MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC World
January 24, 2007
Scott Spanbauer
Thwart the Three Biggest Internet Threats of 2007 Protect yourself against the three gravest Web dangers: Internet Explorer, phishing attacks, and malware. mark for My Articles similar articles
PC Magazine
March 20, 2009
Matthew D. Sarrel
I Stole My Friend's Identity If you've not yet jumped into the great abyss of social networking, then you haven't created any accounts that can be compromised, and you're safe, right? Not! mark for My Articles similar articles
InternetNews
February 23, 2009
Richard Adhikari
Malware Authors Exploit Facebook App Is a bogus application making the rounds on Facebook just a failed marketing ploy? Or something more dangerous? mark for My Articles similar articles
InternetNews
May 15, 2009
Alex Goldman
Facebook Attacks Threaten All Web Sites Why would users want your user name and password? Perhaps because it could give them access to your money and your e-mail. mark for My Articles similar articles
InternetNews
October 29, 2008
Richard Adhikari
Facebook Worm Redux Taps Google Sites Once again, social networking site Facebook has been hit by the Koobface worm, which has been used to attack it several times since July. mark for My Articles similar articles
InternetNews
March 4, 2009
Richard Adhikari
Experts Warn Koobface Eying More Social Sites Malicious hackers are continuing their attacks on social networking sites, with a new variant of the Koobface worm now spreading its assault on a new crop of the popular sites. mark for My Articles similar articles
InternetNews
May 21, 2009
Alex Goldman
Phishers Strike Facebook in Latest Assault Facebook is fighting back against the most recent attack. mark for My Articles similar articles
PC World
August 2006
Andrew Brandt
The 10 Biggest Security Risks You Don't Know About Hackers, scammers, and identity thieves are constantly coming up with new ways to attack your PC and your privacy. Here are the newest perils and how to foil them. mark for My Articles similar articles
PC World
May 30, 2007
McMillan & Larkin
Is Web 2.0 Safe? As users store more data online, hackers are finding ways to break into the new service sites. Experts say the problems are deep-seated... Web applications that work offline... mark for My Articles similar articles
InternetNews
April 30, 2009
Michelle Megna
Facebook Fights Second Phishing Attack Facebook battles attackers seeking users' login information. mark for My Articles similar articles
InternetNews
February 26, 2009
Richard Adhikari
Microsoft Clamps Down on Excel Zero-Day Attack Microsoft is taking steps to protect customers from attacks through a zero-day flaw in Microsoft Excel discovered earlier this week. mark for My Articles similar articles
InternetNews
October 1, 2009
Internet Never More Dangerous: Study Report finds a 585 percent spike in fake anti-malware and security software programs in the first half of 2009. mark for My Articles similar articles
PC Magazine
August 20, 2008
Matthew D. Sarrel
There's a Bot in Your PC Aiding the rise of blended threats around the world, botnets are digging in and using your network as a base of operations. mark for My Articles similar articles
InternetNews
January 28, 2009
Richard Adhikari
Online Trust: A Thing of the Past? Malware attacks are turning the Web upside down, and complicating the efforts of security vendors and users to cope with the threats. mark for My Articles similar articles
InternetNews
December 17, 2008
Richard Adhikari
Microsoft Patches IE, But Security Issues Remain As usual, the bad guys are ahead in the tug-of-war over security. mark for My Articles similar articles
PC Magazine
September 7, 2007
Neil J. Rubenking
Norton Internet Security 2008 For 2008, the already impressive Norton Internet Security polishes its protection and adds identity management and one-click help. mark for My Articles similar articles
PC Magazine
March 7, 2007
Neil J. Rubenking
Security Super Guide The best ways to protect your PC, and your identity. mark for My Articles similar articles
PC Magazine
August 11, 2008
Matthew D. Sarrel
The Rise of Blended Threats Technology has made the world smaller, and therefore more dangerous. mark for My Articles similar articles
InternetNews
January 6, 2009
Richard Adhikari
Fake Celeb Profiles in Spam Attacks Want to see "more" of your favorite actor or pop star? Bad idea. mark for My Articles similar articles
InternetNews
February 11, 2009
Richard Adhikari
Spammers Hijack Facebook Group of 1.5 Million Facebook site is taken over by get-rich-quick and other familiar spam. mark for My Articles similar articles
InternetNews
December 16, 2008
Richard Adhikari
Several Attacks Behind CheckFree Data Breach The cybercriminals who breached the CheckFree bill paying service last week used a combination attack that may be almost impossible to stop. mark for My Articles similar articles
PC Magazine
November 2, 2005
Michael J. Steinhart
Maximum Security: 94 Essential Tips for Staying Safe Dozens of our best security tips and pointers, broken down by category: system, networking and wireless, e-mail, Web surfing, malware, and mobile. mark for My Articles similar articles
PC Magazine
September 9, 2008
Neil J. Rubenking
Norton Internet Security 2009 This is definitely the slimmest, most unobtrusive Norton ever, but its protection is top-notch where it counts. mark for My Articles similar articles
InternetNews
February 24, 2009
Richard Adhikari
Supertoxic Site Infects eWeek.com Hackers attacked news site eWeek through DoubleClick network. mark for My Articles similar articles
PC Magazine
February 2, 2005
Gottesman & Karagiannis
A False Sense of Security Only 85 percent of the AOL/NCSA survey respondents were running antivirus software. Worse, while 71 percent of those people thought they were updating their protection at least weekly (including automatic updates), barely half of them actually were. mark for My Articles similar articles
InternetNews
February 7, 2008
Andy Patrizio
Web 2.0: Unsafe At Any Speed? People who specialize in Web security are saying Web 2.0 as it is now can't be secured. Should we keep on this path? mark for My Articles similar articles
PC World
April 2004
Scott Spanbauer
Lock Down Your PC Hackers. Spammers. Even rogue coworkers and employees. How can you keep the bad guys out and the good data in? Safeguard your system's perimeter with these 29 beyond-the-basics security steps. mark for My Articles similar articles
PC World
September 26, 2007
Erik Larkin
Five of the Dirtiest Malware Tricks From disguising applets to look like part of Windows to co-opting security tools, Web crooks use a variety of methods to bypass your system's safeguards. mark for My Articles similar articles
Entrepreneur
June 2010
Ericka Chickowski
Protect Your Small Business Against Cyber Attacks Cybercrime costs the economy more than $1 trillion per year, and crooks are increasingly setting their sights on small businesses. A look at the most destructive threats to your network - and what you need to do about them. mark for My Articles similar articles
CIO
September 18, 2012
Jeff Vance
Free Mobile Apps Put Your BYOD Strategies at Risk When it comes to the BYOD trend, CIOs worry over their lack of control of mobile apps. However, it's not only about rogue mobile apps packing malware that trouble them. IT leaders are also concerned by the risks posed by malware-free mobile apps. mark for My Articles similar articles
InternetNews
March 3, 2009
Richard Adhikari
Digg Hackers Strike Next at YouTube Attacks are on the rise, with malware authors dabbling in spreading worms and scareware via comments. mark for My Articles similar articles
Information Today
May 19, 2008
Avi Rappoport
The Center Is Where They Want to Be: Google Friend Connect, Yahoo! Open Strategy, MySpace Data Availability, Facebook Connect Google, Yahoo!, MySpace, and Facebook are in competition to be the single archive for user data. mark for My Articles similar articles
InternetNews
February 25, 2009
Richard Adhikari
Online Trust Takes a Hit in Gmail Chat Phishing Security experts are warning that a phishing attack on Google's Gmail's chat feature not only poses a danger to users, but could be a harbinger of things to come. mark for My Articles similar articles
PC Magazine
February 1, 2006
Cade Metz
The Sorry State of Security Time to face facts: when it comes to our online safety woes, everybody is to blame. mark for My Articles similar articles
PC World
January 28, 2008
Erik Larkin
Hackers Rig Google to Deliver Malware The latest malware trend should prompt you to think twice about the links you click next time you search. mark for My Articles similar articles
InternetNews
November 23, 2004
Tim Gray
Analysts: Expect More Ad Server Attacks Security analysts say attacks via ad servers are likely to continue. Another reason not to use Internet Explorer? mark for My Articles similar articles
InternetNews
January 27, 2009
Richard Adhikari
Spammers Ramp Up Short-Lived Web Sites Sites that are here today, gone tomorrow are difficult to track and block. mark for My Articles similar articles
PC World
February 21, 2007
Ryan Singel
Zero-Day Malware Attacks You Can't Block No matter how diligently you patch your PC, it may still be vulnerable during the first hours of a previously unseen attack. Here's what you should know about zero-day hazards and the security holes they exploit. mark for My Articles similar articles
InternetNews
December 5, 2008
Richard Adhikari
Latest Facebook Attack Stems from Previous One Businesses with Facebook links must watch out. mark for My Articles similar articles
Popular Mechanics
February 2006
Brian Krebs
It's 10 PM. Do You Know Where Your Identity Is? Global identity thieves may know their way around your computer better than you do. Learn how to protect yourself in the scary new world of zombies, RATs, Trojan horses and evil twins. mark for My Articles similar articles
PC Magazine
August 17, 2006
Neil J. Rubenking
McAfee Total Protection Ambitious McAfee Total Protection has a million features and significant flaws. mark for My Articles similar articles
InternetNews
August 18, 2010
Facebook Kit Makes Hacking Logins Easy Security software vendor BitDefender says it's found a new malware kit that lets hackers easily access logins and passwords for Facebook and other unsecured credentials. mark for My Articles similar articles
InternetNews
April 11, 2008
Susan Kuchinskas
Web 2.0 in Enterprise Needs a Lock Sans security controls, company-hosted blogs and wikis make it all too easy to post malware. Then, the trusting, sharing culture of Web 2.0 encourages others to click on the link. mark for My Articles similar articles
Search Engine Watch
June 26, 2010
Johnny Widerlund
9 Ways to Control Your Privacy on Social Media Sites A look at the top ways online security experts say you can restore or maintain your privacy on social networking sites. mark for My Articles similar articles
Search Engine Watch
June 19, 2010
Johnny Widerlund
Social Media: The Privacy and Security Repercussions How risky is our online behavior? A closer look at social media's privacy and security vulnerabilities. mark for My Articles similar articles
Registered Rep.
May 24, 2011
Lauren Barack
Cyber-Hackers: Faster, Better Equipped Than You Security should be the responsibility of all employees - not just the chief technology officer, or the principal of an advisory firm. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
InternetNews
June 25, 2004
Ryan Naraine
Malware Hacker Attack Linked to Spammers Experts warn that a highly sophisticated malicious hacker attack could turn millions of PCs into spam zombies. Infected IIS web servers are spreading the malicious software to Internet Explorer users. mark for My Articles similar articles
PC World
May 4, 2008
Erik Larkin
Safest Way to Bank Online? Your Cell Phone Phones are off the radar for most hackers today. But Google's Android OS and the iPhone could make them more of a target. mark for My Articles similar articles
InternetNews
November 20, 2009
Symantec's 'Unlucky 13' Security Trends for 2010 Hackers and malware purveyors are becoming more sophisticated, meaning computer users need to become wiser and more proactive, too. mark for My Articles similar articles