MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
May 18, 2007
Sean Michael Kerner
Estonia Under Russian Cyber Attack? Data by a security research firm clearly shows that a full-scale assault is under way, but the attackers' identity and location is still uncertain. mark for My Articles similar articles
National Defense
October 2007
Breanne Wagner
Cyber Attacks in Estonia Serve as Wake-Up Call The attacks compromised both public and private websites and sent a wave of panic through a country that is known for being especially "wired." mark for My Articles similar articles
PC World
May 23, 2001
Frank Thorsberg
Sizing Up Cybervandalism: Thousands Hit Monthly Researchers find debilitating hacker attacks cross borders to hit big and small targets... mark for My Articles similar articles
InternetNews
July 8, 2009
Alex Goldman
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. mark for My Articles similar articles
PC World
August 21, 2007
Robert McMillan
Is the U.S. at Risk From Cyberwarfare? Hostile governments may be behind the next wave of Internet attacks. mark for My Articles similar articles
The Motley Fool
June 13, 2011
Arunava De
Are Hackers the Next Threat to Your Portfolio? Before you respond to a malicious attack on one of your investments in your portfolios, measure the impact that such an attack can have on the company. mark for My Articles similar articles
PC World
October 23, 2002
Paul Roberts
Net Attack Could Be First of Many, Experts Warn Future attacks could succeed in bringing down the Internet and are surprisingly simple to launch, security insiders say. mark for My Articles similar articles
InternetNews
November 29, 2007
World Faces 'Cyber Cold War' Threat Cybercrime is no longer just a threat to industry and individuals but increasingly to national security. mark for My Articles similar articles
InternetNews
August 6, 2009
Twitter, Facebook Hit in Denial-of-Service Attacks Social media phenoms Twitter and Facebook this morning suffered bouts of downtime - with each blaming a denial-of-service (DDoS) attack for its woes. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
PC Magazine
June 20, 2008
Larry Seltzer
Hacked Through the Heart Even medical gadgetry is subject to outside hacking. mark for My Articles similar articles
InternetNews
March 28, 2005
Tim Gray
Alliance Formed to Finger Hackers The Fingerprint Sharing Alliance, an initiative comprised of global communications service providers, attempts to decrease the number of Internet attacks. mark for My Articles similar articles
The Motley Fool
July 13, 2009
Rich Smith
Welcome! You've Got Hackers! Someone threw a cyber war this week. It's great to know that the government is spending billions hardening the IT system against more competent attackers, but what we really need here is a solution to the real problem: Identifying who the attackers are. mark for My Articles similar articles
InternetNews
February 25, 2010
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. mark for My Articles similar articles
InternetNews
August 4, 2009
Cyber War Could Cause Global Collateral Damage The effects of an all-out cyber war would be impossible to control and could be felt worldwide, experts say. mark for My Articles similar articles
InternetNews
April 29, 2005
Michael Singer
Paul Kocher, President, Cryptography Research The man who designed SSL v3.0 talks about the latest security threats on the horizon and how cryptography can help solve them. mark for My Articles similar articles
InternetNews
October 25, 2006
Roy Mark
Floridian Charged in Akamai Attack A 32-year-old Floridian faces charges in Massachusetts for his alleged role in launching a distributed denial of service attack on Akamai Technologies. mark for My Articles similar articles
Bank Technology News
May 2006
Holly Sraeel
If Financial Crime is Rising, Then Security is Job #1 Furthered along by a loosely knit network of criminals, cybercrime is being waged by hackers and botmasters for profit in ways that are often not easily tracked by financial institutions, law enforcement authorities and governments. mark for My Articles similar articles
Science News
April 25, 2009
Science Past From The Issue Of April 25, 1959 There appears to be a strong link between the behavior of a man with regard to his business and social activities and his chances of being a victim of a heart attack. mark for My Articles similar articles
IEEE Spectrum
April 2006
Prachi Patel-Predd
Cybercrime At A Glance But just how much damage can cybercrime cause? About $67 billion to U.S. companies last year, according to an estimate based on the Federal Bureau of Investigation's 2005 Computer Crime Survey. Here's more statistics. mark for My Articles similar articles
Chemistry World
June 10, 2015
Emma Stoye
Security experts warn chemical plants are vulnerable to cyber-attacks Security experts are warning that the computers controlling machinery in chemical plants, power stations and other critical infrastructure are vulnerable to attacks from hackers. mark for My Articles similar articles
InternetNews
July 14, 2009
Inside Korea's Cyber Attack What really happened in South Korea? Attackers used the country's high-speed network against itself. mark for My Articles similar articles
American Family Physician
February 15, 2005
Panic Attacks A patient bulletin describing the disorder and how to find help with treatment and diagnosis. mark for My Articles similar articles
InternetNews
August 7, 2009
Facebook, Twitter Attacks Aimed for One User An anti-Russian blogger with profiles on a number of sites may have been the intended target of yesterday's attack. mark for My Articles similar articles
PC Magazine
June 20, 2007
Larry Seltzer
Beware Windows Hactivation Threat A new Trojan horse masquerading as a Windows security check is wreaking havoc on PCs. Find out how you can keep your system safe. mark for My Articles similar articles
CIO
February 15, 2002
Abbie Lundberg
Response Ability How do you respond to a computer security incident? mark for My Articles similar articles
InternetNews
January 29, 2007
Michael Hickins
Microsoft Warns of New Zero-Day Flaw Microsoft is investigating new public reports of limited "zero-day" attacks using a vulnerability in Microsoft Word 2000. mark for My Articles similar articles
PC World
October 22, 2002
Berger & Weil
Internet Backbone Withstands Attack Monday's denial of service attack called major, but few noticed thanks to Net's redundancies. mark for My Articles similar articles
Wired
August 23, 2007
John Robb
When Bots Attack If you want to bring down a country's information infrastructure and you don't want anyone to know who did it, the weapon of choice is a distributed denial of service attack. mark for My Articles similar articles
InternetNews
January 19, 2011
New Type of Denial of Service Attack Emerging Researchers detail a new kind of more sophisticated DoS attack at this week's Black Hat security conference. mark for My Articles similar articles
InternetNews
April 27, 2011
Russia Leads in Internet Attack Traffic New report from Akamai names Russia as the source of 10 percent of global attack traffic, but is it all really coming from Russia? mark for My Articles similar articles
InternetNews
October 31, 2007
Andy Patrizio
Symantec's Latest: Customized Threat Protection Symantec announced a custom threat analysis and protection service through its Global Services Security Response unit. Managed Threat Analysis, is designed to help companies facing more targeted attacks from criminals looking to steal intellectual property. mark for My Articles similar articles
RootPrompt.org
April 3, 2000
Fernando Schapachnik
Defeating DDOS II A proposal for defeating Distributed Denial of Service Attacks based on changing network routes... mark for My Articles similar articles
InternetNews
March 25, 2005
Sean Michael Kerner
Phishers Target Yahoo Messenger A new attack has been launched against Yahoo Messenger users, and it could be a sign of things to come. mark for My Articles similar articles
Wall Street & Technology
January 5, 2007
Larry Tabb
Preparing for the Inevitable While electronic thefts can be cleaner, less physical and certainly less bloody, the chance of getting money out of a brokerage or bank illegally is usually greater with a gun than a computer. But as the criminals and terrorists get smarter, we too must raise the bar. mark for My Articles similar articles
AskMen.com
January 21, 2002
Joshua Levine
Dealing With Anxiety Attacks If you or anybody you know has ever had the urge to freeze, gasp or run away in terror over the most trivial of things, now you will finally understand the causes of and treatments for anxiety attacks... mark for My Articles similar articles
National Defense
November 2013
Yasmin Tadjdeh
Al-Qaida Seen Shifting Tactics to Smaller Attacks The Boston bombing quickly brought domestic jihadist terrorism back into the public eye. Counterterrorism analysts are now concerned that the United States may soon face an increase in deadly, smaller scale attacks. mark for My Articles similar articles
PC World
February 3, 2003
Paul Roberts
The Net Is Dangerous, Research Says Attack rates decline, but worms and software flaws keep cyberspace hazardous, Symantec reports. mark for My Articles similar articles
Fast Company
Michael Grothaus
For First Time, Cyber Attack Causes Widespread Electricity Blackout The first known cyber attack to cause widespread public blackouts has occurred in Ukraine, it is believed. mark for My Articles similar articles
InternetNews
January 15, 2010
David Needle
VeriSign Ties Google Attack to China Government Security firm cite sources claiming hackers acted on official authority from Chinese government. mark for My Articles similar articles
InternetNews
May 10, 2011
DDoS Attacks Hit the Bottom Line According to VeriSign, DDoS attacks have gone mainstream with 63 percent of survey respondents getting hit at least once and 11 percent getting attacked more than six times. mark for My Articles similar articles
IEEE Spectrum
August 2012
Willie D. Jones
Declarations of Cyberwar What the revelations about the U.S.-Israeli origin of Stuxnet mean for warfare mark for My Articles similar articles
InternetNews
December 29, 2005
Roy Mark
Oregon Man Cops Plea in eBay DDOS Attack A 21-year-old Oregon man faces up to 10 years in prison after pleading guilty this week for his role in launching a distributed denial of service attack on eBay in 2003. mark for My Articles similar articles
New Architect
May 2002
Jay Lyman
to Catch a Thief Effective incident response against network intruders... mark for My Articles similar articles
Wired
August 21, 2007
Joshua Davis
Hackers Take Down the Most Wired Country in Europe How Estonia dealt with a botnet strike that targeted almost every digital front all at once. mark for My Articles similar articles
InternetNews
January 27, 2011
British Cops Snag 5 Pro-Wikileaks Hackers Scotland Yard authorities announce arrest of five members of "Anonymous" hacking ring charged with marshaling DDoS attacks against firms that cut off payments service to Wikileaks. mark for My Articles similar articles
InternetNews
October 27, 2010
Malware Scams Pick Up In Retail Sector Targeted attacks are becoming more and more common as hackers seek out specific individuals or groups to steal proprietary information. mark for My Articles similar articles
National Defense
June 2009
Stew Magnuson
U.S. Plans to Destroy Enemy Computer Networks in Cyber-Attacks Questioned But secrecy may have impeded widespread debate about the nature and implications of cyber-attack. mark for My Articles similar articles
CIO
February 1, 2003
Scott Berinato
Threats Won't Make the Sky Fall CIOs and other IT executives would be wise to remain focused on what a specific threat means to their organization so that they can address any vulnerabilities that may exist. You don't need to hear the words of a terror threat to sustain such a focus. mark for My Articles similar articles
National Defense
March 2013
Stew Magnuson
Iran's Ability to Carry Out Attacks in Cyberspace May Be Improving The ability to carry out attacks from across the world that can do real physical or economic damage without ever launching a jet fighter or sending in suicide squads is tempting for adversaries such as Iran, U.S. officials and cybersecurity experts have pointed out. mark for My Articles similar articles