MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
December 29, 2009
Security 2010: What Threats May Come Dawn of a new decade promises a new wave of cybersecurity challenges. mark for My Articles similar articles
InternetNews
April 28, 2010
Hackers Drawn to Cheap, Simplistic Malware Kits Latest security vendor study finds that do-it-yourself malware kits are popping up everywhere online and bringing even more amateur hackers into the fold. mark for My Articles similar articles
InternetNews
April 20, 2010
Targeted, DIY Malware Here to Stay: Symantec Symantec's latest threat report provides plenty of disconcerting news for IT managers charged with safeguarding critical enterprise data. mark for My Articles similar articles
InternetNews
March 25, 2010
Symantec: China Is Tops in Targeted Malware Symantec's latest report pinpoints China as the leading source of malware tailored to hoodwink execs in specific industries. mark for My Articles similar articles
InternetNews
January 14, 2010
McAfee Fingers Microsoft IE Flaw in Google Attack McAfee's researchers say 'Operation Aurora' used a zero-day vulnerability in Microsoft's browser software to penetrate Google's networks. mark for My Articles similar articles
InternetNews
December 15, 2010
Hacktivism, Mobile Threats Will Surge in 2011 New report from Panda Security suggests there's plenty for everyone to worry about on the malware front in the coming year - especially if you own a smartphone. mark for My Articles similar articles
InternetNews
July 28, 2010
Cyberattacks Hit Businesses With Big Bills New study from Ponemon Institute and security vendor ArcSight details rising cost of cyber-attacks, with businesses reporting at least one major attack a week. mark for My Articles similar articles
InternetNews
October 21, 2009
Auto Industry a Spam Magnet: Study Panda Security survey finds that only one-tenth of one percent of all e-mail received by auto industry is legitimate. mark for My Articles similar articles
InternetNews
July 28, 2010
Most Data Breaches Perpetrated by Cyber Gangs Organized crime syndicates, many of them based or operated from outside the U.S., are overwhelmingly to blame for coordinated cyber attacks, according to a study by Verizon and the U.S. Secret Service. mark for My Articles similar articles
InternetNews
February 9, 2010
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. mark for My Articles similar articles
InternetNews
June 26, 2006
Sean Michael Kerner
Is Browsezilla a Malware Magnet? PandaLabs alleges the freely available Browsezilla Web browser intentionally inserts malware onto a user's PC. Browsezilla developers dispute the allegation. mark for My Articles similar articles
InternetNews
January 18, 2011
Attack Toolkits Spark New Malware Strains Do-it-yourself malware kits are all the rage online and they're making life much easier for cyber-criminals looking to turn a quick buck. mark for My Articles similar articles
InternetNews
October 27, 2010
Malware Scams Pick Up In Retail Sector Targeted attacks are becoming more and more common as hackers seek out specific individuals or groups to steal proprietary information. mark for My Articles similar articles
InternetNews
January 15, 2010
Larry Barrett
Russia Blamed for 13% of Global Cyber Attacks New report from Akamai awards Russia the dubious distinction of world's leading source of cyber threats. mark for My Articles similar articles
InternetNews
March 30, 2010
IBM to Help Defend FAA From Cyber Attacks IBM will test a new system to monitor and safeguard the FAA's networks against hackers, data theft and malware. mark for My Articles similar articles
InternetNews
November 30, 2010
Most New Malware Disappears Within A Day: Study New strains of malware are popping up at an unprecedented rate but, fortunately, most of these variants are stamped out within the first 24 hours. mark for My Articles similar articles
InternetNews
March 23, 2010
FBI Underboss Outlines Anatomy of a Cyber Gang As cyber criminals grow ever more sophisticated and organized, law enforcement agencies have had to step up their game to keep pace. One of the top men at the FBI shares what the bureau is doing to combat cyber crime. mark for My Articles similar articles
InternetNews
December 3, 2010
Phony Holiday Tweets Hide Malware Shortened URLs posted on Twitter may not lead to the holiday-themed sites listed. mark for My Articles similar articles
InternetNews
May 19, 2010
'Lost' Finale Gives Cyber Crooks New Bait With the end of the popular ABC drama, hackers are exploiting viewers' interest to spread all sorts of malware. mark for My Articles similar articles
InternetNews
January 29, 2010
Another Bogus Virus Warning Disrupts Facebook The clever scam had Facebook users sharing and posting the bogus virus alert throughout the social networking site. mark for My Articles similar articles
AskMen.com
Bernie Alexander
Cyber Crime: The Wild West, Online Forget about breaking and entering, aggravated assault and armed robbery. Cyber crime is taking over. mark for My Articles similar articles
InternetNews
February 24, 2010
Cyber Attacks Hit 75% of Enterprises in 2009 Symantec's latest report has more unsettling news for IT security administrators. mark for My Articles similar articles
InternetNews
April 23, 2010
SMBs Often a Weak Link in Cyber Security Lax data security and a lack of resources could be exposing small and midsized businesses - and their customers - to risk. mark for My Articles similar articles
InternetNews
November 29, 2007
Andy Patrizio
Cyber Crime Grows More Dangerous And Sophisticated McAfee study finds online threats are getting more complex and brazen in what they target, like the U.S. military. mark for My Articles similar articles
InternetNews
November 23, 2009
IBM Outlines Top Security Trends for 2010 IBM's X-Force security team sees cyber crooks getting social and heading for the clouds. mark for My Articles similar articles
InternetNews
November 23, 2010
Online Security: A Black Friday Shopping Primer Everyone loves the convenience of shopping online but Panda Labs has a few suggestions to keep you and your data safe. mark for My Articles similar articles
InternetNews
May 20, 2010
South America Emerges As Cybercrime Hotspot China gets all the bad press but it turns out that Luxembourg, the Cayman Islands and a bunch of South American countries are actually the least discriminating when it comes to filtering malware. mark for My Articles similar articles
InternetNews
March 3, 2009
Richard Adhikari
Digg Hackers Strike Next at YouTube Attacks are on the rise, with malware authors dabbling in spreading worms and scareware via comments. mark for My Articles similar articles
InternetNews
January 28, 2010
IT Managers Brace for a Barrage of Cyber Attacks Despite increased awareness and new state and federal legislation, most enterprise IT managers expect to be victimized by a major cyber attack in the next five years. mark for My Articles similar articles
InternetNews
August 3, 2010
Most Don't Object to Cyber Spying: Report A survey by a prominent security software firm reveals that most people don't mind if the government uses cyber spying techniques to keep tabs on our enemies. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
InternetNews
July 6, 2006
Sean Michael Kerner
Trojans on The March Is it all Microsoft's fault? One security vendor suggests that users may well want to switch to a less-targeted OS. mark for My Articles similar articles
InternetNews
June 8, 2004
Roy Mark
The Internet: 'A Dirty Mess' Cyberpunk pioneer and writer Bruce Sterling tells Gartner conference digital revolution has been replaced by digital terrorism. mark for My Articles similar articles
InternetNews
August 18, 2010
Facebook Kit Makes Hacking Logins Easy Security software vendor BitDefender says it's found a new malware kit that lets hackers easily access logins and passwords for Facebook and other unsecured credentials. mark for My Articles similar articles
InternetNews
June 22, 2010
Botnet Still King of Malware Underworld Latest report from Gartner finds that while more sophisticated malware and phishing scams will proliferate, botnets will still be the top challenge for security experts for the foreseeable future. mark for My Articles similar articles
Bank Systems & Technology
August 27, 2009
Maria Bruno-Britz
U.S. Small Businesses Are Scammers' New Targets Cyber crooks in Eastern Europe have begun to prey upon smaller companies in their efforts to steal. mark for My Articles similar articles
InternetNews
July 27, 2010
Microsoft: IE8 Thwarted 1B Malware Downloads With Internet Explorer 8, Microsoft set out to build a more secure Web browser, and 16 months into its launch, the company is touting a major security milestone. mark for My Articles similar articles
InternetNews
March 3, 2005
Sean Michael Kerner
Searchmeup Targets Weak PCs A new adware exploit takes advantage of IE LoadImage vulnerability. mark for My Articles similar articles
InternetNews
June 4, 2010
Hackers Zero In On Execs With World Cup Scam A flurry of malware scams are using e-mails related to the upcoming World Cup to target executives at companies and organizations around the world. mark for My Articles similar articles
Information Today
February 4, 2013
Paula J. Hane
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. mark for My Articles similar articles
InternetNews
April 14, 2010
Symantec Debuts New Enterprise Security Apps New security suites aim to better protect businesses' networks from evolving cyber threats. mark for My Articles similar articles
InternetNews
May 13, 2010
APWG Fingers 'Avalanche' Phishing Syndicate The Anti-Phishing Working Group says one highly sophisticated and well-organized group of cyber thieves was responsible for a huge spike in phishing attacks late last year. mark for My Articles similar articles
InternetNews
August 9, 2010
Cisco Unveils Top 10 Web Malware Threats Contaminated websites are still a threat, but Cisco's latest security report suggests that are plenty of other Web-borne malware scams that can cost you or your company dearly. mark for My Articles similar articles
InternetNews
January 4, 2008
David Needle
Wi-Fi Networks Face Virus Threat? Unprotected routers could spread malicious software rapidly to thousands of computers. mark for My Articles similar articles
Bank Technology News
April 2007
Rebecca Sausner
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. mark for My Articles similar articles
InternetNews
February 10, 2006
Roy Mark
DoJ Wants Cyber Crime Stats The Department of Justice is launching its first national survey to measure the prevalence and impact of cyber crime on U.S. businesses. mark for My Articles similar articles
InternetNews
February 2, 2009
Richard Adhikari
Are Legitimate Sites the Next Malware Threat? Businesses may be exposing their customers to malware by leaving their sites unpatched, IBM warns in a new study. mark for My Articles similar articles
InternetNews
November 17, 2009
McAfee Outlines Growing Cyber Warfare Threat McAfee's study finds politically motivated cyber attacks are on the rise internationally. mark for My Articles similar articles
InternetNews
September 10, 2010
Weekly Tally of Malicious Sites Grows to 57,000 Researchers at Panda Security have produced an alarming study, finding that Internet scammers create 57,000 malicious websites each week in an effort to rook unsuspecting Web surfers. mark for My Articles similar articles
InternetNews
June 8, 2010
HP System to Help Air Force Fight Cyber Threats HP's won a contract for a Cyber Control System that will help the Air Force gather strategic information and identify cyber threats. mark for My Articles similar articles