MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
May 20, 2010
South America Emerges As Cybercrime Hotspot China gets all the bad press but it turns out that Luxembourg, the Cayman Islands and a bunch of South American countries are actually the least discriminating when it comes to filtering malware. mark for My Articles similar articles
InternetNews
August 19, 2010
Security Software Primed for Strong Growth Gartner's latest security software report predicts robust sales growth through 2010 and beyond. mark for My Articles similar articles
InternetNews
December 4, 2009
Enterprises Prefer Private Clouds: Gartner At least, that's for the next several years. But further out, the industry researcher sees even more shifts in the nascent cloud computing market. mark for My Articles similar articles
InternetNews
December 28, 2010
Security 2010: The Year in Review Stuxnet, embarrassing data leaks and sophisticated phishing attacks dominated the data security landscape in 2010. mark for My Articles similar articles
InternetNews
February 9, 2010
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. mark for My Articles similar articles
InternetNews
January 24, 2011
Cloud, Virtualization Driving 2011 IT Spending While the recession still has IT budgets in deep freeze, CIOs in 2011 are turning their resources to new models of computing, including the cloud and virtualized environments. mark for My Articles similar articles
Bank Technology News
December 2010
Michael Sisk
Endgame Systems Finds Botnets in the Cloud Security software provider Endgame Systems raised $29 million in the fall and simultaneously launched ipTrust, a product meant to detect and manage the harm caused by malware and botnets in cloud computing environments mark for My Articles similar articles
InternetNews
May 13, 2010
APWG Fingers 'Avalanche' Phishing Syndicate The Anti-Phishing Working Group says one highly sophisticated and well-organized group of cyber thieves was responsible for a huge spike in phishing attacks late last year. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
InternetNews
January 15, 2010
Larry Barrett
Russia Blamed for 13% of Global Cyber Attacks New report from Akamai awards Russia the dubious distinction of world's leading source of cyber threats. mark for My Articles similar articles
InternetNews
May 13, 2010
One Gang Responsible For Most Phishing Attacks More than two-thirds of all phishing attacks in the second half of 2009 were the work of one gang, according to an anti-phishing group. mark for My Articles similar articles
InternetNews
January 15, 2009
Richard Adhikari
Hackers to Take Aim at the Cloud, Virtualization Malware authors and hackers are looking to take advantage of the newest developments in enterprise technology. mark for My Articles similar articles
InternetNews
November 23, 2009
IBM Outlines Top Security Trends for 2010 IBM's X-Force security team sees cyber crooks getting social and heading for the clouds. mark for My Articles similar articles
InternetNews
April 27, 2009
Alex Goldman
Conficker Awakens With Scareware and Spam The new activity on the Conficker botnet shows that the criminal economy is functioning well. mark for My Articles similar articles
InternetNews
March 18, 2010
Stuart J. Johnston
What Microsoft Learned From Botnet Takedown Even software giant Microsoft had trouble corralling the Waledac malware-spreading botnight. mark for My Articles similar articles
InternetNews
March 25, 2010
Symantec: China Is Tops in Targeted Malware Symantec's latest report pinpoints China as the leading source of malware tailored to hoodwink execs in specific industries. mark for My Articles similar articles
InternetNews
January 28, 2009
Richard Adhikari
Online Trust: A Thing of the Past? Malware attacks are turning the Web upside down, and complicating the efforts of security vendors and users to cope with the threats. mark for My Articles similar articles
InternetNews
June 22, 2010
Cloud Services Boom Well Underway IT research firm Gartner predicts worldwide cloud services revenue will top $63.3 billion this year alone. What's driving the growth? mark for My Articles similar articles
InternetNews
January 26, 2009
Richard Adhikari
Spammers Working to Regain Lost Ground Businesses can expect more malware this year as the spammers recover from the McColo take-down. mark for My Articles similar articles
InternetNews
November 17, 2010
Stuxnet, Mobile Threats Top 3Q Malware Report Security software vendor McAfee's 3Q Threats Report takes note of some older malware scams from the past and some new and discouraging new ones. mark for My Articles similar articles
InternetNews
October 21, 2010
IDC and Gartner Look at Cloud From Two Sides While IDC sees cloud computing as the answer to many of the issues data centers face, Gartner is far less bullish and places the technology in its Hype Cycle. mark for My Articles similar articles
InternetNews
October 1, 2009
Internet Never More Dangerous: Study Report finds a 585 percent spike in fake anti-malware and security software programs in the first half of 2009. mark for My Articles similar articles
InternetNews
December 26, 2008
Richard Adhikari
Enterprise Opportunities & Challenges in 2009 Money-saving technologies will be strong, cybercriminals will rev up and business intelligence solutions will spread. mark for My Articles similar articles
Bank Technology News
January 2010
Tech You Can't Afford to Ignore Gartner recently unveiled its list of "Technologies You Can't Afford to Ignore for 2010," suggesting companies should factor these technologies into their 2010 strategic planning process. mark for My Articles similar articles
InternetNews
July 23, 2010
Enterprise SaaS Surges in 2010: Gartner Businesses are poised to spend more than $8.5 billion this year on cloud and hosted solutions. mark for My Articles similar articles
InternetNews
July 28, 2010
Cyberattacks Hit Businesses With Big Bills New study from Ponemon Institute and security vendor ArcSight details rising cost of cyber-attacks, with businesses reporting at least one major attack a week. mark for My Articles similar articles
InternetNews
July 27, 2010
SaaS to Continue Enterprise Surge: Gartner Latest forecast from IT market research Gartner projects that businesses will continue their transition to service-oriented computing over the next four years. mark for My Articles similar articles
InternetNews
April 20, 2010
Targeted, DIY Malware Here to Stay: Symantec Symantec's latest threat report provides plenty of disconcerting news for IT managers charged with safeguarding critical enterprise data. mark for My Articles similar articles
InternetNews
August 11, 2009
Gartner: Cloud Computing Hype 'Deafening' Cloud computing and service-oriented architectures are transformational technologies that will deliver sweeping changes in IT's focus and capabilities - but while SOA is maturing, IT managers will need to cut through the hype surrounding the cloud if they're to take advantage of it as well. mark for My Articles similar articles
InternetNews
March 5, 2010
Phishers Targeting More Online Brands The latest survey by the Anti Phishing Working Group shows that organized phishing syndicates are working all the angles to get their hands on the most valuable data. mark for My Articles similar articles
InternetNews
August 3, 2010
Most Don't Object to Cyber Spying: Report A survey by a prominent security software firm reveals that most people don't mind if the government uses cyber spying techniques to keep tabs on our enemies. mark for My Articles similar articles
InternetNews
November 20, 2009
Symantec's 'Unlucky 13' Security Trends for 2010 Hackers and malware purveyors are becoming more sophisticated, meaning computer users need to become wiser and more proactive, too. mark for My Articles similar articles
InternetNews
April 2, 2010
Report Tracks the Latest Trends in Cybercrime Sophisticated campaign tracking and dramatically increased use of social networking technologies were two of the top trends in cybercrime in 2009. mark for My Articles similar articles
InternetNews
February 24, 2010
Cyber Attacks Hit 75% of Enterprises in 2009 Symantec's latest report has more unsettling news for IT security administrators. mark for My Articles similar articles
IndustryWeek
February 1, 2009
David Blanchard
Top 10 IT Strategies for 2009 What technologies should manufacturing enterprises be focusing on in the coming years? Virtualization and cloud computing will be among the most frequently heard IT topics in 2009. mark for My Articles similar articles
InternetNews
March 9, 2011
Enterprises Still Refining Hybrid Cloud Model Amid all the talk about cloud computing, the term continues to mean different things to different people, and different businesses are charting their own course. mark for My Articles similar articles
InternetNews
June 14, 2010
CIOs Weigh Cloud's Prospects, Complications CIOs are turning to cloud-based computing options in greater numbers these days but it's still way too early for most to commit completely to an on-demand infrastructure. mark for My Articles similar articles
InternetNews
July 28, 2010
Most Data Breaches Perpetrated by Cyber Gangs Organized crime syndicates, many of them based or operated from outside the U.S., are overwhelmingly to blame for coordinated cyber attacks, according to a study by Verizon and the U.S. Secret Service. mark for My Articles similar articles
InternetNews
March 31, 2010
Vietnamese Activists Hit With Malware: Google As it continues to spar with the Chinese government over Internet censorship, Google warns of an apparently unconnected attack in the region targeting Vietnamese activists. mark for My Articles similar articles
InternetNews
April 9, 2010
Phishers Rev Up IRS Scams for Tax Time With tax season in full swing, online scammers are blanketing the Internet with polished messages posing as the IRS trying to entice users to click on a link that could expose their personal information. mark for My Articles similar articles
InternetNews
November 28, 2006
Ed Sutherland
Google Catches Phishing Flaw in Appliances Security experts are warning the computing world about a new security vulnerability in Google's Search Appliance and Google Mini device that may yield more phishing attacks. mark for My Articles similar articles
InternetNews
November 10, 2004
Susan Kuchinskas
A New Breed of Phish Two exploits launched last week victimized Citibank Australia and SunTrust Bank customers. While SurfControl warned of the exploit, the banks may have been compromised for days. mark for My Articles similar articles
IndustryWeek
August 21, 2009
Josh Cable
Report: Cloud Computing at Peak of its 'Hype Cycle' A Gartner report examining the maturity of technologies and IT trends concludes that cloud computing is among the technologies that are reaching peak levels of hype in 2009. mark for My Articles similar articles
InternetNews
May 18, 2007
Sean Michael Kerner
Estonia Under Russian Cyber Attack? Data by a security research firm clearly shows that a full-scale assault is under way, but the attackers' identity and location is still uncertain. mark for My Articles similar articles
InternetNews
October 20, 2010
IT Spending to Hit $2.5 Trillion in 2011: Gartner Research firm Gartner is out with a cautious forecast for global IT spending, projecting that budgets will inch up 3.1 percent next year, reaching $2.5 trillion. mark for My Articles similar articles
InternetNews
June 29, 2009
Alex Goldman
Botnet Blight: Hacked PCs Create 83.2% of Spam A MessageLabs report finds spammers are hard at work with increasingly sophisticated, attack-resistant botnets. mark for My Articles similar articles
InternetNews
June 4, 2010
Hackers Zero In On Execs With World Cup Scam A flurry of malware scams are using e-mails related to the upcoming World Cup to target executives at companies and organizations around the world. mark for My Articles similar articles
CRM
September 2011
Brittany Farb
Cloud Expected to Keep Rising SaaS revenue will surpass $21 billion by 2015 mark for My Articles similar articles
InternetNews
October 28, 2010
Google Details Fight Against Malware At the SecTOR security conference in Toronto, researcher with the search giant describes Google's efforts to seek out and block malware to protect users online. mark for My Articles similar articles
InternetNews
December 9, 2010
Public Cloud, Virtualization Uptake Slow: Cisco New study from networking giant quantifies global business usage of cloud and virtualization technologies, finding that adoption lags well behind intent. mark for My Articles similar articles