MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
December 31, 2010
Smartphone, Social Threats to Mark 2011 Security As enterprises increasingly embrace popular consumer technology, experts warn of coming threats to social networks and popular devices like the iPhone. mark for My Articles similar articles
InternetNews
January 15, 2009
Richard Adhikari
Hackers to Take Aim at the Cloud, Virtualization Malware authors and hackers are looking to take advantage of the newest developments in enterprise technology. mark for My Articles similar articles
InternetNews
December 2, 2010
Targeted Malware, Spam Will Surge in '11 Security software vendor predicts more malware campaigns will use social media to target mobile devices, apps and industry-specific systems. mark for My Articles similar articles
InternetNews
November 30, 2010
Most New Malware Disappears Within A Day: Study New strains of malware are popping up at an unprecedented rate but, fortunately, most of these variants are stamped out within the first 24 hours. mark for My Articles similar articles
InternetNews
January 28, 2009
Richard Adhikari
Online Trust: A Thing of the Past? Malware attacks are turning the Web upside down, and complicating the efforts of security vendors and users to cope with the threats. mark for My Articles similar articles
InternetNews
February 24, 2010
Cyber Attacks Hit 75% of Enterprises in 2009 Symantec's latest report has more unsettling news for IT security administrators. mark for My Articles similar articles
InternetNews
June 22, 2010
Botnet Still King of Malware Underworld Latest report from Gartner finds that while more sophisticated malware and phishing scams will proliferate, botnets will still be the top challenge for security experts for the foreseeable future. mark for My Articles similar articles
InternetNews
July 28, 2010
Cisco Warns on Enterprise Security Threats In its latest quarterly Global Threat Report, networking giant Cisco outlines a broad-ranging list of threats to enterprise security culled from its various security products. mark for My Articles similar articles
InternetNews
May 20, 2010
South America Emerges As Cybercrime Hotspot China gets all the bad press but it turns out that Luxembourg, the Cayman Islands and a bunch of South American countries are actually the least discriminating when it comes to filtering malware. mark for My Articles similar articles
InternetNews
January 19, 2011
Enterprises Weigh Social Nets' Risks, Rewards New survey by security software firm Sophos reveals most companies allow employees to visit social networking sites despite obvious risks. mark for My Articles similar articles
InternetNews
May 13, 2010
One Gang Responsible For Most Phishing Attacks More than two-thirds of all phishing attacks in the second half of 2009 were the work of one gang, according to an anti-phishing group. mark for My Articles similar articles
InternetNews
December 15, 2010
Hacktivism, Mobile Threats Will Surge in 2011 New report from Panda Security suggests there's plenty for everyone to worry about on the malware front in the coming year - especially if you own a smartphone. mark for My Articles similar articles
InternetNews
October 27, 2010
Malware Scams Pick Up In Retail Sector Targeted attacks are becoming more and more common as hackers seek out specific individuals or groups to steal proprietary information. mark for My Articles similar articles
InternetNews
February 9, 2010
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. mark for My Articles similar articles
InternetNews
June 16, 2005
Tim Gray
Browser-Based Attacks on the Rise Browser-based attacks such as pharming and phishing scams are now the fastest-growing security threat on the Internet. mark for My Articles similar articles
InternetNews
May 13, 2010
APWG Fingers 'Avalanche' Phishing Syndicate The Anti-Phishing Working Group says one highly sophisticated and well-organized group of cyber thieves was responsible for a huge spike in phishing attacks late last year. mark for My Articles similar articles
InternetNews
April 2, 2010
Report Tracks the Latest Trends in Cybercrime Sophisticated campaign tracking and dramatically increased use of social networking technologies were two of the top trends in cybercrime in 2009. mark for My Articles similar articles
Bank Systems & Technology
September 15, 2007
Sharon Gaudin
Number Of Hackers Attacking Banks Jumps 81% Hackers no longer need to be technical wizards to set up an operation to steal people's banking information and then rob their accounts. mark for My Articles similar articles
InternetNews
October 6, 2010
Zeus Phishing Scam Targets iTunes Users In a scam likely stemming from Eastern Europe, hackers are targeting visitors to Apple's iTunes music store with an unsolicited email directing them to sites carrying the Zeus Trojan malware. mark for My Articles similar articles
InternetNews
November 29, 2007
Andy Patrizio
Cyber Crime Grows More Dangerous And Sophisticated McAfee study finds online threats are getting more complex and brazen in what they target, like the U.S. military. mark for My Articles similar articles
InternetNews
December 26, 2008
Richard Adhikari
Enterprise Opportunities & Challenges in 2009 Money-saving technologies will be strong, cybercriminals will rev up and business intelligence solutions will spread. mark for My Articles similar articles
InternetNews
March 3, 2009
Richard Adhikari
Digg Hackers Strike Next at YouTube Attacks are on the rise, with malware authors dabbling in spreading worms and scareware via comments. mark for My Articles similar articles
InternetNews
March 27, 2008
Judy Mottl
Mobile Device Threats on The Way Experts say it's only a matter of time until hackers and virus makers turn their attention to mobile tools -- and enterprises are unprepared. mark for My Articles similar articles
InternetNews
December 30, 2009
Malware Targeting Adobe, Social Sites in 2010 Security player McAfee runs down its picks for malware creators' highest-priority targets in the coming year. mark for My Articles similar articles
InternetNews
March 30, 2010
IBM to Help Defend FAA From Cyber Attacks IBM will test a new system to monitor and safeguard the FAA's networks against hackers, data theft and malware. mark for My Articles similar articles
InternetNews
September 27, 2010
Stuxnet Worm Infests Iranian Nuclear Plant The aggressive and decidedly crafty Stuxnet worm has struck Iran's first nuclear power facility, government officials said Monday. mark for My Articles similar articles
InternetNews
June 4, 2010
Hackers Zero In On Execs With World Cup Scam A flurry of malware scams are using e-mails related to the upcoming World Cup to target executives at companies and organizations around the world. mark for My Articles similar articles
InternetNews
January 18, 2011
Attack Toolkits Spark New Malware Strains Do-it-yourself malware kits are all the rage online and they're making life much easier for cyber-criminals looking to turn a quick buck. mark for My Articles similar articles
InternetNews
February 17, 2009
Sean Gallagher
Social Networks a Magnet for Malware Just like the crooks robbed the banks because that's where the money is, malware will go where the people are. mark for My Articles similar articles
InternetNews
March 4, 2010
Cyber Threats Pit Privacy Versus Security Security experts are torn between just how far the government and the private sector should go to protect critical data from would-be cyber criminals without violating individual rights. mark for My Articles similar articles
InternetNews
January 24, 2006
Sean Michael Kerner
IBM: Users Are The Weak Link in Security IBM is warning in a new report that, though widespread virus outbreaks are on the decline, on the whole online attacks are expected to rise in 2006. The culprit? Highly targeted attacks that rely on naive users to help perpetrate cybercrimes. mark for My Articles similar articles
InternetNews
June 2, 2010
Blackhat SEO Scam Hits Mop.com Gaming Site One of the world's most popular online gaming sites is under siege from a creative malware scam that attempts to swindle players' personal information and gaming credits. mark for My Articles similar articles
InternetNews
November 9, 2010
USB Devices Pose New Security Threats Portable drives and storage devices are a leading source of malware, according to one security software developer. mark for My Articles similar articles
InternetNews
June 17, 2010
Microsoft Wants to Lead Cloud Privacy Charge The rise of cloud-based computing options has everyone scrambling to stake their claim. Microsoft, for now, says it wants to be a leader in protecting people and their data's privacy. mark for My Articles similar articles
InternetNews
May 14, 2010
Facebook's Become a Phisher's Playground Facebook has plenty of security problems of its own making to resolve and, in the interim, professional cyber-thieves are exploiting other vulnerabilities. mark for My Articles similar articles
InternetNews
November 20, 2009
Symantec's 'Unlucky 13' Security Trends for 2010 Hackers and malware purveyors are becoming more sophisticated, meaning computer users need to become wiser and more proactive, too. mark for My Articles similar articles
InternetNews
May 19, 2010
'Lost' Finale Gives Cyber Crooks New Bait With the end of the popular ABC drama, hackers are exploiting viewers' interest to spread all sorts of malware. mark for My Articles similar articles
InternetNews
October 25, 2007
Sean Michael Kerner
How to Fight The Onslaught of Security Threats One message at Interop today? When it comes to data security, it's better to first figure out what to secure. mark for My Articles similar articles
InternetNews
March 25, 2010
Symantec: China Is Tops in Targeted Malware Symantec's latest report pinpoints China as the leading source of malware tailored to hoodwink execs in specific industries. mark for My Articles similar articles
InternetNews
December 14, 2010
Lisa Phifer
Top 10 Mobile Risks to Avoid During Holidays Between online shopping and checking in at work, the holiday season presents a number of security risks for smartphone users. mark for My Articles similar articles
InternetNews
April 20, 2010
Hackers Breached Google's Password Hub: Report New report cites source close to investigation claiming that hackers in China were able to compromise the password service that acts as gateway to Google's Web products and services. mark for My Articles similar articles
InternetNews
February 11, 2009
Richard Adhikari
Spammers Hijack Facebook Group of 1.5 Million Facebook site is taken over by get-rich-quick and other familiar spam. mark for My Articles similar articles
InternetNews
November 2, 2010
HP's Details Hybrid Approach to Cloud Services HP has an "Instant-On" vision of how cloud services can enhance the traditional data center infrastructure. mark for My Articles similar articles
The Motley Fool
January 6, 2010
Tim Beyers
Adobe: Now More Popular Than Microsoft Adobe's technologies could become as much a target for hackers as Microsoft's Office suite, BusinessWeek reports. mark for My Articles similar articles
IndustryWeek
December 16, 2010
Are You Prepared for BusiLeaks? Mobile workforces, cloud computing and social networking pose significant threats to IT security. mark for My Articles similar articles
InternetNews
December 16, 2010
Survey: 1 in 4 Users Shuts Off AV Software Despite the threat of identity theft and malware, a new survey finds that 25 percent of Internet users disable their security software to improve performance. mark for My Articles similar articles
InternetNews
August 13, 2010
CA's Cloud Computing Biz Grows With 4Base With the acquisition of 4Base, CA said it's better positioned to address enterprise interest in cloud computing and virtualization services. mark for My Articles similar articles
InternetNews
June 29, 2010
McAfee Rolls Out SaaS Cloud Security Suite With its latest offering, SaaS Web Protection, security vendor McAfee is aiming to deliver a cloud-based software portfolio to combat malware and other online threats. mark for My Articles similar articles
InternetNews
January 14, 2010
Mobile Security Software Set to Take Off Analyst firm ABI Research projects boom times ahead for wireless security products as smartphones become more popular on-ramps to the Internet. mark for My Articles similar articles
InternetNews
February 25, 2010
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. mark for My Articles similar articles