Similar Articles |
|
InternetNews December 31, 2010 |
Smartphone, Social Threats to Mark 2011 Security As enterprises increasingly embrace popular consumer technology, experts warn of coming threats to social networks and popular devices like the iPhone. |
InternetNews January 15, 2009 Richard Adhikari |
Hackers to Take Aim at the Cloud, Virtualization Malware authors and hackers are looking to take advantage of the newest developments in enterprise technology. |
InternetNews December 2, 2010 |
Targeted Malware, Spam Will Surge in '11 Security software vendor predicts more malware campaigns will use social media to target mobile devices, apps and industry-specific systems. |
InternetNews November 30, 2010 |
Most New Malware Disappears Within A Day: Study New strains of malware are popping up at an unprecedented rate but, fortunately, most of these variants are stamped out within the first 24 hours. |
InternetNews January 28, 2009 Richard Adhikari |
Online Trust: A Thing of the Past? Malware attacks are turning the Web upside down, and complicating the efforts of security vendors and users to cope with the threats. |
InternetNews February 24, 2010 |
Cyber Attacks Hit 75% of Enterprises in 2009 Symantec's latest report has more unsettling news for IT security administrators. |
InternetNews June 22, 2010 |
Botnet Still King of Malware Underworld Latest report from Gartner finds that while more sophisticated malware and phishing scams will proliferate, botnets will still be the top challenge for security experts for the foreseeable future. |
InternetNews July 28, 2010 |
Cisco Warns on Enterprise Security Threats In its latest quarterly Global Threat Report, networking giant Cisco outlines a broad-ranging list of threats to enterprise security culled from its various security products. |
InternetNews May 20, 2010 |
South America Emerges As Cybercrime Hotspot China gets all the bad press but it turns out that Luxembourg, the Cayman Islands and a bunch of South American countries are actually the least discriminating when it comes to filtering malware. |
InternetNews January 19, 2011 |
Enterprises Weigh Social Nets' Risks, Rewards New survey by security software firm Sophos reveals most companies allow employees to visit social networking sites despite obvious risks. |
InternetNews May 13, 2010 |
One Gang Responsible For Most Phishing Attacks More than two-thirds of all phishing attacks in the second half of 2009 were the work of one gang, according to an anti-phishing group. |
InternetNews December 15, 2010 |
Hacktivism, Mobile Threats Will Surge in 2011 New report from Panda Security suggests there's plenty for everyone to worry about on the malware front in the coming year - especially if you own a smartphone. |
InternetNews October 27, 2010 |
Malware Scams Pick Up In Retail Sector Targeted attacks are becoming more and more common as hackers seek out specific individuals or groups to steal proprietary information. |
InternetNews February 9, 2010 |
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. |
InternetNews June 16, 2005 Tim Gray |
Browser-Based Attacks on the Rise Browser-based attacks such as pharming and phishing scams are now the fastest-growing security threat on the Internet. |
InternetNews May 13, 2010 |
APWG Fingers 'Avalanche' Phishing Syndicate The Anti-Phishing Working Group says one highly sophisticated and well-organized group of cyber thieves was responsible for a huge spike in phishing attacks late last year. |
InternetNews April 2, 2010 |
Report Tracks the Latest Trends in Cybercrime Sophisticated campaign tracking and dramatically increased use of social networking technologies were two of the top trends in cybercrime in 2009. |
Bank Systems & Technology September 15, 2007 Sharon Gaudin |
Number Of Hackers Attacking Banks Jumps 81% Hackers no longer need to be technical wizards to set up an operation to steal people's banking information and then rob their accounts. |
InternetNews October 6, 2010 |
Zeus Phishing Scam Targets iTunes Users In a scam likely stemming from Eastern Europe, hackers are targeting visitors to Apple's iTunes music store with an unsolicited email directing them to sites carrying the Zeus Trojan malware. |
InternetNews November 29, 2007 Andy Patrizio |
Cyber Crime Grows More Dangerous And Sophisticated McAfee study finds online threats are getting more complex and brazen in what they target, like the U.S. military. |
InternetNews December 26, 2008 Richard Adhikari |
Enterprise Opportunities & Challenges in 2009 Money-saving technologies will be strong, cybercriminals will rev up and business intelligence solutions will spread. |
InternetNews March 3, 2009 Richard Adhikari |
Digg Hackers Strike Next at YouTube Attacks are on the rise, with malware authors dabbling in spreading worms and scareware via comments. |
InternetNews March 27, 2008 Judy Mottl |
Mobile Device Threats on The Way Experts say it's only a matter of time until hackers and virus makers turn their attention to mobile tools -- and enterprises are unprepared. |
InternetNews December 30, 2009 |
Malware Targeting Adobe, Social Sites in 2010 Security player McAfee runs down its picks for malware creators' highest-priority targets in the coming year. |
InternetNews March 30, 2010 |
IBM to Help Defend FAA From Cyber Attacks IBM will test a new system to monitor and safeguard the FAA's networks against hackers, data theft and malware. |
InternetNews September 27, 2010 |
Stuxnet Worm Infests Iranian Nuclear Plant The aggressive and decidedly crafty Stuxnet worm has struck Iran's first nuclear power facility, government officials said Monday. |
InternetNews June 4, 2010 |
Hackers Zero In On Execs With World Cup Scam A flurry of malware scams are using e-mails related to the upcoming World Cup to target executives at companies and organizations around the world. |
InternetNews January 18, 2011 |
Attack Toolkits Spark New Malware Strains Do-it-yourself malware kits are all the rage online and they're making life much easier for cyber-criminals looking to turn a quick buck. |
InternetNews February 17, 2009 Sean Gallagher |
Social Networks a Magnet for Malware Just like the crooks robbed the banks because that's where the money is, malware will go where the people are. |
InternetNews March 4, 2010 |
Cyber Threats Pit Privacy Versus Security Security experts are torn between just how far the government and the private sector should go to protect critical data from would-be cyber criminals without violating individual rights. |
InternetNews January 24, 2006 Sean Michael Kerner |
IBM: Users Are The Weak Link in Security IBM is warning in a new report that, though widespread virus outbreaks are on the decline, on the whole online attacks are expected to rise in 2006. The culprit? Highly targeted attacks that rely on naive users to help perpetrate cybercrimes. |
InternetNews June 2, 2010 |
Blackhat SEO Scam Hits Mop.com Gaming Site One of the world's most popular online gaming sites is under siege from a creative malware scam that attempts to swindle players' personal information and gaming credits. |
InternetNews November 9, 2010 |
USB Devices Pose New Security Threats Portable drives and storage devices are a leading source of malware, according to one security software developer. |
InternetNews June 17, 2010 |
Microsoft Wants to Lead Cloud Privacy Charge The rise of cloud-based computing options has everyone scrambling to stake their claim. Microsoft, for now, says it wants to be a leader in protecting people and their data's privacy. |
InternetNews May 14, 2010 |
Facebook's Become a Phisher's Playground Facebook has plenty of security problems of its own making to resolve and, in the interim, professional cyber-thieves are exploiting other vulnerabilities. |
InternetNews November 20, 2009 |
Symantec's 'Unlucky 13' Security Trends for 2010 Hackers and malware purveyors are becoming more sophisticated, meaning computer users need to become wiser and more proactive, too. |
InternetNews May 19, 2010 |
'Lost' Finale Gives Cyber Crooks New Bait With the end of the popular ABC drama, hackers are exploiting viewers' interest to spread all sorts of malware. |
InternetNews October 25, 2007 Sean Michael Kerner |
How to Fight The Onslaught of Security Threats One message at Interop today? When it comes to data security, it's better to first figure out what to secure. |
InternetNews March 25, 2010 |
Symantec: China Is Tops in Targeted Malware Symantec's latest report pinpoints China as the leading source of malware tailored to hoodwink execs in specific industries. |
InternetNews December 14, 2010 Lisa Phifer |
Top 10 Mobile Risks to Avoid During Holidays Between online shopping and checking in at work, the holiday season presents a number of security risks for smartphone users. |
InternetNews April 20, 2010 |
Hackers Breached Google's Password Hub: Report New report cites source close to investigation claiming that hackers in China were able to compromise the password service that acts as gateway to Google's Web products and services. |
InternetNews February 11, 2009 Richard Adhikari |
Spammers Hijack Facebook Group of 1.5 Million Facebook site is taken over by get-rich-quick and other familiar spam. |
InternetNews November 2, 2010 |
HP's Details Hybrid Approach to Cloud Services HP has an "Instant-On" vision of how cloud services can enhance the traditional data center infrastructure. |
The Motley Fool January 6, 2010 Tim Beyers |
Adobe: Now More Popular Than Microsoft Adobe's technologies could become as much a target for hackers as Microsoft's Office suite, BusinessWeek reports. |
IndustryWeek December 16, 2010 |
Are You Prepared for BusiLeaks? Mobile workforces, cloud computing and social networking pose significant threats to IT security. |
InternetNews December 16, 2010 |
Survey: 1 in 4 Users Shuts Off AV Software Despite the threat of identity theft and malware, a new survey finds that 25 percent of Internet users disable their security software to improve performance. |
InternetNews August 13, 2010 |
CA's Cloud Computing Biz Grows With 4Base With the acquisition of 4Base, CA said it's better positioned to address enterprise interest in cloud computing and virtualization services. |
InternetNews June 29, 2010 |
McAfee Rolls Out SaaS Cloud Security Suite With its latest offering, SaaS Web Protection, security vendor McAfee is aiming to deliver a cloud-based software portfolio to combat malware and other online threats. |
InternetNews January 14, 2010 |
Mobile Security Software Set to Take Off Analyst firm ABI Research projects boom times ahead for wireless security products as smartphones become more popular on-ramps to the Internet. |
InternetNews February 25, 2010 |
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. |