MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
March 25, 2008
Sean Michael Kerner
Report: 90% of Web Sites Vulnerable to Hackers New study claims Cross-Site Scripting attacks are all over the place. Should we be afraid? mark for My Articles similar articles
InternetNews
July 18, 2007
Sean Michael Kerner
Google's Black Box Lemon Google, the company's security team is developing a black box fuzzing tool called Lemon, which is intended to automatically find XSS problems in applications. mark for My Articles similar articles
PC World
August 21, 2006
Andrew Brandt
Privacy Watch: How Bad Guys Exploit Legitimate Sites What you can do to avoid falling for phishers' latest trick. mark for My Articles similar articles
Linux Journal
October 1, 2002
Nuno Loureiro
Programming PHP with Security in Mind Writing code that prevents some common types of attacks is rather easy -- here are some guidelines. mark for My Articles similar articles
InternetNews
September 15, 2008
Richard Adhikari
Hackers Hit BusinessWeek With Malware The BusinessWeek.com site was hit by a SQL injection attack and connects users to a sleeper site. mark for My Articles similar articles
InternetNews
September 28, 2009
Reddit Snuffs Out XSS Worm Social news service Reddit is in the process of recovering from a worm that pummeled the site with malicious comments. mark for My Articles similar articles
InternetNews
December 16, 2008
Sean Michael Kerner
'Shockers' in Cisco's Year-End Security Report But it's what didn't make it into the report that could be even more revealing. mark for My Articles similar articles
InternetNews
February 16, 2011
Cenzic, Dasient Team for Web App Security At annual RSA conference, security vendors Cenzic and Dasient detail a new joint effort that combines their technology to discover and defend against Web application exploits. mark for My Articles similar articles
The Motley Fool
June 13, 2011
Arunava De
Are Hackers the Next Threat to Your Portfolio? Before you respond to a malicious attack on one of your investments in your portfolios, measure the impact that such an attack can have on the company. mark for My Articles similar articles
InternetNews
September 15, 2004
Ryan Naraine
Critical Flaws Flagged in Mozilla, Thunderbird The vulnerabilities could enable malicious people to conduct cross-site scripting attacks, access and modify sensitive information, and compromise a user's system. mark for My Articles similar articles
Search Engine Watch
May 4, 2011
Simon Heseltine
User-Generated URLs: SEO CMS Lessons Learned from Kate Middleton's Jelly Bean Avoid a PR nightmare by protecting your website before someone maliciously decides to put a campaign together that generates links to an incorrect form of your website's URL. mark for My Articles similar articles
InternetNews
February 20, 2009
Richard Adhikari
Group Warns of Top Web 2.0 Security Threats We can't stand in the path of progress with Web 2.0 technologies, but we can make it safer, an industry group says. mark for My Articles similar articles
PC Magazine
February 15, 2006
Robert Lemos
Caught by Phish Falling prey to online identity theft takes only a few minutes, but the cost can be high. mark for My Articles similar articles
T.H.E. Journal
February 2009
John K. Waters
IT Security: Target: The Web No longer focused on the network, hackers have a bull's eye now trained squarely on web-based applications. What, if anything, can school districts do to thwart them? mark for My Articles similar articles
PC World
February 21, 2007
Erik Larkin
Don't Let Bad Guys Pose as You Flaws let attackers trick a Web site into providing your personal information. mark for My Articles similar articles
InternetNews
June 16, 2011
Mesh Injection Attack Claims 30,000 Sites Meshed Web attack emerges that takes a new approach to replication and it may already be a big problem. mark for My Articles similar articles
InternetNews
September 25, 2009
Google's Chrome Frame: Making IE Less Secure? Google disputes Microsoft's claims that Chrome Frame puts users at risk. But they may both be right. mark for My Articles similar articles
InternetNews
July 20, 2004
Ryan Naraine
MasterCard, Others Plug Script Injection Leak Credit card giant MasterCard is among many online financial institutions rushing to fix Web site design security flaws. mark for My Articles similar articles
PC World
March 1, 2002
Joris Evers
PHP Security Flaws Widespread on the Web Scripting language could leave as many as 1 million Web sites vulnerable to attack, researcher says... mark for My Articles similar articles
InternetNews
June 25, 2004
Ryan Naraine
Malware Hacker Attack Linked to Spammers Experts warn that a highly sophisticated malicious hacker attack could turn millions of PCs into spam zombies. Infected IIS web servers are spreading the malicious software to Internet Explorer users. mark for My Articles similar articles
InternetNews
April 14, 2004
Wagner & Naraine
Stanford's Linux Supercomputers Compromised A sophisticated password sniffing program called 'John the Ripper' is behind the attacks, but officials don't see coordinated effort. mark for My Articles similar articles
AskMen.com
Branden Peters
How To: Avoid Getting Hacked Thankfully there are several ways to protect your information and identity from malicious attacks. Some are common sense and others require thought and money. mark for My Articles similar articles
Search Engine Watch
November 24, 2010
Gary-Adam Shannon
Black Hat SEO: Killing Your Competition With Google This dirty tactic can easily devalue a competitor's website, resulting in lost income and a catastrophic deindexing, all within days or even hours. mark for My Articles similar articles
PC World
January 28, 2008
Erik Larkin
Hackers Rig Google to Deliver Malware The latest malware trend should prompt you to think twice about the links you click next time you search. mark for My Articles similar articles
InternetNews
August 10, 2004
Ryan Naraine
MS Exchange 5.5 Spoofing Flaw Fixed Moderately critical vulnerability puts users at risk of cross-site scripting and spoofing attacks. mark for My Articles similar articles
InternetNews
November 27, 2007
Sean Michael Kerner
Firefox Fixes Cross-Site Flaws Mozilla developers plug XSS, XSRF and memory vulnerabilities in Firefox browser. mark for My Articles similar articles
InternetNews
December 3, 2010
IBM Refreshes AppScan to Secure Input Validation New release of AppScan platform - version 8 - from IBM targets cross-site scripting and SAL injection vulnerabilities with string analysis for secure coding. mark for My Articles similar articles
InternetNews
April 13, 2004
Sharon Gaudin
Browser-based Attacks 'Surging' Virulent viruses and worms aren't the only things to watch out for. Security analysts say browser-based attacks are escalating in frequency and damage. And now a new study backs up the warnings. mark for My Articles similar articles
InternetNews
March 29, 2011
Is McAfee.com Insecure? Security researchers publicly expose vulnerabilities on McAfee's website. mark for My Articles similar articles
InternetNews
October 28, 2008
Richard Adhikari
Yahoo Tightens HotJobs After Hackers Hit In a move that could have saved thousands of potential victims of identity theft, Yahoo techs have fixed a flaw in it's HotJobs Web site, one of the leading online job sites with thousands of subscribers. mark for My Articles similar articles
InternetNews
July 16, 2004
Ryan Naraine
PHP Zaps Security Leaks The PHP Group patches a pair of potentially serious vulnerabilities in the popular open-source scripting language. mark for My Articles similar articles
InternetNews
October 16, 2007
Andy Patrizio
A New Way to Hack Yourself Core Security Technologies updates its intrusion detection software to simulate outside attacks on your network and see how far the bad guys can get. mark for My Articles similar articles
Science News
April 25, 2009
Science Past From The Issue Of April 25, 1959 There appears to be a strong link between the behavior of a man with regard to his business and social activities and his chances of being a victim of a heart attack. mark for My Articles similar articles
Information Today
October 3, 2011
iCopyright Launches Article Tools + Syndication Plugin iCopyright announced the launch of unique new CMS plugins for WordPress, Drupal, and Joomla. The free plugin can be downloaded and activated in less than 5 minutes, providing any site that publishes copyrighted content with six content monetization tools. mark for My Articles similar articles
PC Magazine
February 14, 2007
Larry Seltzer
PDF Flaw Revealed Adobe Acrobat software lets parameters be passed to the software when a PDF file is opened. Generally speaking, this is helpful... Avoid scams when selling items online... Bank of America Online security update... mark for My Articles similar articles
InternetNews
November 3, 2004
Sean Michael Kerner
More IE Vulnerabilities A trio of vulnerabilities have been reported in recent days, further exposing Microsoft Internet Explorer users to the risk of potential attack from malicious users. The same bug has been reported in Apple's Safari Web browser running on OS X. mark for My Articles similar articles
InternetNews
December 30, 2004
Tim Gray
Trojan Threatens XP Flaw may leave Windows XP vulnerable to attack. mark for My Articles similar articles
CIO
April 15, 2004
Eric Knorr
Guard the Application Layer Firewalls alone are no longer enough to protect your online assets mark for My Articles similar articles
PC World
May 23, 2001
Frank Thorsberg
Sizing Up Cybervandalism: Thousands Hit Monthly Researchers find debilitating hacker attacks cross borders to hit big and small targets... mark for My Articles similar articles
PC World
June 2003
Stuart J. Johnston
Leaky Windows Keep the Hackers Out. Plus: Take care of performance problems caused by the XP service pack. mark for My Articles similar articles
Salon.com
April 4, 2001
Caroline Benner
The phantom cyber-threat We should stop worrying about computer terrorism and learn who our real enemies are... mark for My Articles similar articles
InternetNews
January 29, 2007
Michael Hickins
Microsoft Warns of New Zero-Day Flaw Microsoft is investigating new public reports of limited "zero-day" attacks using a vulnerability in Microsoft Word 2000. mark for My Articles similar articles
Linux Journal
May 1, 2007
Marco Fioretti
Four Cool Ajax Plugins for WordPress Here is how to install and use four dynamite plugins for the WordPress content management system. mark for My Articles similar articles
InternetNews
April 22, 2009
Sean Michael Kerner
Mozilla Firefox 3.0.9 Fixes XSS Flaws Simply refreshing a site is a security risk? mark for My Articles similar articles
InternetNews
August 19, 2004
Ryan Naraine
IE Drag-and-Drop Flaw Warning Researchers warn that fully patched Internet Explorer users remain at risk of PC takeover attacks. mark for My Articles similar articles
InternetNews
May 1, 2006
David Miller
Zero-Day Attacks an Ongoing Menace Security report from the SANS Institute details biggest Internet vulnerabilities. mark for My Articles similar articles
InternetNews
December 10, 2009
Fast-Moving SQL Attack Hits 125,000-Plus Sites Nasty SQL injection attack has ties to a credit card-snatching trojan - and may just be getting started. mark for My Articles similar articles
InternetNews
February 1, 2010
Programming Errors Exacerbate Flash Flaws Foreground Security analyst Mike Bailey's trial-and-error approach to researching Adobe Flash and its security model yields some interesting - and troubling - findings for programmers. mark for My Articles similar articles
PC World
January 24, 2007
Andrew Brandt
Internet Explorer 7 Is Still Not Safe Enough IE 7 is definitely more secure, but phishing and malicious scripting attacks remain a problem. mark for My Articles similar articles
Bank Technology News
July 2008
Rebecca Sausner
Could the U.S. Be the Next Estonia? Gadi Evron, former Israeli Government Internet Security Operations Manager, went to Estonia during the crippling DDOS attacks last May. Here he talks about whether the U.S. is vulnerable to such an attack, and the role banks and home computers play in protecting critical infrastructure. mark for My Articles similar articles