Similar Articles |
|
InternetNews October 27, 2010 |
Malware Scams Pick Up In Retail Sector Targeted attacks are becoming more and more common as hackers seek out specific individuals or groups to steal proprietary information. |
PC Magazine September 23, 2008 Matthew D. Sarrel |
A Day in the Life of a Web 2.0 Hacker They harvest data about you, your family, your friends, and your work directly from the Web apps you use and the sites you visit. Here's how they do it. |
InternetNews March 3, 2009 Richard Adhikari |
Digg Hackers Strike Next at YouTube Attacks are on the rise, with malware authors dabbling in spreading worms and scareware via comments. |
CRM May 2007 Barton Goldenberg |
A CRM Initiative's Bermuda Triangle Two best practice suggestions for preventing -- permanently -- CRM user-adoption disappearance. |
InternetNews June 11, 2010 |
Symantec Warns of Latest World Cup Malware Researchers at software-security firm detect a two-pronged malware attack targeting executives at major Brazilian firms, using the World Cup as a lure. |
Search Engine Watch January 20, 2010 Jason King |
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. |
InternetNews December 30, 2009 |
Malware Targeting Adobe, Social Sites in 2010 Security player McAfee runs down its picks for malware creators' highest-priority targets in the coming year. |
InternetNews June 2, 2010 |
Blackhat SEO Scam Hits Mop.com Gaming Site One of the world's most popular online gaming sites is under siege from a creative malware scam that attempts to swindle players' personal information and gaming credits. |
InternetNews January 14, 2010 |
McAfee Fingers Microsoft IE Flaw in Google Attack McAfee's researchers say 'Operation Aurora' used a zero-day vulnerability in Microsoft's browser software to penetrate Google's networks. |
InternetNews January 18, 2011 |
Attack Toolkits Spark New Malware Strains Do-it-yourself malware kits are all the rage online and they're making life much easier for cyber-criminals looking to turn a quick buck. |
Wall Street & Technology October 23, 2007 Melanie Rodier |
Financial Firms Continue to Struggle to Plug Security Loopholes New technologies, such as pattern analysis, as well as awareness and training can help financial services firms keep hackers at bay. |
InternetNews February 25, 2010 |
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. |
InternetNews March 21, 2011 Sean Michael Kerner |
Detecting Malware Without Software? New service from Trusteer can pinpoint remote malware running on client PCs. |
InternetNews February 11, 2009 Richard Adhikari |
Spammers Hijack Facebook Group of 1.5 Million Facebook site is taken over by get-rich-quick and other familiar spam. |
InternetNews June 4, 2010 |
Hackers Zero In On Execs With World Cup Scam A flurry of malware scams are using e-mails related to the upcoming World Cup to target executives at companies and organizations around the world. |
InternetNews November 17, 2010 |
Stuxnet, Mobile Threats Top 3Q Malware Report Security software vendor McAfee's 3Q Threats Report takes note of some older malware scams from the past and some new and discouraging new ones. |
InternetNews February 25, 2010 |
Malware Thrives Despite Improved Security: IBM Security researchers at IBM's X-Force find 6,601 new software vulnerabilities in 2009, down 11 percent from last, but that hasn't stopped hackers and phishers from finding new ways to rip off consumers. |
Home Theater April 1, 2010 Mark Fleischmann |
Smart Meters Maybe Not So Smart Security holes may let hackers steal your juice. |
InternetNews January 29, 2010 |
Another Bogus Virus Warning Disrupts Facebook The clever scam had Facebook users sharing and posting the bogus virus alert throughout the social networking site. |
InternetNews March 25, 2010 |
Symantec: China Is Tops in Targeted Malware Symantec's latest report pinpoints China as the leading source of malware tailored to hoodwink execs in specific industries. |
InternetNews January 4, 2008 David Needle |
Wi-Fi Networks Face Virus Threat? Unprotected routers could spread malicious software rapidly to thousands of computers. |
InternetNews November 8, 2010 |
Spam Surges 28 Percent in October: AppRiver Hundreds of millions of spam emails were distributed every day in October and most of them originated in the United States. |
PC World June 1, 2008 Erik Larkin |
Web 2.0 Sites a Thriving Marketplace for Malware Malicious software makers are using social networks, video sites, and blogs to peddle their wares to other online criminals. |
InternetNews January 11, 2011 |
ID Theft Scam Targets Coke Fans Here's the latest in a long line of smash-and-grab phishing campaigns is using the soda giant as a lure to steal people's personal information. |
InternetNews August 11, 2010 |
Malware Scams Hit New Peak in First Half Security software vendor McAfee says the number of new pieces of malware circulating on the Internet reached an all-time high in the first six months of this year. |
InternetNews April 27, 2010 |
Passwords Should Be Last Line of Defense Longer passwords with numbers and capitalizations may make life a bit more difficult for identity thieves, but the truth is the relative strength or weakness of users' passwords should be beside the point. |
PC Magazine March 20, 2009 Matthew D. Sarrel |
I Stole My Friend's Identity If you've not yet jumped into the great abyss of social networking, then you haven't created any accounts that can be compromised, and you're safe, right? Not! |
InternetNews April 20, 2010 |
Targeted, DIY Malware Here to Stay: Symantec Symantec's latest threat report provides plenty of disconcerting news for IT managers charged with safeguarding critical enterprise data. |
InternetNews September 21, 2010 |
Microsoft Rushes to Fix Windows Server Flaw Researchers discover a hole in Microsoft's implementation of the Advanced Encryption Standard. |
Bank Technology News April 2007 Michael Dumiak |
Security: Malware Grows Up, Gets Hard To Stop Malware is now coming in a variety of new strains, making it more difficult to locate and repel. |
InternetNews February 23, 2009 Richard Adhikari |
Malware Authors Exploit Facebook App Is a bogus application making the rounds on Facebook just a failed marketing ploy? Or something more dangerous? |
InternetNews July 7, 2010 |
Hackers Snipe Back in Microsoft Security Row Bruised by Microsoft's criticism dismissing the work of third-party security researchers, a band of hackers has begun a campaign to publish proof-of-concept vulnerabilities in the software giant's products. |
CRM January 2004 David Myron |
The Customer-Centric Enterprise True CRM is creating an organization that revolves around its customers. But not just for customers' sake -- for the good of the company as well. |
CIO March 15, 2004 Christopher Lindquist |
Model Hacker Behavior - Under Development Forget about patches. Researchers at the Florida Institute of Technology are looking for ways to fight hackers by modeling their methods, or "exploits." The research could eventually lead to new types of security tools capable of stopping attacks that hackers haven't even invented yet. |
InternetNews June 14, 2010 |
SeaMicro Debuts Novel Cloud-Computing Server SeaMicro emerges from stealth mode with SM1000, a Web server it claims will substantially reduce power consumption by bolting together hundreds of small, efficient CPUs. |
InternetNews December 3, 2010 |
Phony Holiday Tweets Hide Malware Shortened URLs posted on Twitter may not lead to the holiday-themed sites listed. |
InternetNews December 5, 2008 Richard Adhikari |
Latest Facebook Attack Stems from Previous One Businesses with Facebook links must watch out. |
InternetNews February 17, 2009 Sean Gallagher |
Social Networks a Magnet for Malware Just like the crooks robbed the banks because that's where the money is, malware will go where the people are. |
InternetNews August 13, 2010 |
Malware Discovered on Another Red Cross Website The Red Cross of Serbia was targeted by hackers who injected malicious JavaScript files onto several of the organization's web pages. |
InternetNews June 2, 2010 |
Facebook Users Fend Off 'Likejacking' Attacks Hackers looking to take over Web sessions via Facebook are hiding malware under click-inducing, socially engineered links. |
InternetNews December 30, 2009 |
Twitter Blacklists 370 Shoddy Passwords To protect its users from themselves, Twitter is preventing new users from selecting some common or easily hacked passwords for their accounts. |
InternetNews December 28, 2010 |
Security 2010: The Year in Review Stuxnet, embarrassing data leaks and sophisticated phishing attacks dominated the data security landscape in 2010. |
Bank Technology News April 2007 Rebecca Sausner |
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. |
InternetNews August 27, 2010 |
Latest Malware Trap: Bogus Celebrity Deaths After mastering the art of rigging search engine results to spread malware when breaking news and celebrity gossip is trending hot, hackers have decided to just cut out the middleman. |
InternetNews June 11, 2009 Alex Goldman |
Malware Keeps Creeping Onto Mac OS X The Apple Mac is still seeing far fewer attacks than Windows experiences, but researchers say there's a disturbing trend at work. |
InternetNews February 7, 2007 Ed Sutherland |
Internet 'Didn't Crumble' Under DNS Attacks Internet users barely felt a ripple yesterday when hackers launched a concerted attack on several key Domain Name System servers. |
InternetNews July 30, 2004 Ryan Naraine |
'Critical' IE Patch Released Microsoft goes out-of-cycle to fix software flaws that led to last month's malware attack. |