MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
January 28, 2009
Richard Adhikari
Online Trust: A Thing of the Past? Malware attacks are turning the Web upside down, and complicating the efforts of security vendors and users to cope with the threats. mark for My Articles similar articles
InternetNews
February 25, 2010
Malware Thrives Despite Improved Security: IBM Security researchers at IBM's X-Force find 6,601 new software vulnerabilities in 2009, down 11 percent from last, but that hasn't stopped hackers and phishers from finding new ways to rip off consumers. mark for My Articles similar articles
InternetNews
August 10, 2009
IBM Adds Web App Defense to Security Portfolio IBM today unveiled new enhancements to its security suite aimed at safeguarding Web applications and data, as attacks preying on such targets continue to dominate the headlines. mark for My Articles similar articles
InternetNews
August 27, 2009
IBM's X-Force Report Praises Sun for Fast Fixes Security report on trends in vulnerabilities, threats, spam, and phishing finds Sun has passed Microsoft in terms of reporting and fixing OS problems. mark for My Articles similar articles
InternetNews
March 30, 2010
IBM to Help Defend FAA From Cyber Attacks IBM will test a new system to monitor and safeguard the FAA's networks against hackers, data theft and malware. mark for My Articles similar articles
InternetNews
April 21, 2009
Alex Goldman
IBM Says Cloud, Virtualized Tech Need Lockdown In their haste to embrace the latest technologies, many enterprises have architected new security holes in their networks, IBM warns. mark for My Articles similar articles
InternetNews
June 22, 2010
Botnet Still King of Malware Underworld Latest report from Gartner finds that while more sophisticated malware and phishing scams will proliferate, botnets will still be the top challenge for security experts for the foreseeable future. mark for My Articles similar articles
InternetNews
February 9, 2010
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
InternetNews
February 2, 2009
Richard Adhikari
Are Legitimate Sites the Next Malware Threat? Businesses may be exposing their customers to malware by leaving their sites unpatched, IBM warns in a new study. mark for My Articles similar articles
InternetNews
October 27, 2010
Malware Scams Pick Up In Retail Sector Targeted attacks are becoming more and more common as hackers seek out specific individuals or groups to steal proprietary information. mark for My Articles similar articles
InternetNews
November 17, 2009
McAfee Outlines Growing Cyber Warfare Threat McAfee's study finds politically motivated cyber attacks are on the rise internationally. mark for My Articles similar articles
InternetNews
February 4, 2010
Air Force Taps Big Blue for Cloud Project IBM will embark on a 10-month project with the Air Force to build a secure, high-level defense network in the cloud. mark for My Articles similar articles
InternetNews
October 6, 2008
Richard Adhikari
IBM Puts More Tools in the Cloud IBM has launched an initiative that offers up a mix of on-premise and cloud computing applications to help its ISVs and partners offer those services to customers. mark for My Articles similar articles
InternetNews
March 31, 2011
Report: Nearly Half of Vulnerabilities Left Unpatched IBM's X-Force 2010 Trend and Risk Report details a 27 percent rise in vulnerabilities, with nearly half left unpatched by year's end. mark for My Articles similar articles
InternetNews
July 28, 2010
Cyberattacks Hit Businesses With Big Bills New study from Ponemon Institute and security vendor ArcSight details rising cost of cyber-attacks, with businesses reporting at least one major attack a week. mark for My Articles similar articles
InternetNews
November 29, 2007
Andy Patrizio
Cyber Crime Grows More Dangerous And Sophisticated McAfee study finds online threats are getting more complex and brazen in what they target, like the U.S. military. mark for My Articles similar articles
InternetNews
September 1, 2010
IBM Talks Up Enterprise Cloud Plans, Benefits IBM drops details on its efforts to build and buy cloud products and services tailored for for uses like compliance, collaboration and communications across an array of industries. mark for My Articles similar articles
InternetNews
February 10, 2009
Richard Adhikari
IBM Talks Up Private-Public Cloud Migration IBM shores up its cloud business and teams with Juniper on migrating enterprise loads to public clouds. mark for My Articles similar articles
InternetNews
February 24, 2010
Cyber Attacks Hit 75% of Enterprises in 2009 Symantec's latest report has more unsettling news for IT security administrators. mark for My Articles similar articles
InternetNews
October 8, 2010
Cloud, Mobile Top Developers' Priorities: IBM In a new survey, IBM's developerWorks unit has found that more than half of IT professionals expect mobile software applications to vault past conventional computing platforms in the next five years. mark for My Articles similar articles
InternetNews
February 17, 2009
Sean Gallagher
Social Networks a Magnet for Malware Just like the crooks robbed the banks because that's where the money is, malware will go where the people are. mark for My Articles similar articles
InternetNews
November 1, 2007
Sean Michael Kerner
IBM: Security Is Our Brand Big Blue says it's baking security awareness into every facet of its business - and if it's lucky, perhaps yours soon, too. mark for My Articles similar articles
InternetNews
January 24, 2006
Sean Michael Kerner
IBM: Users Are The Weak Link in Security IBM is warning in a new report that, though widespread virus outbreaks are on the decline, on the whole online attacks are expected to rise in 2006. The culprit? Highly targeted attacks that rely on naive users to help perpetrate cybercrimes. mark for My Articles similar articles
InternetNews
July 13, 2009
F-Secure: Flash, ActiveX Still Under Attack Anyone who has downloaded the latest version of Firefox should make sure to update all browser plugins. mark for My Articles similar articles
InternetNews
June 15, 2009
Alex Goldman
IBM's Cloud Computing Starts With Developers IBM's CloudBurst and Smart Business products recognize that today's businesses focus on developing and deploying software fast, cheaply, and with as few bugs as possible. mark for My Articles similar articles
InternetNews
July 14, 2006
Clint Boulton
IBM Gives Micromuse Assets The Tivoli Touch Designed for businesses with heavy computer data traffic, IBM Tivoli Security Operations Manager protects networks by proactively detecting and neutralizing security threats as they happen rather than after the system is harmed. mark for My Articles similar articles
InternetNews
May 13, 2010
One Gang Responsible For Most Phishing Attacks More than two-thirds of all phishing attacks in the second half of 2009 were the work of one gang, according to an anti-phishing group. mark for My Articles similar articles
InternetNews
April 14, 2009
Alex Goldman
Credit Cards, Banks Targeted by Cyber Criminals Sophisticated criminal gangs are organized and focused on stealing, buying and selling identities across shadowy online markets. mark for My Articles similar articles
InternetNews
September 17, 2007
Andy Patrizio
Have We Reached The End Of The Virus? Not quite. The old-fashioned virus infestation is fading as the biggest nuisance for computer users in favor of Trojans, Symantec's new malware study finds. mark for My Articles similar articles
InternetNews
May 6, 2005
Clint Boulton
Is Creative Computing Gridlocked? IBM and Sun are headed for a showdown as they try to create new pricing schemes, experts say. mark for My Articles similar articles
Registered Rep.
August 15, 2014
Diana Britton
Is the Cyber Sweep Too Much to Handle? The recent regulatory sweeps around cyber security by the Securities and Exchange Commission and FINRA are starting to hit financial advisors, and many, especially smaller practices, are not prepared for it. mark for My Articles similar articles
InternetNews
March 13, 2008
Kenneth Corbin
IBM Aims to 'SMash' Web 2.0 Threats IBM today announced a technology to secure enterprise mashups - the applications built from cobbling together data from multiple sources. mark for My Articles similar articles
InternetNews
November 20, 2009
Symantec's 'Unlucky 13' Security Trends for 2010 Hackers and malware purveyors are becoming more sophisticated, meaning computer users need to become wiser and more proactive, too. mark for My Articles similar articles
InternetNews
February 16, 2006
Tim Scannell
IBM Takes Holistic Security Stance IBM Corp. this week restructured nearly its entire portfolio of security products and services to provide a more strategic and proactive approach to protecting computer systems and users from abuse, unauthorized access and identity theft. mark for My Articles similar articles
The Motley Fool
October 5, 2009
Anders Bylund
You've Got Cloud-Mail From IBM Big Blue is going toe-to-toe with both Google and Microsoft through its latest cloud-computing product. mark for My Articles similar articles
InternetNews
March 2, 2009
Sean Gallagher
IBM Sows Seeds for a Future Cloud IBM's university research efforts around cloud computing are advancing technology - and producing a crop of software engineers raised on IBM tools. mark for My Articles similar articles
InternetNews
April 20, 2010
Targeted, DIY Malware Here to Stay: Symantec Symantec's latest threat report provides plenty of disconcerting news for IT managers charged with safeguarding critical enterprise data. mark for My Articles similar articles
InternetNews
August 25, 2010
More Security Holes in Software, Fewer Patches According to IBM's X-Force security research group, vulnerabilities are proliferating, and while companies are getting better about reporting those flaws, the number of unpatched problems continues to rise. mark for My Articles similar articles
InternetNews
May 23, 2006
Clint Boulton
IBM Powers Up SOA Machines IBM has taken some of its hardware and software technology and applied it to three appliances designed to secure and improve the performance of service-oriented architectures. mark for My Articles similar articles
InternetNews
November 15, 2007
IBM in Push to Build Datacenters For Clients IBM is staking out a major new source of business helping clients like banks or retailers manage datacenters on a par with Internet players such as Google or Microsoft, a top official said on Wednesday. mark for My Articles similar articles
National Defense
July 2007
Breanne Wagner
Experts Downplay Imminent Threat of Cyberterrorism U.S. officials are worried about the threat of a terrorist attack against civilian and government computer systems, but experts say any attack by cyber terrorists is likely to be non-debilitating worms and viruses. mark for My Articles similar articles
InternetNews
November 16, 2009
IBM Rolls Out BI for Private Clouds Smart Analytics Cloud will provide more than a petabyte of data to its 200,000 employees. mark for My Articles similar articles
InternetNews
March 31, 2010
Black Market Spawns Cyber Crime for Dummies New study from PandaLabs pins the escalating severity of attacks carried out by relatively unskilled hackers on a thriving black market offering ready-made tools. mark for My Articles similar articles
InternetNews
July 28, 2010
Most Data Breaches Perpetrated by Cyber Gangs Organized crime syndicates, many of them based or operated from outside the U.S., are overwhelmingly to blame for coordinated cyber attacks, according to a study by Verizon and the U.S. Secret Service. mark for My Articles similar articles
InternetNews
March 23, 2006
Clint Boulton
Sun's Grid DDOS-Attacked Sun's public grid launch was hampered by denial-of-service attacks on the company's grid pilot. mark for My Articles similar articles
InternetNews
June 23, 2006
David Needle
IBM Grows Grid Iron There's growth in grids. IBM said in response to increasing worldwide demand for supercomputing resources, it is expanding the availability of computer resources available through its computing on demand program. mark for My Articles similar articles
The Motley Fool
July 28, 2010
Gabriel Perna
IBM Top-Rated in Cloud Offerings IBM's experience and diverse supports have helped its success in the cloud. mark for My Articles similar articles
InternetNews
December 26, 2008
Richard Adhikari
Enterprise Opportunities & Challenges in 2009 Money-saving technologies will be strong, cybercriminals will rev up and business intelligence solutions will spread. mark for My Articles similar articles
Insurance & Technology
November 5, 2008
Prasad Balakrishnan
Cyber Attacks Can Come in Many Shapes and Sizes Cyber threats aimed at insurance companies are constantly evolving and growing. Unfortunately the pace of adoption of cyber protection mechanisms has not caught up. mark for My Articles similar articles