MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
T.H.E. Journal
February 2009
John K. Waters
IT Security: Target: The Web No longer focused on the network, hackers have a bull's eye now trained squarely on web-based applications. What, if anything, can school districts do to thwart them? mark for My Articles similar articles
InternetNews
December 17, 2008
Richard Adhikari
Microsoft Patches IE, But Security Issues Remain As usual, the bad guys are ahead in the tug-of-war over security. mark for My Articles similar articles
InternetNews
June 18, 2007
Andy Patrizio
Massive Web Exploit Emerges One of the largest Web site exploits/compromises ever has hit the Web, with more than 10,000 compromised computers redirecting unsuspecting visitors to sites hosting malicious software payloads. mark for My Articles similar articles
InternetNews
March 20, 2008
Sean Michael Kerner
Can We Fix The Web? The problem with the modern Web is that it's insecure and fixes may be a long time coming. mark for My Articles similar articles
InternetNews
March 20, 2007
Sean Michael Kerner
Google: AJAX is All About Abusing Standards Developer of Google Maps argues that it is developers and not standards that are driving AJAX forward. mark for My Articles similar articles
Linux Journal
April 2000
Nalneesh Gaur
Assessing the Security of Your Web Applications An outline of key test areas to identify security issues in a web application and provide measures to minimize them. mark for My Articles similar articles
InternetNews
November 21, 2008
Sean Michael Kerner
You Could be Getting Clickjacked If you're not careful about where you click, you could become a victim of a clickjacking attack. mark for My Articles similar articles
InternetNews
September 15, 2008
Richard Adhikari
Hackers Hit BusinessWeek With Malware The BusinessWeek.com site was hit by a SQL injection attack and connects users to a sleeper site. mark for My Articles similar articles
InternetNews
January 16, 2008
Andy Patrizio
A Particularly Nasty Week For Malware From Excel to the revitalized Storm worm to a severe banking Trojan, it's enough to make you nostalgic for the days of BBSes. mark for My Articles similar articles
Bank Technology News
February 2007
Michael Dumiak
Web Risk: A Growing Web's Harder To Secure As Web 2.0 applications and uses become more widespread, it'll be more than the created communities that are vulnerable. The increase of functionality, the richness of sites, creates more vectors for attack. mark for My Articles similar articles
InternetNews
February 5, 2008
Kenneth Corbin
MySpace Unveils Developer Platform The long-anticipated developer platform will widgetize the world's most popular social networking site. mark for My Articles similar articles
PC Magazine
September 23, 2008
Matthew D. Sarrel
A Day in the Life of a Web 2.0 Hacker They harvest data about you, your family, your friends, and your work directly from the Web apps you use and the sites you visit. Here's how they do it. mark for My Articles similar articles
InternetNews
January 6, 2009
Richard Adhikari
Fake Celeb Profiles in Spam Attacks Want to see "more" of your favorite actor or pop star? Bad idea. mark for My Articles similar articles
U.S. Banker
May 2007
Michael Dumiak
Web Risk: Interactive Web Entices, But Is Difficult to Secure Leading financial institutions are trying to balance the marketing and business development possibilities offered by new Web 2.0 functions with the security risks they pose. mark for My Articles similar articles
InternetNews
September 27, 2007
Andy Patrizio
Those Nifty Widgets Can Pack A Rude Surprise Malware finds a new target in desktop widgets that look simple and harmless but can carry a malicious payload. mark for My Articles similar articles
InternetNews
May 19, 2006
Andy Patrizio
Google Cleans Ajax for Java Google Web Toolkit takes regular Java apps and converts them to the often-incompatible JavaScript for all browsers. mark for My Articles similar articles
InternetNews
August 12, 2005
Jim Wagner
The Return of AJAX? The AJAX style incorporates a number of web standards, including XHTML, XML, XSLT, and DOM. The technique has been used in Google Maps, Amazon's A9 search engine, and Microsoft Outlook Web Access. mark for My Articles similar articles
InternetNews
December 10, 2009
Fast-Moving SQL Attack Hits 125,000-Plus Sites Nasty SQL injection attack has ties to a credit card-snatching trojan - and may just be getting started. mark for My Articles similar articles
InternetNews
April 11, 2008
Susan Kuchinskas
Web 2.0 in Enterprise Needs a Lock Sans security controls, company-hosted blogs and wikis make it all too easy to post malware. Then, the trusting, sharing culture of Web 2.0 encourages others to click on the link. mark for My Articles similar articles
InternetNews
October 5, 2006
Andy Patrizio
After The Buzz, Ajax Goes To Work Ajax is an example of the whole being greater than the sum of its parts. And the big developers have all caught the Ajax religion. mark for My Articles similar articles
CIO
February 15, 2006
Christopher Lindquist
Ajax Arrives for the Enterprise Ajax is quickly gaining acceptance worldwide as developers look to design Web interfaces that hook users with their speed and ease of use. mark for My Articles similar articles
InternetNews
November 19, 2007
Andy Patrizio
Hackers Abuse Domain-Name Trust Cyber criminals have devised a new twist on the misspelled domain-name trick by hijacking IP addresses. mark for My Articles similar articles
InternetNews
June 25, 2004
Ryan Naraine
Malware Hacker Attack Linked to Spammers Experts warn that a highly sophisticated malicious hacker attack could turn millions of PCs into spam zombies. Infected IIS web servers are spreading the malicious software to Internet Explorer users. mark for My Articles similar articles
InternetNews
August 13, 2010
Malware Discovered on Another Red Cross Website The Red Cross of Serbia was targeted by hackers who injected malicious JavaScript files onto several of the organization's web pages. mark for My Articles similar articles
InternetNews
November 20, 2009
Symantec's 'Unlucky 13' Security Trends for 2010 Hackers and malware purveyors are becoming more sophisticated, meaning computer users need to become wiser and more proactive, too. mark for My Articles similar articles
InternetNews
June 5, 2007
Sean Michael Kerner
Explorer, Firefox Take Heat Security researchers claim a number of zero-day flaws in both Internet Explorer and Mozilla Firefox. mark for My Articles similar articles
InternetNews
September 5, 2007
Andy Patrizio
Made in China: Virus-Laden Web Pages A report finds China has the most compromised Web pages serving up malware. mark for My Articles similar articles
InternetNews
December 27, 2005
Clint Boulton
Startups Board the AJAX Bandwagon New companies are touting AJAX, thanks to forays from Microsoft and Google. mark for My Articles similar articles
PC Magazine
February 1, 2008
Larry Seltzer
Don't Click That Ad . . . or Even Look at It When you go to a Web site, you have to trust everyone it's in bed with. mark for My Articles similar articles
InternetNews
March 26, 2007
Andy Patrizio
Russia's Latest Export To America: Malware They make it, they sell it, but we host it. Finjan finds America is cutting its own throat by hosting most of the malware on the Web. mark for My Articles similar articles
InternetNews
September 12, 2005
Susan Kuchinskas
MSN Kicks Out API Jams Outside developers and Web publishers can connect to MSN Search, Messenger and Virtual Earth via application programming interfaces (APIs). They are expecting to release Atlas, a toolset to help developers build Web sites incorporating asynchronous Javascript and XML (AJAX). mark for My Articles similar articles
PC Magazine
November 30, 2005
John Clyman
Better Web-App Interfaces with AJAX A new approach to building Web applications promises a richer experience for users. mark for My Articles similar articles
InternetNews
July 30, 2007
Andy Patrizio
From Russia With Larceny Latest malware kit can integrate itself into your browser to mimic your online banking site, and you'd never notice the change. mark for My Articles similar articles
InternetNews
March 23, 2007
Sean Michael Kerner
The AJAX World Belongs to Google Google brought the term and approach that is AJAX to the mainstream, and Google is continuing to be the guiding light in AJAX development today. mark for My Articles similar articles
InternetNews
September 15, 2004
Ryan Naraine
Critical Flaws Flagged in Mozilla, Thunderbird The vulnerabilities could enable malicious people to conduct cross-site scripting attacks, access and modify sensitive information, and compromise a user's system. mark for My Articles similar articles
InternetNews
November 3, 2004
Sean Michael Kerner
More IE Vulnerabilities A trio of vulnerabilities have been reported in recent days, further exposing Microsoft Internet Explorer users to the risk of potential attack from malicious users. The same bug has been reported in Apple's Safari Web browser running on OS X. mark for My Articles similar articles
Information Today
May 19, 2008
Avi Rappoport
The Center Is Where They Want to Be: Google Friend Connect, Yahoo! Open Strategy, MySpace Data Availability, Facebook Connect Google, Yahoo!, MySpace, and Facebook are in competition to be the single archive for user data. mark for My Articles similar articles
InternetNews
November 9, 2007
Andy Patrizio
MySpace Page For Alicia Keyes Hacked Crafty hackers break the site for Alicia Keyes, add redirects to a site with a rootkit. mark for My Articles similar articles
InternetNews
November 22, 2004
Sean Michael Kerner
Banner Ads Serving Up MyDoom A chilling turn in the war against viruses appeared over the weekend. It looks like viruses are now being spread unsuspectingly through Web sites via compromised ad servers. mark for My Articles similar articles
InternetNews
January 30, 2008
Kenneth Corbin
MySpace Set to Launch Developer Platform With a newly minted COO, MySpace is taking its developer site live with hopes of widgets soon rolling in. mark for My Articles similar articles
Information Today
October 22, 2007
Erik Arnold
Facebook Catch-Up: MySpace Confirms Developer Platform This week during the Web 2.0 conference in San Francisco, MySpace confirmed that a developer platform is imminent for the online social networking site. mark for My Articles similar articles
InternetNews
November 23, 2004
Tim Gray
Analysts: Expect More Ad Server Attacks Security analysts say attacks via ad servers are likely to continue. Another reason not to use Internet Explorer? mark for My Articles similar articles
InternetNews
June 16, 2011
Mesh Injection Attack Claims 30,000 Sites Meshed Web attack emerges that takes a new approach to replication and it may already be a big problem. mark for My Articles similar articles
Linux Journal
May 1, 2007
Nicholas Petreley
Ajax Simplified Ajax can become complex as far as implementation, but the concept is quite simple. Here are the key steps involved that exploit the power of Ajax. mark for My Articles similar articles
InternetNews
June 17, 2009
Alex Goldman
Hacked Government and Corporate PCs for Sale A new report from Finjan says that the latest criminal markets are more sophisticated than ever before. mark for My Articles similar articles
ONLINE
Nov./Dec. 2006
Jason A. Clark
AJAX (Asynchronous JavaScript and XML): This Isn't the Web I'm Used To Ajax changes how users are able to interact with online content by allowing Web page data updates without the usual routine of clicking from Web page to Web page. What's in it for Libraries? mark for My Articles similar articles