MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
February 5, 2010
SQL Injections Led to 60% of UK Data Breaches Malicious hackers are relying on growing numbers of increasingly complex SQL attacks to get at companies' data. mark for My Articles similar articles
InternetNews
June 16, 2011
Mesh Injection Attack Claims 30,000 Sites Meshed Web attack emerges that takes a new approach to replication and it may already be a big problem. mark for My Articles similar articles
InternetNews
July 28, 2010
Cisco Warns on Enterprise Security Threats In its latest quarterly Global Threat Report, networking giant Cisco outlines a broad-ranging list of threats to enterprise security culled from its various security products. mark for My Articles similar articles
InternetNews
September 15, 2008
Richard Adhikari
Hackers Hit BusinessWeek With Malware The BusinessWeek.com site was hit by a SQL injection attack and connects users to a sleeper site. mark for My Articles similar articles
PC Magazine
March 7, 2008
Larry Seltzer
ID Theft: The Next Level The new virus Trojan.Silentbanker regularly patrols the Internet for banking sites it can manipulate. mark for My Articles similar articles
InternetNews
August 12, 2005
Tim Gray
Attack Launches 19 Forms of Malware A highly complex Trojan was discovered on a U.S. site with a Russian-registered domain. mark for My Articles similar articles
InternetNews
February 9, 2010
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. mark for My Articles similar articles
PC Magazine
May 1, 2010
Albanesius & Rhey
Anatomy of a Hack In late March, a chapter was closed with little fanfare on the biggest case of online identity theft in U.S. history. mark for My Articles similar articles
InternetNews
May 19, 2009
Gumblar: Biggest Threat on the Web Today? A new trojan has grown quickly, and experts aren't mincing words in describing the danger. mark for My Articles similar articles
InternetNews
August 13, 2010
Malware Discovered on Another Red Cross Website The Red Cross of Serbia was targeted by hackers who injected malicious JavaScript files onto several of the organization's web pages. mark for My Articles similar articles
InternetNews
December 3, 2010
IBM Refreshes AppScan to Secure Input Validation New release of AppScan platform - version 8 - from IBM targets cross-site scripting and SAL injection vulnerabilities with string analysis for secure coding. mark for My Articles similar articles
InternetNews
October 29, 2009
Two-Headed Trojan Targets Online Banks New Trojan uses "two-pronged payload" to swipe log-in information, steal electronic funds. mark for My Articles similar articles
Fast Company
Michael Grothaus
For First Time, Cyber Attack Causes Widespread Electricity Blackout The first known cyber attack to cause widespread public blackouts has occurred in Ukraine, it is believed. mark for My Articles similar articles
InternetNews
May 12, 2010
Firm Finds Flaws in Popular Antivirus Software Putting the security software offerings from 35 different vendors through their paces, researchers at Matousec conclude that all are susceptible to an exploit that could hobble Windows-based devices. mark for My Articles similar articles
InternetNews
February 26, 2009
Richard Adhikari
Microsoft Clamps Down on Excel Zero-Day Attack Microsoft is taking steps to protect customers from attacks through a zero-day flaw in Microsoft Excel discovered earlier this week. mark for My Articles similar articles
InternetNews
May 28, 2009
Alex Goldman
Flood of Fake Western Union E-mails Hide Trojan An influx of malware-laden spam, which started two weeks ago, continues today as hackers seek credit card and banking information. mark for My Articles similar articles
Bank Technology News
September 2009
Rebecca Sausner
Everything That Can Go Wrong The aftermath of the breach of Albert Gonzalez has had some positive effects. mark for My Articles similar articles
InternetNews
February 7, 2008
Andy Patrizio
Web 2.0: Unsafe At Any Speed? People who specialize in Web security are saying Web 2.0 as it is now can't be secured. Should we keep on this path? mark for My Articles similar articles
InternetNews
July 31, 2006
Clint Boulton
SQL Injection Threatens to Needle Web Users A scripting flaw that lets perpetrators pull any content from a database is a scary tool for IT admins. mark for My Articles similar articles
InternetNews
June 11, 2009
Alex Goldman
Malware Keeps Creeping Onto Mac OS X The Apple Mac is still seeing far fewer attacks than Windows experiences, but researchers say there's a disturbing trend at work. mark for My Articles similar articles
InternetNews
September 15, 2009
Malware Ads Hit New York Times Media company's advertising staff approved bogus Vonage ad that distributed malware. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
InternetNews
May 22, 2006
Ed Sutherland
Word Attack Hails From China Security researchers warn Microsoft Word zero-day exploit is aimed at government e-mail systems. mark for My Articles similar articles
InternetNews
January 16, 2008
Andy Patrizio
A Particularly Nasty Week For Malware From Excel to the revitalized Storm worm to a severe banking Trojan, it's enough to make you nostalgic for the days of BBSes. mark for My Articles similar articles
InternetNews
December 23, 2008
Sean Michael Kerner
New Zero-Day Exploit Emerges for Microsoft SQL Microsoft issues warning for attack vector that could paralyze database servers. mark for My Articles similar articles
InternetNews
October 17, 2008
Richard Adhikari
Adobe Sites Hit by Malware Just weeks after a BusinessWeek Web site was hit by an SQL injection attack, comes news that Adobe has had to deal with two of its Web sites compromised the same way. mark for My Articles similar articles
InternetNews
October 16, 2007
Andy Patrizio
A New Way to Hack Yourself Core Security Technologies updates its intrusion detection software to simulate outside attacks on your network and see how far the bad guys can get. mark for My Articles similar articles
The Motley Fool
June 13, 2011
Arunava De
Are Hackers the Next Threat to Your Portfolio? Before you respond to a malicious attack on one of your investments in your portfolios, measure the impact that such an attack can have on the company. mark for My Articles similar articles
InternetNews
April 12, 2011
HP Fortifies Real Time Security New HP Fortify Real-Time Hybrid Analysis solution takes aim at dynamic threats. mark for My Articles similar articles
InternetNews
August 28, 2009
New Trojan Snags Skype Calls on Windows PCs Trojan.Peskyspy beats Skype encryption through Windows API attack. How serious is the threat? mark for My Articles similar articles
InternetNews
July 8, 2009
Alex Goldman
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. mark for My Articles similar articles
InternetNews
June 11, 2010
Symantec Warns of Latest World Cup Malware Researchers at software-security firm detect a two-pronged malware attack targeting executives at major Brazilian firms, using the World Cup as a lure. mark for My Articles similar articles
InternetNews
August 16, 2010
Symantec Uncovers Another Sneaky Spam Scam Latest Trojan conceals itself in innocent-looking attachments designed to get you or someone you know to open up the offending file. mark for My Articles similar articles
InternetNews
February 20, 2009
Richard Adhikari
Group Warns of Top Web 2.0 Security Threats We can't stand in the path of progress with Web 2.0 technologies, but we can make it safer, an industry group says. mark for My Articles similar articles
InternetNews
July 28, 2004
Ryan Naraine
Microsoft: Out-of-Cycle Security Patch Coming Due out next week, the patch will fix a software flaw that led to the Download.Ject malware attack. mark for My Articles similar articles
InternetNews
June 23, 2006
Sean Michael Kerner
Next-Gen Bank Trojans Are Upon Us Regardless of how much damage they may have done in the past, a new generation of banking Trojans is beginning to appear, and they're game for even more pilfering, according to at least one security researcher. mark for My Articles similar articles
InternetNews
February 2, 2009
Richard Adhikari
Are Legitimate Sites the Next Malware Threat? Businesses may be exposing their customers to malware by leaving their sites unpatched, IBM warns in a new study. mark for My Articles similar articles
PC Magazine
June 5, 2008
Malware Everywhere Malicious software attacks, including Trojan horses, bots, and rootkits, are rising at the fastest rate ever. mark for My Articles similar articles
Science News
April 25, 2009
Science Past From The Issue Of April 25, 1959 There appears to be a strong link between the behavior of a man with regard to his business and social activities and his chances of being a victim of a heart attack. mark for My Articles similar articles
Bank Technology News
July 2008
Rebecca Sausner
Could the U.S. Be the Next Estonia? Gadi Evron, former Israeli Government Internet Security Operations Manager, went to Estonia during the crippling DDOS attacks last May. Here he talks about whether the U.S. is vulnerable to such an attack, and the role banks and home computers play in protecting critical infrastructure. mark for My Articles similar articles
InternetNews
February 25, 2010
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. mark for My Articles similar articles
InternetNews
December 17, 2008
Richard Adhikari
Microsoft Patches IE, But Security Issues Remain As usual, the bad guys are ahead in the tug-of-war over security. mark for My Articles similar articles
InternetNews
January 18, 2011
Attack Toolkits Spark New Malware Strains Do-it-yourself malware kits are all the rage online and they're making life much easier for cyber-criminals looking to turn a quick buck. mark for My Articles similar articles
Defense Update
Issue 3, 2005
DARPA gears to Counter Network Worms One of the most imminent threats to C4 systems, particularly mobile ad-hoc and COTS based networks, are large scale attacks by computer worms spreading malicious code. mark for My Articles similar articles
PC Magazine
June 20, 2007
Larry Seltzer
Beware Windows Hactivation Threat A new Trojan horse masquerading as a Windows security check is wreaking havoc on PCs. Find out how you can keep your system safe. mark for My Articles similar articles
InternetNews
July 14, 2004
Ryan Naraine
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues. mark for My Articles similar articles
InternetNews
February 7, 2007
Ed Sutherland
Internet 'Didn't Crumble' Under DNS Attacks Internet users barely felt a ripple yesterday when hackers launched a concerted attack on several key Domain Name System servers. mark for My Articles similar articles
InternetNews
May 25, 2005
Tim Gray
'Star Wars' Flavor Trojan Targets IM The new instant messaging threat is after Yahoo IM users. mark for My Articles similar articles
InternetNews
December 30, 2004
Tim Gray
Trojan Threatens XP Flaw may leave Windows XP vulnerable to attack. mark for My Articles similar articles
PC Magazine
September 23, 2008
Matthew D. Sarrel
A Day in the Life of a Web 2.0 Hacker They harvest data about you, your family, your friends, and your work directly from the Web apps you use and the sites you visit. Here's how they do it. mark for My Articles similar articles