MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Popular Mechanics
June 2007
Joel Johnson
Hack Attack: Is the Whole Internet at Risk? Some hackers recently tried to take down the entire World Wide Web. You didn't even notice because the Internet is so robust. mark for My Articles similar articles
PC World
May 23, 2001
Frank Thorsberg
Sizing Up Cybervandalism: Thousands Hit Monthly Researchers find debilitating hacker attacks cross borders to hit big and small targets... mark for My Articles similar articles
The Motley Fool
July 13, 2009
Rich Smith
Welcome! You've Got Hackers! Someone threw a cyber war this week. It's great to know that the government is spending billions hardening the IT system against more competent attackers, but what we really need here is a solution to the real problem: Identifying who the attackers are. mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
Wired
August 23, 2007
John Robb
When Bots Attack If you want to bring down a country's information infrastructure and you don't want anyone to know who did it, the weapon of choice is a distributed denial of service attack. mark for My Articles similar articles
Defense Update
Issue 3, 2005
DARPA gears to Counter Network Worms One of the most imminent threats to C4 systems, particularly mobile ad-hoc and COTS based networks, are large scale attacks by computer worms spreading malicious code. mark for My Articles similar articles
CIO
October 30, 2012
Lucian Constantin
Lack of Abuse Detection Allows Cloud Computing Instances to Be Used Like Botnets, Study Says Some cloud providers don't detect attacks launched from their networks, researchers say mark for My Articles similar articles
National Defense
February 2006
Stew Magnuson
Network Vulnerabilities Worry Pentagon Pentagon officials call the Defense Department's global communications network its weakest link. The question is how to manage the risk, and create a balance between security and the necessity of working with international partners and the private sector. mark for My Articles similar articles
Popular Mechanics
April 2009
Glenn Derene
How Vulnerable is U.S. Infrastructure to a Major Cyber Attack? The next world war might not start with a bang, but with a blackout. mark for My Articles similar articles
PC Magazine
August 7, 2009
Lance Ulanoff
Twitter's Down and It's All Your Fault The micro-blogging service's difficulties are troubling. Why it's suffering through a DDoS attack is even more upsetting. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
InternetNews
August 7, 2009
Facebook, Twitter Attacks Aimed for One User An anti-Russian blogger with profiles on a number of sites may have been the intended target of yesterday's attack. mark for My Articles similar articles
PC World
October 23, 2002
Paul Roberts
Net Attack Could Be First of Many, Experts Warn Future attacks could succeed in bringing down the Internet and are surprisingly simple to launch, security insiders say. mark for My Articles similar articles
InternetNews
February 2, 2004
Jim Wagner
SCO Shifts, Microsoft Braces for Next MyDoom Microsoft warns its users on how to remove MyDoom.B from computers as the first DDoS attacks begin. mark for My Articles similar articles
Wired
August 23, 2007
Ralph Peters
Washington Ignores Cyberattack Threats, Putting Us All at Peril 21st-century-warfare will be to deny entire states the ability to process, protect, and communicate information. The Pentagon doesn't seem to fully grasp the dangerous potential of this new domain of warfare. mark for My Articles similar articles
Popular Mechanics
September 2008
Glenn Derene
The Coming Cyberwar: Inside the Pentagon's Plan to Fight Back In the modern American military, digital telecommunication is so integral to command and control of forces and equipment that the disruption of data can do more to disable a fighting force than a thousand bombs mark for My Articles similar articles
Salon.com
April 4, 2001
Caroline Benner
The phantom cyber-threat We should stop worrying about computer terrorism and learn who our real enemies are... mark for My Articles similar articles
InternetNews
January 27, 2010
Is the U.S. Headed for a Cyber War? With cyber threats from abroad coming fast and furious, how serious is the United States about going on the offensive? mark for My Articles similar articles
PC World
October 22, 2002
Berger & Weil
Internet Backbone Withstands Attack Monday's denial of service attack called major, but few noticed thanks to Net's redundancies. mark for My Articles similar articles
CIO
November 1, 2005
Matt Villano
Seeing No Evil CIOs are growing increasingly frustrated at the laissez-faire attitude of many ISPs toward security. Is it time to consider regulating the ISP industry? mark for My Articles similar articles
National Defense
April 2007
Stew Magnuson
Congress Ponders Action After Chinese Anti-Sat Test After the Chinese demonstrated their ability to destroy enemy spacecraft, analysts say U.S. reliance on satellites and make them a weak link in our defenses. mark for My Articles similar articles
Fast Company
John Paul Titlow
GitHub Is Still Under The Biggest DDoS Attack In Its History In the biggest DDoS attack in its history, GitHub is facing an onslaught of malicious inbound traffic from what appear to be China-based sources. mark for My Articles similar articles
InternetNews
December 29, 2005
Roy Mark
Oregon Man Cops Plea in eBay DDOS Attack A 21-year-old Oregon man faces up to 10 years in prison after pleading guilty this week for his role in launching a distributed denial of service attack on eBay in 2003. mark for My Articles similar articles
PC Magazine
August 3, 2005
Ryan Naraine
TCP Port Attack Imminent? An ominous increase in sniffing activity on TCP Port 445 could signal an impending attack targeting a recently patched Microsoft vulnerability. mark for My Articles similar articles
InternetNews
October 26, 2006
Ed Sutherland
Zombies Control Half of Windows PCs Software giant Microsoft has crowned the "zombie" PC the greatest threat to Windows users. mark for My Articles similar articles
InternetNews
February 9, 2004
Sharon Gaudin
Stripped-Down MyDoom Hits Microsoft.... Again A new variant of the virulent MyDoom worm has been found in the wild, launching what one analyst fears may be a vicious attack against Microsoft Corp.'s Web site. mark for My Articles similar articles
National Defense
March 2013
Stew Magnuson
Iran's Ability to Carry Out Attacks in Cyberspace May Be Improving The ability to carry out attacks from across the world that can do real physical or economic damage without ever launching a jet fighter or sending in suicide squads is tempting for adversaries such as Iran, U.S. officials and cybersecurity experts have pointed out. mark for My Articles similar articles
CIO
February 1, 2002
Scott Berinato
Cs3 Los Angeles software maker Cs3 likes to look at problems from a different direction -- its MANAnet Reverse Firewall prevents distributed denial-of-service (DDOS) attacks from leaving a network once they enter, helping to stop such assaults from propagating across the Internet... mark for My Articles similar articles
The Motley Fool
June 13, 2011
Arunava De
Are Hackers the Next Threat to Your Portfolio? Before you respond to a malicious attack on one of your investments in your portfolios, measure the impact that such an attack can have on the company. mark for My Articles similar articles
Wired
November 2006
Scott Berinato
Attack of the Bots The latest threat to the Net: autonomous software programs that combine forces to perpetrate mayhem, fraud, and espionage on a global scale. How one company fought the new Internet mafia - and lost. mark for My Articles similar articles
Home Theater
April 1, 2010
Mark Fleischmann
Smart Meters Maybe Not So Smart Security holes may let hackers steal your juice. mark for My Articles similar articles
InternetNews
August 6, 2009
Twitter, Facebook Hit in Denial-of-Service Attacks Social media phenoms Twitter and Facebook this morning suffered bouts of downtime - with each blaming a denial-of-service (DDoS) attack for its woes. mark for My Articles similar articles
InternetNews
February 25, 2010
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. mark for My Articles similar articles
InternetNews
December 3, 2004
Tim Gray
Lycos Europe Pulls Spam-Fighting Screensaver Earlier this week, Lycos Europe launched an aggressive campaign targeting spam-related Web sites. The UK-based company took the offensive when it released a "screensaver that spams the spammers." mark for My Articles similar articles
InternetNews
March 16, 2004
Ryan Naraine
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. mark for My Articles similar articles
InternetNews
July 14, 2009
Inside Korea's Cyber Attack What really happened in South Korea? Attackers used the country's high-speed network against itself. mark for My Articles similar articles
PC Magazine
February 15, 2006
Matthew D. Sarrel
Business Body Armor All sorts of enemy combatants want to penetrate your network, but you can turn attacks aside with the right combo of hardware and tactics. mark for My Articles similar articles
InternetNews
June 25, 2004
Ryan Naraine
Malware Hacker Attack Linked to Spammers Experts warn that a highly sophisticated malicious hacker attack could turn millions of PCs into spam zombies. Infected IIS web servers are spreading the malicious software to Internet Explorer users. mark for My Articles similar articles
InternetNews
November 29, 2004
Jim Wagner
SCO Site Cracked The homepage for the SCO Group's Web site is back to normal Monday after attackers defaced images on the site. mark for My Articles similar articles
InternetNews
July 8, 2009
Alex Goldman
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. mark for My Articles similar articles
InternetNews
January 29, 2007
Michael Hickins
Microsoft Warns of New Zero-Day Flaw Microsoft is investigating new public reports of limited "zero-day" attacks using a vulnerability in Microsoft Word 2000. mark for My Articles similar articles
PC World
August 21, 2007
Robert McMillan
Is the U.S. at Risk From Cyberwarfare? Hostile governments may be behind the next wave of Internet attacks. mark for My Articles similar articles
InternetNews
January 16, 2004
Jim Wagner
Cyberspace, The Next Battlefield Is World Cyber War I somewhere on the horizon? A new report shows the increased popularity of converged networks like VoIP makes it more likely. mark for My Articles similar articles
InternetNews
October 25, 2006
Roy Mark
Floridian Charged in Akamai Attack A 32-year-old Floridian faces charges in Massachusetts for his alleged role in launching a distributed denial of service attack on Akamai Technologies. mark for My Articles similar articles
Information Today
December 5, 2013
Internet Security Providers Team Up Akamai, a cloud-based security platform, announced its acquisition of Prolexic Technologies, a provider of cloud-based security solutions for distributed denial of service attacks. mark for My Articles similar articles
Popular Mechanics
April 2009
Glenn Derene
How Hackers Could Take Down a Natural Gas Pipeline Much of America's infrastructure is computer-controlled, and therefore subject to hacking. Here is an in-depth look at the specific vulnerabilities of a natural gas pipeline. mark for My Articles similar articles
Bank Technology News
July 2008
Rebecca Sausner
Could the U.S. Be the Next Estonia? Gadi Evron, former Israeli Government Internet Security Operations Manager, went to Estonia during the crippling DDOS attacks last May. Here he talks about whether the U.S. is vulnerable to such an attack, and the role banks and home computers play in protecting critical infrastructure. mark for My Articles similar articles
PC Magazine
June 23, 2008
Matthew D. Sarrel
How Secure Is Your Company? To protect your business, think like a thief. mark for My Articles similar articles
Bank Technology News
January 2011
Rebecca Sausner
New Year, New Hacks? The new year is likely to bring more of the same when it comes to criminals siphoning funds from consumers and banks. mark for My Articles similar articles
InternetNews
June 1, 2004
Colin C. Haley
AT&T on DoS: Early Detection Equals Prevention The carrier introduces a new service to thwart denial-of-service attacks on corporate systems. mark for My Articles similar articles