MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
May 28, 2009
Alex Goldman
Flood of Fake Western Union E-mails Hide Trojan An influx of malware-laden spam, which started two weeks ago, continues today as hackers seek credit card and banking information. mark for My Articles similar articles
InternetNews
November 7, 2007
Andy Patrizio
Salesforce.com Scrambles To Halt Phishing Attacks Another example of why humans - not technology - are the weakest link in security. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
InternetNews
December 6, 2004
Tim Gray
Phishing Grows with Holiday Shopping Spike Attacks jumped 80 percent in November and now target the workplace. mark for My Articles similar articles
InternetNews
November 9, 2006
Scammers Hooking Bigger Phish Fewer people fell victim to phishing attacks this year than last, but those who did were scammed for far more dough, Gartner says. mark for My Articles similar articles
InternetNews
October 31, 2008
Richard Adhikari
RSA Cracks Down on Legendary Sinowal Trojan Several financial institutions hit by the professionally maintained Trojan. mark for My Articles similar articles
InternetNews
January 19, 2009
Richard Adhikari
Get Ready for Inauguration Spam As Obama prepares to be sworn in, hackers and spammers are gearing up for a field day. mark for My Articles similar articles
InternetNews
June 4, 2010
Hackers Zero In On Execs With World Cup Scam A flurry of malware scams are using e-mails related to the upcoming World Cup to target executives at companies and organizations around the world. mark for My Articles similar articles
InternetNews
June 22, 2010
Botnet Still King of Malware Underworld Latest report from Gartner finds that while more sophisticated malware and phishing scams will proliferate, botnets will still be the top challenge for security experts for the foreseeable future. mark for My Articles similar articles
InternetNews
June 4, 2009
Alex Goldman
Fake Microsoft E-Mail Carries Real Malware Security experts are warning of deceptive e-mails that claim that Microsoft Outlook needs an update. mark for My Articles similar articles
InternetNews
July 8, 2009
Alex Goldman
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. mark for My Articles similar articles
InternetNews
February 2, 2009
Richard Adhikari
Are Legitimate Sites the Next Malware Threat? Businesses may be exposing their customers to malware by leaving their sites unpatched, IBM warns in a new study. mark for My Articles similar articles
InternetNews
February 28, 2006
Roy Mark
AOL Takes Phishers to Court Using Virginia's first-in-the-nation anti-phishing law, America Online filed three civil lawsuits today seeking $18 million in damages against unidentified phishers. mark for My Articles similar articles
Wall Street & Technology
July 28, 2004
Jim Middlemiss
Gone Phishing In the latest identity-theft scam, fraudulent e-mails trick individuals into coughing up passwords to 'secure' financial data. mark for My Articles similar articles
InternetNews
May 13, 2010
APWG Fingers 'Avalanche' Phishing Syndicate The Anti-Phishing Working Group says one highly sophisticated and well-organized group of cyber thieves was responsible for a huge spike in phishing attacks late last year. mark for My Articles similar articles
InternetNews
March 3, 2009
Richard Adhikari
Digg Hackers Strike Next at YouTube Attacks are on the rise, with malware authors dabbling in spreading worms and scareware via comments. mark for My Articles similar articles
InternetNews
January 27, 2010
Cyber Terrorists Target U.S. Oil Industry Three of the world's largest U.S.-based oil and natural gas companies were hoodwinked by an extremely sophisticated malware attack designed to steal key proprietary data related to the whereabouts of new oil reserves. mark for My Articles similar articles
Chemistry World
October 1, 2013
Rebecca Trager
Oak Ridge lab plans voluntary layoffs for 10% of workers These reductions at Oak Ridge are driven by the pressures placed on federal R&D investment, including the across-the-board sequestration cuts. mark for My Articles similar articles
InternetNews
June 23, 2005
Roy Mark
Confidence in E-Commerce Waning Gartner survey shows one of out three Internet users buying less online, largely because of concerns over data security. mark for My Articles similar articles
Bank Systems & Technology
November 29, 2004
Cynthia Ramsaran
Catch of the Day: Banks Face New Phishing Scams Newer and more intelligent phishing attacks target bank customers globally. mark for My Articles similar articles
InternetNews
May 19, 2009
Gumblar: Biggest Threat on the Web Today? A new trojan has grown quickly, and experts aren't mincing words in describing the danger. mark for My Articles similar articles
InternetNews
August 30, 2006
Clint Boulton
AT&T to Offer Credit Checks After Data Hack AT&T will pay for credit monitoring services after 19,000 credit card numbers were stolen. mark for My Articles similar articles
InternetNews
October 1, 2009
Internet Never More Dangerous: Study Report finds a 585 percent spike in fake anti-malware and security software programs in the first half of 2009. mark for My Articles similar articles
Fast Company
Michael Grothaus
For First Time, Cyber Attack Causes Widespread Electricity Blackout The first known cyber attack to cause widespread public blackouts has occurred in Ukraine, it is believed. mark for My Articles similar articles
InternetNews
December 18, 2006
Andy Patrizio
Real Phishing Tool Probes User Gullibility Now you can find the weakest point of security in your company: your staff. Core Security Technologies has updated its CORE IMPACT software to test an internal infrastructure against phishing attacks. mark for My Articles similar articles
InternetNews
August 26, 2004
Ryan Naraine
How Not to Get 'Phished' The FTC releases a helpful guide to avoid the lure of phishers, who attempt to steal your identity online. mark for My Articles similar articles
InternetNews
May 14, 2010
Facebook's Become a Phisher's Playground Facebook has plenty of security problems of its own making to resolve and, in the interim, professional cyber-thieves are exploiting other vulnerabilities. mark for My Articles similar articles
InternetNews
February 25, 2009
Richard Adhikari
Online Trust Takes a Hit in Gmail Chat Phishing Security experts are warning that a phishing attack on Google's Gmail's chat feature not only poses a danger to users, but could be a harbinger of things to come. mark for My Articles similar articles
Entrepreneur
June 2010
Ericka Chickowski
Protect Your Small Business Against Cyber Attacks Cybercrime costs the economy more than $1 trillion per year, and crooks are increasingly setting their sights on small businesses. A look at the most destructive threats to your network - and what you need to do about them. mark for My Articles similar articles
InternetNews
March 5, 2010
Phishers Targeting More Online Brands The latest survey by the Anti Phishing Working Group shows that organized phishing syndicates are working all the angles to get their hands on the most valuable data. mark for My Articles similar articles
InternetNews
November 23, 2007
Kenneth Corbin
Watch Out For The Online Shopping Grinch With more sophisticated scammers prowling the Internet this holiday season, how can you stay safe when shopping online? mark for My Articles similar articles
Popular Mechanics
April 17, 2008
Joe Pappalardo
Hack Attack on Tibet Groups Could Hint at China's Anti-U.S. Tactic As Buddhist monks in exile mourn fellow Tibetans killed in the recent conflict with China, U.S.-based nonprofit organizations are facing spam attacks, fake smear campaigns and other threats to digital privacy. mark for My Articles similar articles
InternetNews
June 22, 2004
Sean Michael Kerner
MasterCard Charges Phishers The credit card company does its part to combat phishing phenomenon. mark for My Articles similar articles
Popular Mechanics
February 2006
Brian Krebs
It's 10 PM. Do You Know Where Your Identity Is? Global identity thieves may know their way around your computer better than you do. Learn how to protect yourself in the scary new world of zombies, RATs, Trojan horses and evil twins. mark for My Articles similar articles
InternetNews
August 20, 2004
Susan Kuchinskas
Phishers Are Getting Together Free 'phishing kits' on the Web are making this scam easier than ever. mark for My Articles similar articles
InternetNews
September 5, 2007
Andy Patrizio
Made in China: Virus-Laden Web Pages A report finds China has the most compromised Web pages serving up malware. mark for My Articles similar articles
PC World
December 2004
Bob Tedeschi
Protect Your Identity Phishers and other online thieves are targeting your money and personal data--and they're getting sneakier. Here's how to defend yourself, and how to erase the damage if you get scammed. mark for My Articles similar articles
InternetNews
March 25, 2005
Susan Kuchinskas
Phishing Attacks Jump 26% Phishers and pharmers up attacks, perhaps in response to decreased results. mark for My Articles similar articles
CIO
June 15, 2005
Thomas Wailgum
You Can't Bank on Trust Trust is critical to generating customer loyalty in online banking. But with every phishing attack and e-mail scam, consumer confidence crumbles, bit by bit. mark for My Articles similar articles
Search Engine Watch
June 5, 2010
Johnny Widerlund
Avoiding Online Risks Kicking Off with the 2010 FIFA World Cup Cyber criminals will continue hijacking current news and events to serve malware. A rundown of the most prevalent online security risks, and how to avoid them. mark for My Articles similar articles
IEEE Spectrum
April 2006
Paul McFedries
Gone Phishin' Microsoft is right to include antiphishing technology in Internet Explorer 7, because clearly we need all the help we can get. mark for My Articles similar articles
InternetNews
October 21, 2009
Auto Industry a Spam Magnet: Study Panda Security survey finds that only one-tenth of one percent of all e-mail received by auto industry is legitimate. mark for My Articles similar articles
U.S. Banker
February 2005
Michael Sisk
A Phish Story Phishing attacks (in which thieves send mass e-mails supposedly from reputable businesses) are expected to more than double in 2005, and are spreading to small banks. mark for My Articles similar articles
InternetNews
January 7, 2009
Richard Adhikari
Beware Microsoft Update E-mail Spammers resume using fake system update warning. mark for My Articles similar articles
InternetNews
June 8, 2009
Alex Goldman
Symantec Says Phishers Have New Tools Automated toolkits are making it easier to attack services such as Facebook, Twitter and financial services brands. mark for My Articles similar articles
InternetNews
November 20, 2009
Symantec's 'Unlucky 13' Security Trends for 2010 Hackers and malware purveyors are becoming more sophisticated, meaning computer users need to become wiser and more proactive, too. mark for My Articles similar articles
InternetNews
December 8, 2004
Susan Kuchinskas
Phish Fighters Form Alliance Latest digital crime-fighting initiative unites ISPs, software vendors and financial institutions. mark for My Articles similar articles
InternetNews
November 17, 2009
McAfee Outlines Growing Cyber Warfare Threat McAfee's study finds politically motivated cyber attacks are on the rise internationally. mark for My Articles similar articles
Bank Technology News
April 2007
Rebecca Sausner
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. mark for My Articles similar articles
Registered Rep.
May 24, 2011
Lauren Barack
Cyber-Hackers: Faster, Better Equipped Than You Security should be the responsibility of all employees - not just the chief technology officer, or the principal of an advisory firm. mark for My Articles similar articles