MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
National Defense
December 2011
Stew Magnuson
Defense Department Partners With Industry To Stem Staggering Cybertheft Losses The amount of intellectual property hackers are stealing from U.S. companies and sending to China is said to be staggering. The private sector's crown jewels are being moved off nominally secure networks and transmitted to the Asian nation every day: usually from 9 to 5 -- Beijing time. mark for My Articles similar articles
National Defense
July 2012
Stew Magnuson
U.S. Government Attempts to Thwart Chinese Network Intrusions If the might of the Chinese government -- as many believe -- is behind this massive operation, what can the might of the U.S. government do to help companies facing the onslaught? mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
Bank Technology News
April 2007
Rebecca Sausner
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. mark for My Articles similar articles
CIO
August 27, 2010
Kim S. Nash
Richard Clarke: Your Company Is a Front in a Future Cyberwar Former White House cybersecurity adviser Richard Clarke thinks the government should do more to defend companies against cyber-threats. mark for My Articles similar articles
Information Today
February 4, 2013
Paula J. Hane
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. mark for My Articles similar articles
National Defense
December 2015
Lloyd McCoy Jr.
Defense Department Plays Key Role in Industrial Base Oversight The Defense Department and other federal agencies have been directed to identify and protect critical infrastructure sectors specific to their mission. mark for My Articles similar articles
National Defense
June 2011
Stew Magnuson
When it Comes to Cybersecurity, the 'Who is Responsible for What?' Debate Continues Most experts seem to agree that the U.S. government's collective efforts to secure the Internet from large-scale attacks and other nefarious activities are lacking. mark for My Articles similar articles
The Motley Fool
December 5, 2010
Dean Takahashi.
WikiLeaks Reveals How Google Was Targeted in China Documents lay bare vast hacking attempts by Chinese leaders. mark for My Articles similar articles
National Defense
January 2005
Joe Pappalardo
Homeland Defense Research Agency Directs Attention To Cyber Security Fearing the specter of crippling attacks on government and private sector computer systems, federal officials are stepping up efforts to foil cyber terrorism. mark for My Articles similar articles
National Defense
July 2007
Breanne Wagner
Experts Downplay Imminent Threat of Cyberterrorism U.S. officials are worried about the threat of a terrorist attack against civilian and government computer systems, but experts say any attack by cyber terrorists is likely to be non-debilitating worms and viruses. mark for My Articles similar articles
Searcher
October 2007
Paul S. Piper
Phish Pharming: A Newer, More Profitable Aquaculture Detecting e-mail scams. mark for My Articles similar articles
National Defense
December 2013
Yasmin Tadjdeh
Industry, Military Emphasize Need for 'Cyberwarrior' Training as Attacks Increase Government and military leaders have for years warned of increasingly pervasive and nefarious cyber-attacks. The network intrusions, perpetrated by nation states, hacktivists and thieves, are growing rapidly, experts have said. mark for My Articles similar articles
InternetNews
January 27, 2010
Cyber Terrorists Target U.S. Oil Industry Three of the world's largest U.S.-based oil and natural gas companies were hoodwinked by an extremely sophisticated malware attack designed to steal key proprietary data related to the whereabouts of new oil reserves. mark for My Articles similar articles
National Defense
June 2013
Stew Magnuson
Defense Industrial Base Wary of Cybersecurity Laws That hackers are intent on stealing U.S. trade secrets -- particularly those pertaining to the military -- is a given. That the United States is capable of responding to this threat remains to be seen. mark for My Articles similar articles
InternetNews
February 25, 2010
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. mark for My Articles similar articles
National Defense
November 2012
Erwin et al.
Top Five Threats to National Security in the Coming Decade The next wave of national security threats might be more than the technology community can handle. They are complex, multidimensional problems against which no degree of U.S. technical superiority in stealth, fifth-generation air warfare or night-vision is likely to suffice. mark for My Articles similar articles
National Defense
October 2007
Breanne Wagner
Computer Crimes Keep Government and Industry on the Defensive The complexity of new malicious code and the elusive nature of cyber attackers have become significant impediments to detecting or preventing most intrusions. mark for My Articles similar articles
National Defense
June 2013
Valerie Insinna
Defense Department Infrastructure Still Vulnerable to Cyber-Attacks, Critics Say The Defense Department knows how to fight a kinetic war with bullets, bombs and boots on the ground, but it is still figuring out what a cyberwar would look like and how it would be fought. mark for My Articles similar articles
InternetNews
November 29, 2007
Andy Patrizio
Cyber Crime Grows More Dangerous And Sophisticated McAfee study finds online threats are getting more complex and brazen in what they target, like the U.S. military. mark for My Articles similar articles
InternetNews
January 28, 2010
IT Managers Brace for a Barrage of Cyber Attacks Despite increased awareness and new state and federal legislation, most enterprise IT managers expect to be victimized by a major cyber attack in the next five years. mark for My Articles similar articles
Registered Rep.
August 16, 2013
Lauren Barack
Hackers At The Gate "FINRA expects cyber security to remain a regulatory focus for the foreseeable future," Susan Axelrod, FINRA's executive vice president for Regulatory Operations said at the PLI Seminar in October. mark for My Articles similar articles
National Defense
November 2011
Eric Beidel
Coast Guard Cyberdefense Office: Small but Mighty Like the Army, Navy, Air Force and Marine Corps, the Coast Guard suffers thousands of attacks on its networks each month. mark for My Articles similar articles
National Defense
January 2016
Stephanie Meloni
Defense Department Assuming Growing Cyber Security Role The Defense Department sees cyber as a domain that spans air, land, sea and space, but it struggles with how to handle it as a war fighting domain to best protect the nation. mark for My Articles similar articles
Popular Mechanics
April 17, 2008
Joe Pappalardo
Hack Attack on Tibet Groups Could Hint at China's Anti-U.S. Tactic As Buddhist monks in exile mourn fellow Tibetans killed in the recent conflict with China, U.S.-based nonprofit organizations are facing spam attacks, fake smear campaigns and other threats to digital privacy. mark for My Articles similar articles
National Defense
February 2011
Lawrence P. Farrell Jr.
To Improve Cyber-Security, U.S. Needs Cohesive Public-Private Partnership NDIA member companies recently put together a white paper on the necessity to better acquire and field cyber-capabilities. mark for My Articles similar articles
InternetNews
October 31, 2007
Andy Patrizio
Symantec's Latest: Customized Threat Protection Symantec announced a custom threat analysis and protection service through its Global Services Security Response unit. Managed Threat Analysis, is designed to help companies facing more targeted attacks from criminals looking to steal intellectual property. mark for My Articles similar articles
Popular Mechanics
April 2009
Glenn Derene
How Vulnerable is U.S. Infrastructure to a Major Cyber Attack? The next world war might not start with a bang, but with a blackout. mark for My Articles similar articles
InternetNews
October 27, 2010
Malware Scams Pick Up In Retail Sector Targeted attacks are becoming more and more common as hackers seek out specific individuals or groups to steal proprietary information. mark for My Articles similar articles
Military & Aerospace Electronics
October 2007
John Keller
The importance of military information security Will the the computer and the data network be the aircraft carrier and atomic bomb of the future? mark for My Articles similar articles
BusinessWeek
April 10, 2008
China's Response to BusinessWeek A spokesperson of the Chinese Embassy to the United States responds to questions sent to authorities in Beijing and Washington regarding cyber crimes. mark for My Articles similar articles
National Defense
January 2016
Allyson Versprille
Fragmented Cyber Legislation Hinders Military The patchwork of legislation that allows the U.S. military and government to perform cyber operations is too disjointed to enable an effective and swift response, a former Army officer said. mark for My Articles similar articles
Fast Company
Victor Kotsev
Why International Cybercrime Is Going To Keep Getting Worse Many countries have devoted cyber warfare units that know how to cover their tracks, and just about every country now has cyber vigilantes and criminals motivated by their own specific needs, missions or grievances. mark for My Articles similar articles
National Defense
August 2011
Eric Beidel
Protectors of Critical Networks Look Within For Vulnerabilities The hacker is only one ingredient in a network intrusion. While leaders are rightly concerned about outsiders breaking into their networks, they also realize that their own employees may have as much to do with the next breach as an outsider. mark for My Articles similar articles
InternetNews
January 15, 2010
David Needle
VeriSign Ties Google Attack to China Government Security firm cite sources claiming hackers acted on official authority from Chinese government. mark for My Articles similar articles
Popular Mechanics
January 13, 2010
Glenn Derene
Why China Needs Google More Than Google Needs China Yesterday Google announced that Gmail accounts of Chinese dissidents had been hacked as part of a broad spying operation apparently tied to the Chinese government. mark for My Articles similar articles
InternetNews
February 24, 2010
Cyber Attacks Hit 75% of Enterprises in 2009 Symantec's latest report has more unsettling news for IT security administrators. mark for My Articles similar articles
National Defense
March 2015
Sarah Sicard
North Korean Cyber Attack on Sony Poses Tough Security Questions While cyber attacks are on the rise around the world -- both from inside and outside threats -- this was the first known instance of a country deliberately causing destruction to a U.S. company's data. mark for My Articles similar articles
IndustryWeek
July 1, 2007
Brad Kenney
From ID To IP Theft Manufacturing companies have tended to lag behind the financial, health care and energy industries in the area of information security, even though manufacturers clearly have a lot to lose. mark for My Articles similar articles
Fast Company
Pavithra Mohan
Obama Administration Proposes Sanctions In Retaliation For Chinese Cyberhacks In an effort to curb cyberhacking, the White House is currently developing economic sanctions that would impede the operations of Chinese companies in the U.S., the Washington Post reports. mark for My Articles similar articles
InternetNews
June 2, 2011
Google Blames China for Gmail Hack According to Google, their security systems discovered a phishing campaign that had targeted Gmail in an effort to obtain user passwords. mark for My Articles similar articles
Search Engine Watch
June 5, 2010
Johnny Widerlund
Avoiding Online Risks Kicking Off with the 2010 FIFA World Cup Cyber criminals will continue hijacking current news and events to serve malware. A rundown of the most prevalent online security risks, and how to avoid them. mark for My Articles similar articles
Inc.
April 2007
Dan Briody
Full Coverage How to hedge your cyber risk with insurance. mark for My Articles similar articles
InternetNews
October 8, 2009
FBI Holds Its Own Phish Phry Fed crackdown nets the largest number of defendants ever charged in a cyber crime scam. mark for My Articles similar articles
InternetNews
February 17, 2005
Michael Singer
Cyber Security Heads Grade The System Security groups recommend a more robust partnership between the public and private sectors to protect against cyberspace attacks and physical attacks. mark for My Articles similar articles
CRM
September 2012
Kelly Liyakasa
Cracking the Code on Cyber Crimes Despite efforts to proactively protect customer data, computer intrusions and online fraud are on the rise. mark for My Articles similar articles
The Motley Fool
November 14, 2011
Katie Spence
Cyber Attacks Capable of Crashing the U.S. Economy? With cyber attacks becoming more prevalent, these companies are stepping in to provide solutions. mark for My Articles similar articles
InternetNews
February 17, 2010
When the Cyber Attack Comes, Will We Be Ready? War-game simulation of a massive cyber attack on U.S. infrastructure highlights emergency provisions administration officials might be forced to take. mark for My Articles similar articles
InternetNews
March 31, 2010
Vietnamese Activists Hit With Malware: Google As it continues to spar with the Chinese government over Internet censorship, Google warns of an apparently unconnected attack in the region targeting Vietnamese activists. mark for My Articles similar articles
InternetNews
November 11, 2005
Roy Mark
FBI Hunkered in The Bunker Cyber G-men are responsible for investigating cyber attacks by foreign adversaries and terrorists, and for preventing online criminals from using the Internet to steal, defraud and otherwise victimize U.S. citizens, businesses and communities. mark for My Articles similar articles