Estonia dealt with a botnet strike that targeted almost every digital front all at once. mark for My Articles similar articles
InternetNews
August 14, 2009
Twitter Used as Botnet Control As bot herders learn to exploit legitimate sites, researchers warn that IT managers will need to monitor social media closely. mark for My Articles similar articles
PC World
October 23, 2002
Paul Roberts
Net Attack Could Be First of Many, Experts Warn Future attacks could succeed in bringing down the Internet and are surprisingly simple to launch, security insiders say. mark for My Articles similar articles
The Motley Fool
December 5, 2010
Dean Takahashi.
WikiLeaks Reveals How Google Was Targeted in China Documents lay bare vast hacking attempts by Chinese leaders. mark for My Articles similar articles
InternetNews
March 25, 2010
Symantec: China Is Tops in Targeted Malware Symantec's latest report pinpoints China as the leading source of malware tailored to hoodwink execs in specific industries. mark for My Articles similar articles
PC World
August 2006
Andrew Brandt
The 10 Biggest Security Risks You Don't Know About Hackers, scammers, and identity thieves are constantly coming up with new ways to attack your PC and your privacy. Here are the newest perils and how to foil them. mark for My Articles similar articles
InternetNews
January 28, 2005
Sean Michael Kerner
Weak Passwords Leave Win MySQL Vulnerable Got a weak-password habit? If you're not running the latest anti-virus scanners along with MySQL, you could have a bot problem. mark for My Articles similar articles
PC World
July 23, 2007
Lincoln Spector
Proper ID for a Zombie PC If you can't tell by its ravenous appetite, glassy-eyed stare, and leprous casing, how do you know whether your system has become one of the living dead? mark for My Articles similar articles
InternetNews
June 25, 2004
Ryan Naraine
Malware Hacker Attack Linked to Spammers Experts warn that a highly sophisticated malicious hacker attack could turn millions of PCs into spam zombies. Infected IIS web servers are spreading the malicious software to Internet Explorer users. mark for My Articles similar articles
InternetNews
December 29, 2005
Roy Mark
Oregon Man Cops Plea in eBay DDOS Attack A 21-year-old Oregon man faces up to 10 years in prison after pleading guilty this week for his role in launching a distributed denial of service attack on eBay in 2003. mark for My Articles similar articles
InternetNews
February 7, 2007
Ed Sutherland
Internet 'Didn't Crumble' Under DNS Attacks Internet users barely felt a ripple yesterday when hackers launched a concerted attack on several key Domain Name System servers. mark for My Articles similar articles
InternetNews
January 27, 2011
British Cops Snag 5 Pro-Wikileaks Hackers Scotland Yard authorities announce arrest of five members of "Anonymous" hacking ring charged with marshaling DDoS attacks against firms that cut off payments service to Wikileaks. mark for My Articles similar articles
CIO
October 30, 2012
Lucian Constantin
Lack of Abuse Detection Allows Cloud Computing Instances to Be Used Like Botnets, Study Says Some cloud providers don't detect attacks launched from their networks, researchers say mark for My Articles similar articles
InternetNews
September 20, 2005
Roy Mark
Malicious Code For Profit New trend finds shifts toward attacks seeking confidential information. mark for My Articles similar articles
Bank Systems & Technology
February 18, 2010
Penny Crosman
Q&A: Alex Cox, Discoverer of Today's Massive Botnet Attack Data security expert Alex Cox tells how banks can protect themselves against the Kneber botnet he discovered, which has infected 75,000 computers at 2,500 organizations around the world, and which is still active. mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
Fast Company
John Paul Titlow
GitHub Is Still Under The Biggest DDoS Attack In Its History In the biggest DDoS attack in its history, GitHub is facing an onslaught of malicious inbound traffic from what appear to be China-based sources. mark for My Articles similar articles
InternetNews
November 4, 2005
Tim Gray
Botnet Zombie Maker Faces 50 Years Federal Authorities have arrested and charged a California man with hijacking hundreds of thousands of computers and creating a vast zombie network that launched denial of service attacks and spewed spam. mark for My Articles similar articles
Popular Mechanics
September 2008
Glenn Derene
Top 3 Threats and Countermeasures From the Coming Cyberwar: Glossary An explanation of terms like DDoS, root-level penetration, etc. mark for My Articles similar articles
National Defense
October 2009
Jean & Erwin
Research Detects Spamming Attacks Researchers at Microsoft have developed a system to detect botnet attacks on Web email providers mark for My Articles similar articles
PC Magazine
October 1, 2003
Brett Glass
Don't Let Your PC Become a Porn Zombie Protect your computer from takeover. We tell you how. mark for My Articles similar articles
InternetNews
February 2, 2009
Richard Adhikari
Are Legitimate Sites the Next Malware Threat? Businesses may be exposing their customers to malware by leaving their sites unpatched, IBM warns in a new study. mark for My Articles similar articles
CFO
January 30, 2004
Esther Shein
Spy vs. Spy Companies are spending billions on network security, but staying ahead of hackers may be a pipe dream. mark for My Articles similar articles
InternetNews
August 4, 2009
Businesses Not Immune to Botnets, Report Warns A new report delivers best practices on dealing with this spam vector. mark for My Articles similar articles
Wall Street & Technology
January 5, 2007
Larry Tabb
Preparing for the Inevitable While electronic thefts can be cleaner, less physical and certainly less bloody, the chance of getting money out of a brokerage or bank illegally is usually greater with a gun than a computer. But as the criminals and terrorists get smarter, we too must raise the bar. mark for My Articles similar articles