Similar Articles |
|
PC World January 24, 2007 Scott Spanbauer |
Thwart the Three Biggest Internet Threats of 2007 Protect yourself against the three gravest Web dangers: Internet Explorer, phishing attacks, and malware. |
PC Magazine March 20, 2009 Matthew D. Sarrel |
I Stole My Friend's Identity If you've not yet jumped into the great abyss of social networking, then you haven't created any accounts that can be compromised, and you're safe, right? Not! |
InternetNews February 23, 2009 Richard Adhikari |
Malware Authors Exploit Facebook App Is a bogus application making the rounds on Facebook just a failed marketing ploy? Or something more dangerous? |
InternetNews May 15, 2009 Alex Goldman |
Facebook Attacks Threaten All Web Sites Why would users want your user name and password? Perhaps because it could give them access to your money and your e-mail. |
InternetNews October 29, 2008 Richard Adhikari |
Facebook Worm Redux Taps Google Sites Once again, social networking site Facebook has been hit by the Koobface worm, which has been used to attack it several times since July. |
InternetNews March 4, 2009 Richard Adhikari |
Experts Warn Koobface Eying More Social Sites Malicious hackers are continuing their attacks on social networking sites, with a new variant of the Koobface worm now spreading its assault on a new crop of the popular sites. |
InternetNews May 21, 2009 Alex Goldman |
Phishers Strike Facebook in Latest Assault Facebook is fighting back against the most recent attack. |
PC World August 2006 Andrew Brandt |
The 10 Biggest Security Risks You Don't Know About Hackers, scammers, and identity thieves are constantly coming up with new ways to attack your PC and your privacy. Here are the newest perils and how to foil them. |
PC World May 30, 2007 McMillan & Larkin |
Is Web 2.0 Safe? As users store more data online, hackers are finding ways to break into the new service sites. Experts say the problems are deep-seated... Web applications that work offline... |
InternetNews April 30, 2009 Michelle Megna |
Facebook Fights Second Phishing Attack Facebook battles attackers seeking users' login information. |
InternetNews February 26, 2009 Richard Adhikari |
Microsoft Clamps Down on Excel Zero-Day Attack Microsoft is taking steps to protect customers from attacks through a zero-day flaw in Microsoft Excel discovered earlier this week. |
InternetNews October 1, 2009 |
Internet Never More Dangerous: Study Report finds a 585 percent spike in fake anti-malware and security software programs in the first half of 2009. |
PC Magazine August 20, 2008 Matthew D. Sarrel |
There's a Bot in Your PC Aiding the rise of blended threats around the world, botnets are digging in and using your network as a base of operations. |
InternetNews January 28, 2009 Richard Adhikari |
Online Trust: A Thing of the Past? Malware attacks are turning the Web upside down, and complicating the efforts of security vendors and users to cope with the threats. |
InternetNews December 17, 2008 Richard Adhikari |
Microsoft Patches IE, But Security Issues Remain As usual, the bad guys are ahead in the tug-of-war over security. |
PC Magazine September 7, 2007 Neil J. Rubenking |
Norton Internet Security 2008 For 2008, the already impressive Norton Internet Security polishes its protection and adds identity management and one-click help. |
PC Magazine March 7, 2007 Neil J. Rubenking |
Security Super Guide The best ways to protect your PC, and your identity. |
PC Magazine August 11, 2008 Matthew D. Sarrel |
The Rise of Blended Threats Technology has made the world smaller, and therefore more dangerous. |
InternetNews January 6, 2009 Richard Adhikari |
Fake Celeb Profiles in Spam Attacks Want to see "more" of your favorite actor or pop star? Bad idea. |
InternetNews February 11, 2009 Richard Adhikari |
Spammers Hijack Facebook Group of 1.5 Million Facebook site is taken over by get-rich-quick and other familiar spam. |
InternetNews December 16, 2008 Richard Adhikari |
Several Attacks Behind CheckFree Data Breach The cybercriminals who breached the CheckFree bill paying service last week used a combination attack that may be almost impossible to stop. |
PC Magazine November 2, 2005 Michael J. Steinhart |
Maximum Security: 94 Essential Tips for Staying Safe Dozens of our best security tips and pointers, broken down by category: system, networking and wireless, e-mail, Web surfing, malware, and mobile. |
PC Magazine September 9, 2008 Neil J. Rubenking |
Norton Internet Security 2009 This is definitely the slimmest, most unobtrusive Norton ever, but its protection is top-notch where it counts. |
InternetNews February 24, 2009 Richard Adhikari |
Supertoxic Site Infects eWeek.com Hackers attacked news site eWeek through DoubleClick network. |
PC Magazine February 2, 2005 Gottesman & Karagiannis |
A False Sense of Security Only 85 percent of the AOL/NCSA survey respondents were running antivirus software. Worse, while 71 percent of those people thought they were updating their protection at least weekly (including automatic updates), barely half of them actually were. |
InternetNews February 7, 2008 Andy Patrizio |
Web 2.0: Unsafe At Any Speed? People who specialize in Web security are saying Web 2.0 as it is now can't be secured. Should we keep on this path? |
PC World April 2004 Scott Spanbauer |
Lock Down Your PC Hackers. Spammers. Even rogue coworkers and employees. How can you keep the bad guys out and the good data in? Safeguard your system's perimeter with these 29 beyond-the-basics security steps. |
PC World September 26, 2007 Erik Larkin |
Five of the Dirtiest Malware Tricks From disguising applets to look like part of Windows to co-opting security tools, Web crooks use a variety of methods to bypass your system's safeguards. |
Entrepreneur June 2010 Ericka Chickowski |
Protect Your Small Business Against Cyber Attacks Cybercrime costs the economy more than $1 trillion per year, and crooks are increasingly setting their sights on small businesses. A look at the most destructive threats to your network - and what you need to do about them. |
CIO September 18, 2012 Jeff Vance |
Free Mobile Apps Put Your BYOD Strategies at Risk When it comes to the BYOD trend, CIOs worry over their lack of control of mobile apps. However, it's not only about rogue mobile apps packing malware that trouble them. IT leaders are also concerned by the risks posed by malware-free mobile apps. |
InternetNews March 3, 2009 Richard Adhikari |
Digg Hackers Strike Next at YouTube Attacks are on the rise, with malware authors dabbling in spreading worms and scareware via comments. |
Information Today May 19, 2008 Avi Rappoport |
The Center Is Where They Want to Be: Google Friend Connect, Yahoo! Open Strategy, MySpace Data Availability, Facebook Connect Google, Yahoo!, MySpace, and Facebook are in competition to be the single archive for user data. |
InternetNews February 25, 2009 Richard Adhikari |
Online Trust Takes a Hit in Gmail Chat Phishing Security experts are warning that a phishing attack on Google's Gmail's chat feature not only poses a danger to users, but could be a harbinger of things to come. |
PC Magazine February 1, 2006 Cade Metz |
The Sorry State of Security Time to face facts: when it comes to our online safety woes, everybody is to blame. |
PC World January 28, 2008 Erik Larkin |
Hackers Rig Google to Deliver Malware The latest malware trend should prompt you to think twice about the links you click next time you search. |
InternetNews November 23, 2004 Tim Gray |
Analysts: Expect More Ad Server Attacks Security analysts say attacks via ad servers are likely to continue. Another reason not to use Internet Explorer? |
InternetNews January 27, 2009 Richard Adhikari |
Spammers Ramp Up Short-Lived Web Sites Sites that are here today, gone tomorrow are difficult to track and block. |
PC World February 21, 2007 Ryan Singel |
Zero-Day Malware Attacks You Can't Block No matter how diligently you patch your PC, it may still be vulnerable during the first hours of a previously unseen attack. Here's what you should know about zero-day hazards and the security holes they exploit. |
InternetNews December 5, 2008 Richard Adhikari |
Latest Facebook Attack Stems from Previous One Businesses with Facebook links must watch out. |
Popular Mechanics February 2006 Brian Krebs |
It's 10 PM. Do You Know Where Your Identity Is? Global identity thieves may know their way around your computer better than you do. Learn how to protect yourself in the scary new world of zombies, RATs, Trojan horses and evil twins. |
PC Magazine August 17, 2006 Neil J. Rubenking |
McAfee Total Protection Ambitious McAfee Total Protection has a million features and significant flaws. |
InternetNews August 18, 2010 |
Facebook Kit Makes Hacking Logins Easy Security software vendor BitDefender says it's found a new malware kit that lets hackers easily access logins and passwords for Facebook and other unsecured credentials. |
InternetNews April 11, 2008 Susan Kuchinskas |
Web 2.0 in Enterprise Needs a Lock Sans security controls, company-hosted blogs and wikis make it all too easy to post malware. Then, the trusting, sharing culture of Web 2.0 encourages others to click on the link. |
Search Engine Watch June 26, 2010 Johnny Widerlund |
9 Ways to Control Your Privacy on Social Media Sites A look at the top ways online security experts say you can restore or maintain your privacy on social networking sites. |
Search Engine Watch June 19, 2010 Johnny Widerlund |
Social Media: The Privacy and Security Repercussions How risky is our online behavior? A closer look at social media's privacy and security vulnerabilities. |
Registered Rep. May 24, 2011 Lauren Barack |
Cyber-Hackers: Faster, Better Equipped Than You Security should be the responsibility of all employees - not just the chief technology officer, or the principal of an advisory firm. |
Search Engine Watch January 20, 2010 Jason King |
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. |
InternetNews June 25, 2004 Ryan Naraine |
Malware Hacker Attack Linked to Spammers Experts warn that a highly sophisticated malicious hacker attack could turn millions of PCs into spam zombies. Infected IIS web servers are spreading the malicious software to Internet Explorer users. |
PC World May 4, 2008 Erik Larkin |
Safest Way to Bank Online? Your Cell Phone Phones are off the radar for most hackers today. But Google's Android OS and the iPhone could make them more of a target. |
InternetNews November 20, 2009 |
Symantec's 'Unlucky 13' Security Trends for 2010 Hackers and malware purveyors are becoming more sophisticated, meaning computer users need to become wiser and more proactive, too. |