MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
January 15, 2009
Richard Adhikari
The Web's Latest Threat: Smarter 'Zombies' Hacker-controlled PCs are outwitting security software - and are growing in number. mark for My Articles similar articles
InternetNews
June 17, 2009
Alex Goldman
Hacked Government and Corporate PCs for Sale A new report from Finjan says that the latest criminal markets are more sophisticated than ever before. mark for My Articles similar articles
Bank Technology News
December 2010
Michael Sisk
Endgame Systems Finds Botnets in the Cloud Security software provider Endgame Systems raised $29 million in the fall and simultaneously launched ipTrust, a product meant to detect and manage the harm caused by malware and botnets in cloud computing environments mark for My Articles similar articles
InternetNews
August 14, 2009
Twitter Used as Botnet Control As bot herders learn to exploit legitimate sites, researchers warn that IT managers will need to monitor social media closely. mark for My Articles similar articles
PC Magazine
August 20, 2008
Matthew D. Sarrel
There's a Bot in Your PC Aiding the rise of blended threats around the world, botnets are digging in and using your network as a base of operations. mark for My Articles similar articles
InternetNews
December 1, 2008
Richard Adhikari
Botnets Bouncing Back Despite McColo's takedown, observers say that major senders of spam and malware are returning - and may be stronger than ever. mark for My Articles similar articles
InternetNews
December 22, 2009
Andy Patrizio
AMD Sets May Date for Mobile 'Danube' CPUs AMD has its biggest collection of mobile CPUs ever planned for late spring 2010. mark for My Articles similar articles
InternetNews
March 18, 2011
Rustock Botnet Beaten Down by Microsoft On the heels of last year's successful takedown of another giant botnet, Microsoft just shut down a bigger and more sophisticated botnet this week. mark for My Articles similar articles
PC World
July 23, 2007
Lincoln Spector
Proper ID for a Zombie PC If you can't tell by its ravenous appetite, glassy-eyed stare, and leprous casing, how do you know whether your system has become one of the living dead? mark for My Articles similar articles
InternetNews
November 12, 2008
Christopher Saunders
Media Spotlight Scatters a Botnet Host ISPs spring into action after a mainstream publication fingers a U.S. Web hosting company for its role in the global spam and malware epidemic. mark for My Articles similar articles
InternetNews
April 27, 2009
Alex Goldman
Conficker Awakens With Scareware and Spam The new activity on the Conficker botnet shows that the criminal economy is functioning well. mark for My Articles similar articles
InternetNews
February 11, 2009
Richard Adhikari
Cybercriminals Launch Attacks Through Digg Bad guys leverage celebrities' names to put malware on victims' PCs. mark for My Articles similar articles
InternetNews
June 29, 2009
Alex Goldman
Botnet Blight: Hacked PCs Create 83.2% of Spam A MessageLabs report finds spammers are hard at work with increasingly sophisticated, attack-resistant botnets. mark for My Articles similar articles
InternetNews
July 18, 2005
Tim Gray
Trend Micro Stops Spam at The Network Antivirus vendor Trend Micro began rolling out Network Reputation Services, a portfolio of network-based, anti-spam services designed to complement the company's existing anti-spam offerings. mark for My Articles similar articles
PC World
October 24, 2007
Erik Larkin
The Internet's Public Enemy Number One The Storm Worm has infected so many machines that it's now one of the most powerful supercomputers. mark for My Articles similar articles
PC World
August 2006
Andrew Brandt
The 10 Biggest Security Risks You Don't Know About Hackers, scammers, and identity thieves are constantly coming up with new ways to attack your PC and your privacy. Here are the newest perils and how to foil them. mark for My Articles similar articles
InternetNews
June 6, 2007
Andy Patrizio
Microsoft IIS a Popular Target For Malware According to a report by Google, malware is as prevalent on Microsoft's Internet Information Servers as the far more popular Apache Web server. mark for My Articles similar articles
InternetNews
June 3, 2009
Alex Goldman
Scareware Arrives on Twitter in Latest Attack As new Web 2.0 threats proliferate, business IT departments struggle with basic tasks such as patch management. mark for My Articles similar articles
InternetNews
August 23, 2007
Andy Patrizio
Storm Worm Gathers Strength on The Internet The Storm worm virus is still around, still causing trouble and stronger than ever six months later. mark for My Articles similar articles
InternetNews
November 15, 2010
Malicious Spam Surges in 3Q: Report Kaspersky Lab report finds the volume of malicious spam soared in the third quarter, keeping security software firms and consumers on high alert. mark for My Articles similar articles
Wired
August 23, 2007
John Robb
When Bots Attack If you want to bring down a country's information infrastructure and you don't want anyone to know who did it, the weapon of choice is a distributed denial of service attack. mark for My Articles similar articles
InternetNews
January 30, 2008
Andy Patrizio
Storm's Creators Face a Storm of Their Own Law enforcement knows who created one of the worst worms to hit the Internet. The hard part is arresting them. mark for My Articles similar articles
InternetNews
July 21, 2009
Alex Goldman
Erin Andrews Virus Infects Search, Blogs The taping of the original video was a Peeping Tom crime that criminals are now exploiting to infect PCs. mark for My Articles similar articles
InternetNews
August 13, 2009
Craiglist, AutoCAD Threats Show Virus Variety Malware authors continue showing their creativity, with new viruses making the rounds by targeting Craigslist fans and AutoCAD users. mark for My Articles similar articles
InternetNews
March 16, 2009
Alex Goldman
Report Says Spam Arms Race Escalating The bad guys are recovering from the loss of McColo and learning how to prevent being taken down so easily again. mark for My Articles similar articles
Wired
November 2006
Scott Berinato
Attack of the Bots The latest threat to the Net: autonomous software programs that combine forces to perpetrate mayhem, fraud, and espionage on a global scale. How one company fought the new Internet mafia - and lost. mark for My Articles similar articles
InternetNews
November 20, 2009
Symantec's 'Unlucky 13' Security Trends for 2010 Hackers and malware purveyors are becoming more sophisticated, meaning computer users need to become wiser and more proactive, too. mark for My Articles similar articles
PC Magazine
January 1, 2011
Larry Seltzer
Computer Security: How It Looks for 2011 Here are what security vendors predict for 2011. mark for My Articles similar articles
InternetNews
October 3, 2007
Andy Patrizio
Symantec Adds Bot Hunting to Managed Services By using a traceback method, Symantec can look for hidden botnets within a corporate network. mark for My Articles similar articles
InternetNews
May 25, 2007
Andy Patrizio
IPv4 Addresses Expected To Run Out In 2010 Groups giving out IP addresses say we're going to come up short in about in about three years. mark for My Articles similar articles
Reason
July 2003
Jesse Walker
The Big Block Last year Pennsylvania passed a bill to crack down on child pornography online. The cause was uncontroversial, but the law's approach -- requiring Internet Service Providers to block Web sites based on their Internet Protocol addresses -- drew immediate criticism from the technology community. mark for My Articles similar articles
InternetNews
November 14, 2005
Jim Wagner
Postini And The On-Again, Off-Again Spam List Postini briefly found itself on the Spamhaus Project's block list after a recent e-mail campaign, resurrecting the debate over DNS-based Blackhole Lists. mark for My Articles similar articles
PC Magazine
August 7, 2009
Lance Ulanoff
Twitter's Down and It's All Your Fault The micro-blogging service's difficulties are troubling. Why it's suffering through a DDoS attack is even more upsetting. mark for My Articles similar articles
InternetNews
May 25, 2007
Andy Patrizio
Standards Group OKs E-Mail Validation Spec The Internet Engineering Task Force has adopted a vendor-developed specification designed to detect e-mail with bogus header information. The technology could help reduce spam and phishing attacks that clog Internet traffic. mark for My Articles similar articles
Popular Mechanics
March 2008
Joel Johnson
How to Configure Wireless Routers With IP Addresses: Tech Clinic How IP addresses are assigned. mark for My Articles similar articles
InternetNews
September 25, 2009
Twitter URLs Again Under Siege by Hackers Hackers are taking advantage of the popular microblogging site's limitations to spread malware. mark for My Articles similar articles
PC Magazine
June 20, 2007
Larry Seltzer
Beware Windows Hactivation Threat A new Trojan horse masquerading as a Windows security check is wreaking havoc on PCs. Find out how you can keep your system safe. mark for My Articles similar articles
BusinessWeek
June 16, 2011
Christopher S. Stewart
FireEye: Botnet Busters When Microsoft and Pfizer got fed up with the nastiest junk e-mail blaster on the Web, they called Silicon Valley's cybercrime vigilante. mark for My Articles similar articles
InternetNews
January 25, 2011
ICQ Users Fend Off Fake AV Campaign A new scareware scam is taking flight on ICQ, attempting to infect users' PCs and mobile devices while selling them a bill of goods. mark for My Articles similar articles
InternetNews
October 1, 2009
Internet Never More Dangerous: Study Report finds a 585 percent spike in fake anti-malware and security software programs in the first half of 2009. mark for My Articles similar articles
Scientific American
June 2009
Michael Moyer
What Conficker Reveals About Internet Crime The worm exposes the sophisticated international criminal networks behind modern computer viruses mark for My Articles similar articles
InternetNews
March 18, 2010
Stuart J. Johnston
What Microsoft Learned From Botnet Takedown Even software giant Microsoft had trouble corralling the Waledac malware-spreading botnight. mark for My Articles similar articles
National Defense
October 2009
Jean & Erwin
Research Detects Spamming Attacks Researchers at Microsoft have developed a system to detect botnet attacks on Web email providers mark for My Articles similar articles
InternetNews
June 13, 2006
Andy Patrizio
New Means To Root Out Malware Malware continues to be a problem for customers, with many users unaware their systems are infected with some kind of hidden "bot" that steals their personal info or hijack's their computer. mark for My Articles similar articles
InternetNews
March 3, 2010
Mariposa Hackers Busted in Giant Botnet Scam Three Spanish hackers believed to be responsible for using a botnet to steal log-in credentials and customer banking data were arrested following a multinational investigation. mark for My Articles similar articles
InternetNews
November 19, 2007
Andy Patrizio
Hackers Abuse Domain-Name Trust Cyber criminals have devised a new twist on the misspelled domain-name trick by hijacking IP addresses. mark for My Articles similar articles
InternetNews
January 26, 2009
Richard Adhikari
Spammers Working to Regain Lost Ground Businesses can expect more malware this year as the spammers recover from the McColo take-down. mark for My Articles similar articles
InternetNews
November 17, 2010
Stuxnet, Mobile Threats Top 3Q Malware Report Security software vendor McAfee's 3Q Threats Report takes note of some older malware scams from the past and some new and discouraging new ones. mark for My Articles similar articles
HBS Working Knowledge
March 16, 2009
Sean Silverthorne
When the Internet Runs Out of IP Addresses Experts predict that within three years we will see the last of new Web addresses. What will happen then? Harvard Business School professor Ben Edelman has a solution. mark for My Articles similar articles
InternetNews
July 7, 2009
Alex Goldman
Symantec: USB Keys Threaten the Enterprise As criminals innovate to attack PCs, Symantec promised to continue to fight them. mark for My Articles similar articles