MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
July 14, 2009
Inside Korea's Cyber Attack What really happened in South Korea? Attackers used the country's high-speed network against itself. mark for My Articles similar articles
National Defense
March 2015
Sarah Sicard
North Korean Cyber Attack on Sony Poses Tough Security Questions While cyber attacks are on the rise around the world -- both from inside and outside threats -- this was the first known instance of a country deliberately causing destruction to a U.S. company's data. mark for My Articles similar articles
InternetNews
October 27, 2010
Does the U.S. Need an Internet 'Kill Switch'? A majority of U.S. consumers surveyed said the government should have the authority to shut down parts of the Internet if necessary to head off a cyber attack. mark for My Articles similar articles
PC World
May 23, 2001
Frank Thorsberg
Sizing Up Cybervandalism: Thousands Hit Monthly Researchers find debilitating hacker attacks cross borders to hit big and small targets... mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
InternetNews
May 18, 2007
Sean Michael Kerner
Estonia Under Russian Cyber Attack? Data by a security research firm clearly shows that a full-scale assault is under way, but the attackers' identity and location is still uncertain. mark for My Articles similar articles
InternetNews
October 9, 2009
Larry Barrett
Cyber Terrorism Demands New Tactics: Study RAND Corporation says fighting online threats to national security requires nontraditional tactics, immediate attention. mark for My Articles similar articles
InternetNews
August 3, 2010
Most Don't Object to Cyber Spying: Report A survey by a prominent security software firm reveals that most people don't mind if the government uses cyber spying techniques to keep tabs on our enemies. mark for My Articles similar articles
InternetNews
June 8, 2010
HP System to Help Air Force Fight Cyber Threats HP's won a contract for a Cyber Control System that will help the Air Force gather strategic information and identify cyber threats. mark for My Articles similar articles
InternetNews
July 8, 2009
Alex Goldman
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. mark for My Articles similar articles
Fast Company
Michael Grothaus
For First Time, Cyber Attack Causes Widespread Electricity Blackout The first known cyber attack to cause widespread public blackouts has occurred in Ukraine, it is believed. mark for My Articles similar articles
Information Today
February 4, 2013
Paula J. Hane
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. mark for My Articles similar articles
InternetNews
July 29, 2010
U.S. General Details the Impact of Cyber War At the Black Hat security conference, retired General and former CIA director Michael Hayden explains the dangers of cyber attacks. mark for My Articles similar articles
InternetNews
April 24, 2009
Alex Goldman
Lockheed Martin, DoD Under Constant Net Attack Lockheed Martin responds to reports that data on its flagship jet fighter was stolen from Department of Defense computers. mark for My Articles similar articles
National Defense
January 2016
Stephanie Meloni
Defense Department Assuming Growing Cyber Security Role The Defense Department sees cyber as a domain that spans air, land, sea and space, but it struggles with how to handle it as a war fighting domain to best protect the nation. mark for My Articles similar articles
The Motley Fool
November 14, 2011
Katie Spence
Cyber Attacks Capable of Crashing the U.S. Economy? With cyber attacks becoming more prevalent, these companies are stepping in to provide solutions. mark for My Articles similar articles
InternetNews
September 29, 2010
Cyber Storm Simulation Tests Nation's Readiness The three days of simulations sponsored by the Department of Homeland Security, are designed to test the U.S.'s ability to respond to a major attack on its digital infrastructure. mark for My Articles similar articles
The Motley Fool
June 13, 2011
Arunava De
Are Hackers the Next Threat to Your Portfolio? Before you respond to a malicious attack on one of your investments in your portfolios, measure the impact that such an attack can have on the company. mark for My Articles similar articles
National Defense
July 2007
Breanne Wagner
Experts Downplay Imminent Threat of Cyberterrorism U.S. officials are worried about the threat of a terrorist attack against civilian and government computer systems, but experts say any attack by cyber terrorists is likely to be non-debilitating worms and viruses. mark for My Articles similar articles
Registered Rep.
August 16, 2013
Lauren Barack
Hackers At The Gate "FINRA expects cyber security to remain a regulatory focus for the foreseeable future," Susan Axelrod, FINRA's executive vice president for Regulatory Operations said at the PLI Seminar in October. mark for My Articles similar articles
PC World
August 21, 2007
Robert McMillan
Is the U.S. at Risk From Cyberwarfare? Hostile governments may be behind the next wave of Internet attacks. mark for My Articles similar articles
InternetNews
June 30, 2009
Kenneth Corbin
Net Ushering in Era of War Without Borders Expert sees a new face of cyber warfare forcing 'some of the hardest national security decisions you'll have to make.' mark for My Articles similar articles
Wired
August 23, 2007
John Robb
When Bots Attack If you want to bring down a country's information infrastructure and you don't want anyone to know who did it, the weapon of choice is a distributed denial of service attack. mark for My Articles similar articles
InternetNews
November 17, 2009
McAfee Outlines Growing Cyber Warfare Threat McAfee's study finds politically motivated cyber attacks are on the rise internationally. mark for My Articles similar articles
The Motley Fool
April 22, 2009
Rich Smith
Grand Theft Fighter Jet: China According to the Wall Street Journal, someone -- apparently based in China -- has succeeded in penetrating the IT systems at key U.S. defense contractors, making off with "several terabytes" worth of data on Lockheed Martin's new F-35 Lightning II fighter jet. mark for My Articles similar articles
InternetNews
August 4, 2009
Cyber War Could Cause Global Collateral Damage The effects of an all-out cyber war would be impossible to control and could be felt worldwide, experts say. mark for My Articles similar articles
InternetNews
March 19, 2009
Kenneth Corbin
Experts See Shortfall in Cybersecurity Research With the nation under constant attack, witnesses call on Commerce Committee to prioritize cybersecurity and promote education in the field. mark for My Articles similar articles
InternetNews
July 28, 2010
Cyberattacks Hit Businesses With Big Bills New study from Ponemon Institute and security vendor ArcSight details rising cost of cyber-attacks, with businesses reporting at least one major attack a week. mark for My Articles similar articles
National Defense
May 2014
Stew Magnuson
New Cyber Hygiene Campaign Seeks to Curtail Attacks The Center for Internet Security and the Council on CyberSecurity, working with the Department of Homeland Security, the National Governors Association and the Governors Homeland Security Advisors Council launched the Cyber Hygiene Campaign in April. mark for My Articles similar articles
Bank Technology News
July 2008
Rebecca Sausner
Could the U.S. Be the Next Estonia? Gadi Evron, former Israeli Government Internet Security Operations Manager, went to Estonia during the crippling DDOS attacks last May. Here he talks about whether the U.S. is vulnerable to such an attack, and the role banks and home computers play in protecting critical infrastructure. mark for My Articles similar articles
National Defense
December 2013
Yasmin Tadjdeh
Industry, Military Emphasize Need for 'Cyberwarrior' Training as Attacks Increase Government and military leaders have for years warned of increasingly pervasive and nefarious cyber-attacks. The network intrusions, perpetrated by nation states, hacktivists and thieves, are growing rapidly, experts have said. mark for My Articles similar articles
InternetNews
February 25, 2010
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. mark for My Articles similar articles
InternetNews
March 28, 2005
Tim Gray
Alliance Formed to Finger Hackers The Fingerprint Sharing Alliance, an initiative comprised of global communications service providers, attempts to decrease the number of Internet attacks. mark for My Articles similar articles
InternetNews
February 9, 2010
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. mark for My Articles similar articles
Bank Technology News
April 2007
Rebecca Sausner
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. mark for My Articles similar articles
National Defense
January 2005
Joe Pappalardo
Homeland Defense Research Agency Directs Attention To Cyber Security Fearing the specter of crippling attacks on government and private sector computer systems, federal officials are stepping up efforts to foil cyber terrorism. mark for My Articles similar articles
National Defense
May 2015
Allyson Versprille
Researchers Hack Into Driverless Car System, Take Control of Vehicle A group of Virginia-based researchers funded by the Defense Department found that it is relatively easy to remotely hack into a driverless car's control system, but said hardening against such an attack can be inexpensive. mark for My Articles similar articles
PC World
October 23, 2002
Paul Roberts
Net Attack Could Be First of Many, Experts Warn Future attacks could succeed in bringing down the Internet and are surprisingly simple to launch, security insiders say. mark for My Articles similar articles
InternetNews
February 24, 2010
Cyber Attacks Hit 75% of Enterprises in 2009 Symantec's latest report has more unsettling news for IT security administrators. mark for My Articles similar articles
InternetNews
January 15, 2010
David Needle
VeriSign Ties Google Attack to China Government Security firm cite sources claiming hackers acted on official authority from Chinese government. mark for My Articles similar articles
InternetNews
August 7, 2009
Facebook, Twitter Attacks Aimed for One User An anti-Russian blogger with profiles on a number of sites may have been the intended target of yesterday's attack. mark for My Articles similar articles
AskMen.com US general says US ready for North Korean attack The top U.S. military commander in Korea said Tuesday that U.S. and South Korean forces are prepared for "anything North Korea can throw at us." mark for My Articles similar articles
Popular Mechanics
September 2008
Glenn Derene
Top 3 Threats and Countermeasures From the Coming Cyberwar: Glossary An explanation of terms like DDoS, root-level penetration, etc. mark for My Articles similar articles
InternetNews
January 28, 2010
IT Managers Brace for a Barrage of Cyber Attacks Despite increased awareness and new state and federal legislation, most enterprise IT managers expect to be victimized by a major cyber attack in the next five years. mark for My Articles similar articles
InternetNews
September 14, 2006
Roy Mark
U.S. Unprepared for Internet Attack Recovery Cyber security experts cite lack of leadership from government and cooperation from private sector. mark for My Articles similar articles
National Defense
September 2009
Grace V. Jean
In The Fight Against Cybercrime, Weapons Have Short Shelf Lives Even the latest innovations to protect U.S. networks are not enough to counter cybercrimes. mark for My Articles similar articles
National Defense
March 2013
Stew Magnuson
Iran's Ability to Carry Out Attacks in Cyberspace May Be Improving The ability to carry out attacks from across the world that can do real physical or economic damage without ever launching a jet fighter or sending in suicide squads is tempting for adversaries such as Iran, U.S. officials and cybersecurity experts have pointed out. mark for My Articles similar articles
InternetNews
April 10, 2008
Susan Kuchinskas
An Imperfect (Cyber) Storm The federal government has been working with private companies and security vendors to develop protocols and communications systems that will let them respond quickly and share relevant information on threats and attacks. mark for My Articles similar articles
PC World
February 3, 2003
Paul Roberts
The Net Is Dangerous, Research Says Attack rates decline, but worms and software flaws keep cyberspace hazardous, Symantec reports. mark for My Articles similar articles
PC Magazine
August 7, 2009
Lance Ulanoff
Twitter's Down and It's All Your Fault The micro-blogging service's difficulties are troubling. Why it's suffering through a DDoS attack is even more upsetting. mark for My Articles similar articles