MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Investment Advisor
June 2008
Irace & Mehta
Security in a New Age How to protect your firm from 21st century online criminals mark for My Articles similar articles
PC World
August 2006
Andrew Brandt
The 10 Biggest Security Risks You Don't Know About Hackers, scammers, and identity thieves are constantly coming up with new ways to attack your PC and your privacy. Here are the newest perils and how to foil them. mark for My Articles similar articles
PC World
February 21, 2007
Ryan Singel
Zero-Day Malware Attacks You Can't Block No matter how diligently you patch your PC, it may still be vulnerable during the first hours of a previously unseen attack. Here's what you should know about zero-day hazards and the security holes they exploit. mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
Registered Rep.
May 24, 2011
Lauren Barack
Cyber-Hackers: Faster, Better Equipped Than You Security should be the responsibility of all employees - not just the chief technology officer, or the principal of an advisory firm. mark for My Articles similar articles
PC Magazine
June 22, 2004
Robert P. Lipschutz
Business Security Our buying guide sorts out the technologies and explains the best ways to protect yourself. mark for My Articles similar articles
Popular Mechanics
February 2006
Brian Krebs
It's 10 PM. Do You Know Where Your Identity Is? Global identity thieves may know their way around your computer better than you do. Learn how to protect yourself in the scary new world of zombies, RATs, Trojan horses and evil twins. mark for My Articles similar articles
PC Magazine
February 1, 2006
Cade Metz
The Sorry State of Security Time to face facts: when it comes to our online safety woes, everybody is to blame. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
InternetNews
February 2, 2009
Richard Adhikari
Are Legitimate Sites the Next Malware Threat? Businesses may be exposing their customers to malware by leaving their sites unpatched, IBM warns in a new study. mark for My Articles similar articles
Entrepreneur
April 2004
Bender, Clancy, & Kooser
Secure Horizons Are worries about spam, viruses and hackers keeping you up at night? Our Internet security guide will help you protect the future of your business so you can sleep soundly. mark for My Articles similar articles
Financial Planning
May 1, 2010
Joel P. Bruckenstein
Doing Battle Because security threats are constantly evolving, advisors must stay on top of the latest developments if they are to protect their firms and clients. mark for My Articles similar articles
PC World
January 24, 2007
Scott Spanbauer
Thwart the Three Biggest Internet Threats of 2007 Protect yourself against the three gravest Web dangers: Internet Explorer, phishing attacks, and malware. mark for My Articles similar articles
InternetNews
November 20, 2009
Symantec's 'Unlucky 13' Security Trends for 2010 Hackers and malware purveyors are becoming more sophisticated, meaning computer users need to become wiser and more proactive, too. mark for My Articles similar articles
PC Magazine
November 29, 2006
Robert Lemos
Hacking for Dollars Viruses and worms are so last-decade. Today's PC users have to worry more about online burglary than stolen bandwidth. mark for My Articles similar articles
InternetNews
December 16, 2008
Richard Adhikari
Several Attacks Behind CheckFree Data Breach The cybercriminals who breached the CheckFree bill paying service last week used a combination attack that may be almost impossible to stop. mark for My Articles similar articles
T.H.E. Journal
February 2009
John K. Waters
IT Security: Target: The Web No longer focused on the network, hackers have a bull's eye now trained squarely on web-based applications. What, if anything, can school districts do to thwart them? mark for My Articles similar articles
InternetNews
February 20, 2009
Richard Adhikari
Attack Preys on New Adobe Acrobat Vulnerability Experts warn businesses and government agencies on the latest flaw uncovered in one of Adobe's popular applications. mark for My Articles similar articles
InternetNews
February 24, 2010
Cyber Attacks Hit 75% of Enterprises in 2009 Symantec's latest report has more unsettling news for IT security administrators. mark for My Articles similar articles
BusinessWeek
September 9, 2009
Stephen H. Wildstrom
Microsoft's Security Essentials Hits Back at Hackers The free new antivirus software is simple to install and operated without a hitch, an important step toward better computer security for Windows users. mark for My Articles similar articles
Chemistry World
June 10, 2015
Emma Stoye
Security experts warn chemical plants are vulnerable to cyber-attacks Security experts are warning that the computers controlling machinery in chemical plants, power stations and other critical infrastructure are vulnerable to attacks from hackers. mark for My Articles similar articles
Bank Systems & Technology
September 30, 2009
Maria Bruno-Britz
At Least One Part of the Economy is Growing: Cybercrime Several studies are showing growth in new techniques designed to trick users and even anti-virus programs to gain access to personal data. mark for My Articles similar articles
InternetNews
April 8, 2008
Andy Patrizio
Malware Problem Shows no Sign of Slowing It's easier than ever to write a phishing virus that looks like a Facebook app thanks to virus writer's toolkits, Symantec finds. mark for My Articles similar articles
PC World
September 1, 2000
Jeff Sengstack
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. mark for My Articles similar articles
InternetNews
December 7, 2005
Roy Mark
Consumers Whistling Past the Security Graveyard Less than 20 percent of American home computers are adequately protected against viruses, spyware, hackers and other security threats. Nevertheless, an overwhelming majority of users believe they are safe from an attack. mark for My Articles similar articles
PC Magazine
August 20, 2008
Matthew D. Sarrel
There's a Bot in Your PC Aiding the rise of blended threats around the world, botnets are digging in and using your network as a base of operations. mark for My Articles similar articles
InternetNews
April 27, 2009
Alex Goldman
Conficker Awakens With Scareware and Spam The new activity on the Conficker botnet shows that the criminal economy is functioning well. mark for My Articles similar articles
InternetNews
August 13, 2010
Malware Discovered on Another Red Cross Website The Red Cross of Serbia was targeted by hackers who injected malicious JavaScript files onto several of the organization's web pages. mark for My Articles similar articles
PC World
June 2004
Mary Landesman
Bigger Threats, Better Defense Tests of 16 security tools, including firewalls, antivirus software, and anti-spyware programs, that aim to foil worms, viruses, spies, and hackers. mark for My Articles similar articles
Search Engine Watch
June 5, 2010
Johnny Widerlund
Avoiding Online Risks Kicking Off with the 2010 FIFA World Cup Cyber criminals will continue hijacking current news and events to serve malware. A rundown of the most prevalent online security risks, and how to avoid them. mark for My Articles similar articles
Wall Street & Technology
January 5, 2005
David Tan
Combating Blended Threats Security experts agree that blended threats will continue to grow in frequency, complexity and severity. mark for My Articles similar articles
PC World
September 26, 2007
Erik Larkin
Five of the Dirtiest Malware Tricks From disguising applets to look like part of Windows to co-opting security tools, Web crooks use a variety of methods to bypass your system's safeguards. mark for My Articles similar articles
InternetNews
April 16, 2009
Alex Goldman
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. mark for My Articles similar articles
InternetNews
January 15, 2009
Richard Adhikari
Hackers to Take Aim at the Cloud, Virtualization Malware authors and hackers are looking to take advantage of the newest developments in enterprise technology. mark for My Articles similar articles
CFO
October 1, 2004
Russ Banham
The Enemy Within When it comes to combating worms, Trojan horses, and viruses, technology alone is not enough. Human error can undo almost any firewall or safeguard. Yet in some cases the fixes are remarkably simple. mark for My Articles similar articles
CFO
January 30, 2004
Esther Shein
Spy vs. Spy Companies are spending billions on network security, but staying ahead of hackers may be a pipe dream. mark for My Articles similar articles
T.H.E. Journal
December 2002
Vincent Weafer
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous. mark for My Articles similar articles
Information Today
February 2001
Marshall Breeding
A Prescription for Computer Health We finished the year with little to no damage to our computer systems. Read on to learn more about how to develop a successful strategy for computing in an increasingly dangerous world... mark for My Articles similar articles
Scientific American
June 2009
Michael Moyer
What Conficker Reveals About Internet Crime The worm exposes the sophisticated international criminal networks behind modern computer viruses mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
Bank Systems & Technology
February 18, 2010
Penny Crosman
Q&A: Alex Cox, Discoverer of Today's Massive Botnet Attack Data security expert Alex Cox tells how banks can protect themselves against the Kneber botnet he discovered, which has infected 75,000 computers at 2,500 organizations around the world, and which is still active. mark for My Articles similar articles
InternetNews
January 28, 2009
Richard Adhikari
Online Trust: A Thing of the Past? Malware attacks are turning the Web upside down, and complicating the efforts of security vendors and users to cope with the threats. mark for My Articles similar articles
PC World
December 31, 2007
Erik Larkin
Malware Evolving Too Fast for Antivirus Apps Bad guys use sophisticated testing to create malware that can evade even the best security programs. mark for My Articles similar articles
PC World
March 2006
Andrew Sullivan
Programs in Peril Popular applications have more security flaws than Windows does. mark for My Articles similar articles
PC Magazine
February 2, 2005
Robert P. Lipschutz
Lock Down Your Network When it comes to security, small and midsize businesses (SMBs) often find themselves in an uncomfortable position. They share many of the same security fears that threaten multinational enterprises. mark for My Articles similar articles
InternetNews
June 11, 2009
Alex Goldman
Malware Keeps Creeping Onto Mac OS X The Apple Mac is still seeing far fewer attacks than Windows experiences, but researchers say there's a disturbing trend at work. mark for My Articles similar articles
InternetNews
September 17, 2007
Andy Patrizio
Have We Reached The End Of The Virus? Not quite. The old-fashioned virus infestation is fading as the biggest nuisance for computer users in favor of Trojans, Symantec's new malware study finds. mark for My Articles similar articles
PC Magazine
December 20, 2006
Robert Lemos
The New Security Threats More secure operating systems mean that attackers are looking elsewhere for holes to sneak through. mark for My Articles similar articles
InternetNews
July 7, 2009
Alex Goldman
Symantec: USB Keys Threaten the Enterprise As criminals innovate to attack PCs, Symantec promised to continue to fight them. mark for My Articles similar articles
PC Magazine
September 23, 2008
Matthew D. Sarrel
A Day in the Life of a Web 2.0 Hacker They harvest data about you, your family, your friends, and your work directly from the Web apps you use and the sites you visit. Here's how they do it. mark for My Articles similar articles