Similar Articles |
|
InternetNews February 25, 2010 |
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. |
PC World February 21, 2007 Ryan Singel |
Zero-Day Malware Attacks You Can't Block No matter how diligently you patch your PC, it may still be vulnerable during the first hours of a previously unseen attack. Here's what you should know about zero-day hazards and the security holes they exploit. |
Bank Technology News April 2007 Rebecca Sausner |
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. |
InternetNews March 31, 2010 |
Vietnamese Activists Hit With Malware: Google As it continues to spar with the Chinese government over Internet censorship, Google warns of an apparently unconnected attack in the region targeting Vietnamese activists. |
Search Engine Watch June 5, 2010 Johnny Widerlund |
Avoiding Online Risks Kicking Off with the 2010 FIFA World Cup Cyber criminals will continue hijacking current news and events to serve malware. A rundown of the most prevalent online security risks, and how to avoid them. |
InternetNews January 27, 2010 |
Cyber Terrorists Target U.S. Oil Industry Three of the world's largest U.S.-based oil and natural gas companies were hoodwinked by an extremely sophisticated malware attack designed to steal key proprietary data related to the whereabouts of new oil reserves. |
InternetNews July 8, 2009 Alex Goldman |
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. |
InternetNews November 29, 2007 Andy Patrizio |
Cyber Crime Grows More Dangerous And Sophisticated McAfee study finds online threats are getting more complex and brazen in what they target, like the U.S. military. |
Registered Rep. May 24, 2011 Lauren Barack |
Cyber-Hackers: Faster, Better Equipped Than You Security should be the responsibility of all employees - not just the chief technology officer, or the principal of an advisory firm. |
InternetNews July 30, 2004 Ryan Naraine |
'Critical' IE Patch Released Microsoft goes out-of-cycle to fix software flaws that led to last month's malware attack. |
InternetNews February 2, 2009 Richard Adhikari |
Are Legitimate Sites the Next Malware Threat? Businesses may be exposing their customers to malware by leaving their sites unpatched, IBM warns in a new study. |
InternetNews July 28, 2004 Ryan Naraine |
Microsoft: Out-of-Cycle Security Patch Coming Due out next week, the patch will fix a software flaw that led to the Download.Ject malware attack. |
InternetNews May 20, 2010 |
South America Emerges As Cybercrime Hotspot China gets all the bad press but it turns out that Luxembourg, the Cayman Islands and a bunch of South American countries are actually the least discriminating when it comes to filtering malware. |
InternetNews August 3, 2010 |
Most Don't Object to Cyber Spying: Report A survey by a prominent security software firm reveals that most people don't mind if the government uses cyber spying techniques to keep tabs on our enemies. |
InternetNews February 24, 2009 Richard Adhikari |
Hackers Pounce on Excel Vulnerability Hackers have launched a new attack that uses a previously undiscovered flaw in Microsoft Excel to target business executives and government agencies. |
National Defense July 2012 Stew Magnuson |
Stopping the Chinese Hacking Onslaught Cyber Command Commander Army Gen. Keith Alexander last year called the cyber-espionage being conducted against U.S. companies the largest transfer of intellectual property from one nation to another in the history of the world. |
InternetNews June 28, 2004 Ryan Naraine |
Malware Attack Thwarted but Danger Lurks Critical IE vulnerability remains unpatched. |
InternetNews March 25, 2010 |
Symantec: China Is Tops in Targeted Malware Symantec's latest report pinpoints China as the leading source of malware tailored to hoodwink execs in specific industries. |
InternetNews February 26, 2009 Richard Adhikari |
Microsoft Clamps Down on Excel Zero-Day Attack Microsoft is taking steps to protect customers from attacks through a zero-day flaw in Microsoft Excel discovered earlier this week. |
InternetNews January 14, 2010 |
McAfee Fingers Microsoft IE Flaw in Google Attack McAfee's researchers say 'Operation Aurora' used a zero-day vulnerability in Microsoft's browser software to penetrate Google's networks. |
InternetNews July 28, 2010 |
Cyberattacks Hit Businesses With Big Bills New study from Ponemon Institute and security vendor ArcSight details rising cost of cyber-attacks, with businesses reporting at least one major attack a week. |
InternetNews January 15, 2010 David Needle |
VeriSign Ties Google Attack to China Government Security firm cite sources claiming hackers acted on official authority from Chinese government. |
InternetNews January 28, 2010 |
IT Managers Brace for a Barrage of Cyber Attacks Despite increased awareness and new state and federal legislation, most enterprise IT managers expect to be victimized by a major cyber attack in the next five years. |
Popular Mechanics April 17, 2008 Joe Pappalardo |
Hack Attack on Tibet Groups Could Hint at China's Anti-U.S. Tactic As Buddhist monks in exile mourn fellow Tibetans killed in the recent conflict with China, U.S.-based nonprofit organizations are facing spam attacks, fake smear campaigns and other threats to digital privacy. |
PC World February 21, 2007 Erik Larkin |
Don't Let Bad Guys Pose as You Flaws let attackers trick a Web site into providing your personal information. |
InternetNews August 20, 2004 Ryan Naraine |
New Download.Ject Attack Hits IM Networks The Download.Ject malware attack has resurfaced, using the popular AIM and ICQ instant messaging networks to spread itself. |
InternetNews February 18, 2009 Richard Adhikari |
Hackers Target IE 7 Browser Again Users who failed to patch their computers after Microsoft released its monthly Patch Tuesday update last week could be in trouble - an Internet Explorer browser vulnerability for which the patch was sent out is under attack again. |
InternetNews January 25, 2010 |
China Says Not Behind Cyber Attacks The alleged Chinese cyber attack on Google and other top U.S. Internet firms - and larger issues of China's Internet censorship - continue to fuel the escalating war of words between U.S. and Chinese officials. |
InternetNews June 22, 2010 |
Botnet Still King of Malware Underworld Latest report from Gartner finds that while more sophisticated malware and phishing scams will proliferate, botnets will still be the top challenge for security experts for the foreseeable future. |
The Motley Fool December 5, 2010 Dean Takahashi. |
WikiLeaks Reveals How Google Was Targeted in China Documents lay bare vast hacking attempts by Chinese leaders. |
InternetNews February 9, 2010 |
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. |
InternetNews June 11, 2009 Alex Goldman |
Malware Keeps Creeping Onto Mac OS X The Apple Mac is still seeing far fewer attacks than Windows experiences, but researchers say there's a disturbing trend at work. |
InternetNews November 20, 2009 |
Symantec's 'Unlucky 13' Security Trends for 2010 Hackers and malware purveyors are becoming more sophisticated, meaning computer users need to become wiser and more proactive, too. |
InternetNews December 17, 2008 Richard Adhikari |
Microsoft Patches IE, But Security Issues Remain As usual, the bad guys are ahead in the tug-of-war over security. |
PC World May 23, 2001 Frank Thorsberg |
Sizing Up Cybervandalism: Thousands Hit Monthly Researchers find debilitating hacker attacks cross borders to hit big and small targets... |
Fast Company Michael Grothaus |
For First Time, Cyber Attack Causes Widespread Electricity Blackout The first known cyber attack to cause widespread public blackouts has occurred in Ukraine, it is believed. |
InternetNews March 6, 2009 Stuart J. Johnston |
Patch Tuesday Won't Fix Excel Hole Microsoft still hasn't patched the Excel hole that leaves users open to attack. |
Information Today February 4, 2013 Paula J. Hane |
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. |
InternetNews May 1, 2006 David Miller |
Zero-Day Attacks an Ongoing Menace Security report from the SANS Institute details biggest Internet vulnerabilities. |
InternetNews January 28, 2009 Richard Adhikari |
Online Trust: A Thing of the Past? Malware attacks are turning the Web upside down, and complicating the efforts of security vendors and users to cope with the threats. |
InternetNews January 12, 2010 |
Google Threatens to Close China Operations Google may abandon China if the government doesn't allow it to operate an unfiltered search engine. |
Fast Company Victor Kotsev |
Why International Cybercrime Is Going To Keep Getting Worse Many countries have devoted cyber warfare units that know how to cover their tracks, and just about every country now has cyber vigilantes and criminals motivated by their own specific needs, missions or grievances. |
InternetNews December 16, 2008 Richard Adhikari |
Several Attacks Behind CheckFree Data Breach The cybercriminals who breached the CheckFree bill paying service last week used a combination attack that may be almost impossible to stop. |
InternetNews January 13, 2010 |
What Happens if Google Quits China? As Google mulls leaving the Chinese market, questions remain about how competitors will react and how the U.S. government might respond. |
InternetNews October 27, 2010 |
Malware Scams Pick Up In Retail Sector Targeted attacks are becoming more and more common as hackers seek out specific individuals or groups to steal proprietary information. |
InternetNews November 23, 2009 |
IBM Outlines Top Security Trends for 2010 IBM's X-Force security team sees cyber crooks getting social and heading for the clouds. |
PC World January 24, 2007 Scott Spanbauer |
Thwart the Three Biggest Internet Threats of 2007 Protect yourself against the three gravest Web dangers: Internet Explorer, phishing attacks, and malware. |
InternetNews September 29, 2010 |
Cyber Storm Simulation Tests Nation's Readiness The three days of simulations sponsored by the Department of Homeland Security, are designed to test the U.S.'s ability to respond to a major attack on its digital infrastructure. |
PC World January 22, 2007 Stuart J. Johnston |
Fix Flaws in Internet Explorer, Windows Media Player Critical patches have recently been released for Internet Explorer, Windows Media Player, Microsoft Word, Adobe Acrobat, and Mac OS X. All are vulnerable to attacks from poisoned files. |
InternetNews February 24, 2009 Richard Adhikari |
Supertoxic Site Infects eWeek.com Hackers attacked news site eWeek through DoubleClick network. |