MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
November 30, 2007
Sean Michael Kerner
Google Wants Your Help to Fight Malware Google wants to turn the tables on malware and wants you to report malware to Google when you find it. mark for My Articles similar articles
PC World
December 31, 2007
Erik Larkin
Malware Evolving Too Fast for Antivirus Apps Bad guys use sophisticated testing to create malware that can evade even the best security programs. mark for My Articles similar articles
InternetNews
August 9, 2006
Sean Michael Kerner
Hacking The Dead Cow Yet another malware search engine debuts, but this one doesn't entirely rely on Google. mark for My Articles similar articles
InternetNews
October 5, 2009
HP Hacking Challenge Yields Surprising Results If you thought automated security tools were enough, think again. mark for My Articles similar articles
InternetNews
August 13, 2010
Malware Discovered on Another Red Cross Website The Red Cross of Serbia was targeted by hackers who injected malicious JavaScript files onto several of the organization's web pages. mark for My Articles similar articles
PC Magazine
August 1, 2007
Larry Seltzer
A Long-Ignored Threat: RTF Files A new danger is being exploited by malware. Learn which steps to take in order to avoid becoming a victim... Biggest and worse malicious programs and viruses... mark for My Articles similar articles
InternetNews
September 18, 2009
Hackers Hit 'Curious George' on PBS Web Site Malicious code aimed to infect visitors to the site. mark for My Articles similar articles
Search Engine Watch
November 2, 2010
Kristi Hines
Link Building: 3 Strategies for Link Requests Here's what you need to be aware of when contacting webmasters as a representative of the client or as a brand advocate when requesting links. mark for My Articles similar articles
InternetNews
July 18, 2006
Sean Michael Kerner
Google Hacking Malicious Code Security researcher H.D. Moore has released a new malware search engine and its underlying code to help searchers find malware code that Google has indexed. mark for My Articles similar articles
InternetNews
April 25, 2007
Andy Patrizio
Microsoft Expands And Unifies Security Efforts Microsoft formally introduced the Malware Protection Center today. mark for My Articles similar articles
InternetNews
September 5, 2007
Andy Patrizio
Made in China: Virus-Laden Web Pages A report finds China has the most compromised Web pages serving up malware. mark for My Articles similar articles
InternetNews
March 10, 2010
Mariposa Bot Shipped With Vodafone Smartphone Panda Security discovered Confiker, Mariposa and Lineage password stealing malware samples installed on a recently purchased Vodafone HTC Magic smartphone. mark for My Articles similar articles
InternetNews
October 9, 2008
Sean Michael Kerner
No/Low/High-Tech Hacking: It All Matters Don't point the finger at hackers for all security woes. Point hacker tools at yourself to see what's wrong with your stuff, instead. mark for My Articles similar articles
PC Magazine
June 9, 2010
Neil J. Rubenking
Panda Cloud Antivirus 1.1 Review & Rating Panda Security has spent the last few years mastering behavior-based detection, cloud-based antivirus scanning, and free security software. Panda Cloud Antivirus 1.1 (free, direct) brings all these threads together. mark for My Articles similar articles
Search Engine Watch
October 5, 2010
Kristi Hines
Safeguarding Your PC When Link Building Here's what you can do to protect your computer while checking out your competitors' backlinks and avoid losing valuable productivity time if your machine gets infected with malware. mark for My Articles similar articles
InternetNews
October 28, 2010
Google Details Fight Against Malware At the SecTOR security conference in Toronto, researcher with the search giant describes Google's efforts to seek out and block malware to protect users online. mark for My Articles similar articles
InternetNews
May 8, 2007
David Needle
A 'Critical' Patch Day For Microsoft Security vulnerabilities in Microsoft Office, Exchange, Internet Explorer and more are addressed. mark for My Articles similar articles
PC Magazine
March 21, 2007
Neil J. Rubenking
Spyware Doctor with AntiVirus 5.0 From-scratch rewrite has the virtues and problems of a brand-new program. mark for My Articles similar articles
PC Magazine
October 16, 2007
Larry Seltzer
Microsoft on the .Info Block Note to software giant: applying blanket rules isn't good security. mark for My Articles similar articles
InternetNews
January 27, 2009
Richard Adhikari
Spammers Ramp Up Short-Lived Web Sites Sites that are here today, gone tomorrow are difficult to track and block. mark for My Articles similar articles
InternetNews
August 13, 2009
Craiglist, AutoCAD Threats Show Virus Variety Malware authors continue showing their creativity, with new viruses making the rounds by targeting Craigslist fans and AutoCAD users. mark for My Articles similar articles
PC Magazine
March 26, 2007
Neil J. Rubenking
DriveSentry 2.1 DriveSentry stops bad programs from writing to your drives, but you have to tell it what's bad. mark for My Articles similar articles
InternetNews
December 31, 2009
VoIP Security Issues on the Rise McAfee said its latest research found almost 60 vulnerabilities in VoIP products. mark for My Articles similar articles
InternetNews
March 21, 2011
Sean Michael Kerner
Detecting Malware Without Software? New service from Trusteer can pinpoint remote malware running on client PCs. mark for My Articles similar articles
InternetNews
March 3, 2005
Sean Michael Kerner
Searchmeup Targets Weak PCs A new adware exploit takes advantage of IE LoadImage vulnerability. mark for My Articles similar articles
InternetNews
September 9, 2008
Andy Patrizio
Malware Scanning Moves to the Cloud Instead of burdening the client computer with all the scanning work, antivirus vendors are doing the processing on their systems. mark for My Articles similar articles
InternetNews
July 6, 2006
Sean Michael Kerner
Trojans on The March Is it all Microsoft's fault? One security vendor suggests that users may well want to switch to a less-targeted OS. mark for My Articles similar articles
InternetNews
November 30, 2010
Most New Malware Disappears Within A Day: Study New strains of malware are popping up at an unprecedented rate but, fortunately, most of these variants are stamped out within the first 24 hours. mark for My Articles similar articles
InternetNews
September 15, 2008
Richard Adhikari
Hackers Hit BusinessWeek With Malware The BusinessWeek.com site was hit by a SQL injection attack and connects users to a sleeper site. mark for My Articles similar articles
InternetNews
January 3, 2011
Fuzzer Finds IE Vulnerabilities A Google researcher makes his "cross fuzz" tool for identifying browser vulnerabilities publicly available. mark for My Articles similar articles
Entrepreneur
June 2004
Mike Hogan
Not-So-Good Fellas Keep the bad guys at bay with these steps to improve your company's computer security. You can also try out these resources and Web sites for secure computing. mark for My Articles similar articles
InternetNews
April 27, 2006
Andy Patrizio
Linux Malware On The Rise Numerically it pales compared to Windows, but are Linux users even thinking about security? mark for My Articles similar articles
InternetNews
August 9, 2010
Cisco Unveils Top 10 Web Malware Threats Contaminated websites are still a threat, but Cisco's latest security report suggests that are plenty of other Web-borne malware scams that can cost you or your company dearly. mark for My Articles similar articles
PC Magazine
July 25, 2007
Neil J. Rubenking
GarbageClean 2.0 Don't rely on GarbageClean for malware protection. It doesn't matter how little it costs -- it's still garbage. mark for My Articles similar articles
InternetNews
November 9, 2010
USB Devices Pose New Security Threats Portable drives and storage devices are a leading source of malware, according to one security software developer. mark for My Articles similar articles