MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
Bank Technology News
April 2007
Rebecca Sausner
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. mark for My Articles similar articles
Information Today
February 4, 2013
Paula J. Hane
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. mark for My Articles similar articles
InternetNews
November 29, 2007
Andy Patrizio
Cyber Crime Grows More Dangerous And Sophisticated McAfee study finds online threats are getting more complex and brazen in what they target, like the U.S. military. mark for My Articles similar articles
Fast Company
Michael Grothaus
For First Time, Cyber Attack Causes Widespread Electricity Blackout The first known cyber attack to cause widespread public blackouts has occurred in Ukraine, it is believed. mark for My Articles similar articles
InternetNews
April 8, 2010
Massive Cyber Spy Ring Seen Operating in China New report details the activities of the "Shadow network," a sophisticated group of cyber criminals traced back to China, prompting denial from a state official. mark for My Articles similar articles
National Defense
July 2007
Breanne Wagner
Experts Downplay Imminent Threat of Cyberterrorism U.S. officials are worried about the threat of a terrorist attack against civilian and government computer systems, but experts say any attack by cyber terrorists is likely to be non-debilitating worms and viruses. mark for My Articles similar articles
InternetNews
June 8, 2010
HP System to Help Air Force Fight Cyber Threats HP's won a contract for a Cyber Control System that will help the Air Force gather strategic information and identify cyber threats. mark for My Articles similar articles
National Defense
July 2012
Stew Magnuson
Al-Qaida May Have Plans to Manipulate Anonymous Hacking Group Anonymous, a loosely organized group of hackers that has targeted big businesses and governments, could be co-opted by nation states and terrorist groups that want to use it for their own ends, cybersecurity experts said. mark for My Articles similar articles
InternetNews
August 3, 2010
Most Don't Object to Cyber Spying: Report A survey by a prominent security software firm reveals that most people don't mind if the government uses cyber spying techniques to keep tabs on our enemies. mark for My Articles similar articles
InternetNews
March 25, 2010
Symantec: China Is Tops in Targeted Malware Symantec's latest report pinpoints China as the leading source of malware tailored to hoodwink execs in specific industries. mark for My Articles similar articles
Popular Mechanics
April 17, 2008
Joe Pappalardo
Hack Attack on Tibet Groups Could Hint at China's Anti-U.S. Tactic As Buddhist monks in exile mourn fellow Tibetans killed in the recent conflict with China, U.S.-based nonprofit organizations are facing spam attacks, fake smear campaigns and other threats to digital privacy. mark for My Articles similar articles
National Defense
November 2011
Eric Beidel
Coast Guard Cyberdefense Office: Small but Mighty Like the Army, Navy, Air Force and Marine Corps, the Coast Guard suffers thousands of attacks on its networks each month. mark for My Articles similar articles
InternetNews
June 30, 2009
Kenneth Corbin
Net Ushering in Era of War Without Borders Expert sees a new face of cyber warfare forcing 'some of the hardest national security decisions you'll have to make.' mark for My Articles similar articles
InternetNews
January 21, 2010
Microsoft Serves Up Zero-Day Fix for IE Flaw Microsoft issued a cumulative update for most Internet Explorer versions in order to shore up a gaping security hole that left Google and dozens of other companies open to attack from Chinese hackers. mark for My Articles similar articles
InternetNews
November 17, 2009
McAfee Outlines Growing Cyber Warfare Threat McAfee's study finds politically motivated cyber attacks are on the rise internationally. mark for My Articles similar articles
The Motley Fool
December 5, 2010
Dean Takahashi.
WikiLeaks Reveals How Google Was Targeted in China Documents lay bare vast hacking attempts by Chinese leaders. mark for My Articles similar articles
Fast Company
Daniel Terdiman
AP Report: U.S. Power Grid Subject To Repeated Foreign Hacks The U.S. power grid is subject to being hacked from abroad, and foreign hackers have gained remote access to American power operations about a dozen times over the last decade. mark for My Articles similar articles
InternetNews
January 25, 2010
China Says Not Behind Cyber Attacks The alleged Chinese cyber attack on Google and other top U.S. Internet firms - and larger issues of China's Internet censorship - continue to fuel the escalating war of words between U.S. and Chinese officials. mark for My Articles similar articles
InternetNews
January 15, 2010
David Needle
VeriSign Ties Google Attack to China Government Security firm cite sources claiming hackers acted on official authority from Chinese government. mark for My Articles similar articles
InternetNews
March 23, 2010
Chinese Official Says Google 'Totally Wrong' A Chinese official speaking to state-run news service blasts Google's plan to offer an unfiltered Web to mainland residents by redirecting traffic to its Hong Kong search engine. mark for My Articles similar articles
InternetNews
August 25, 2005
Clint Boulton
China Sites Said Behind U.S. Network Attacks Report says the latest spate of attacks from China-based sites on U.S. government networks raises new concerns. But one analyst wonders about the alarm. mark for My Articles similar articles
InternetNews
January 27, 2010
Is the U.S. Headed for a Cyber War? With cyber threats from abroad coming fast and furious, how serious is the United States about going on the offensive? mark for My Articles similar articles
InternetNews
January 28, 2010
IT Managers Brace for a Barrage of Cyber Attacks Despite increased awareness and new state and federal legislation, most enterprise IT managers expect to be victimized by a major cyber attack in the next five years. mark for My Articles similar articles
National Defense
March 2015
Sarah Sicard
North Korean Cyber Attack on Sony Poses Tough Security Questions While cyber attacks are on the rise around the world -- both from inside and outside threats -- this was the first known instance of a country deliberately causing destruction to a U.S. company's data. mark for My Articles similar articles
National Defense
January 2016
Stephanie Meloni
Defense Department Assuming Growing Cyber Security Role The Defense Department sees cyber as a domain that spans air, land, sea and space, but it struggles with how to handle it as a war fighting domain to best protect the nation. mark for My Articles similar articles
InternetNews
January 13, 2010
What Happens if Google Quits China? As Google mulls leaving the Chinese market, questions remain about how competitors will react and how the U.S. government might respond. mark for My Articles similar articles
InternetNews
February 25, 2010
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. mark for My Articles similar articles
CIO
August 29, 2011
Robert McMillan
Five Things CIOs Need to Know about Anonymous The hacking collective dubbed Anonymous has unleashed its brand of pesky "operations" on companies from Visa to Sony. Here are the top five things you need to know about their antics. mark for My Articles similar articles
National Defense
January 2005
Joe Pappalardo
Homeland Defense Research Agency Directs Attention To Cyber Security Fearing the specter of crippling attacks on government and private sector computer systems, federal officials are stepping up efforts to foil cyber terrorism. mark for My Articles similar articles
InternetNews
September 15, 2009
U.S. Reviewing Cyber Threat to Power Grid Chinese researcher uses publicly available data to demonstrate how cyber terrorists could knockout entire West Coast grid with relative ease. mark for My Articles similar articles
National Defense
December 2009
Austin Wright
National-Security Infrastructure Faces Relentless Cyberespionage Campaign U.S. government and defense-industry networks face a relentless onslaught from cyber-spies who seek some of the nation's most heavily guarded secrets mark for My Articles similar articles
PC Magazine
September 26, 2008
Corinne Iozzio
The 10 Most Mysterious Cyber Crimes The best criminal hacker is the one that isn't caught or even identified. These are 10 of the most infamous unsolved computer crimes (that we know about). mark for My Articles similar articles
InternetNews
March 31, 2010
Vietnamese Activists Hit With Malware: Google As it continues to spar with the Chinese government over Internet censorship, Google warns of an apparently unconnected attack in the region targeting Vietnamese activists. mark for My Articles similar articles
BusinessWeek
April 10, 2008
China's Response to BusinessWeek A spokesperson of the Chinese Embassy to the United States responds to questions sent to authorities in Beijing and Washington regarding cyber crimes. mark for My Articles similar articles
InternetNews
October 9, 2009
Larry Barrett
Cyber Terrorism Demands New Tactics: Study RAND Corporation says fighting online threats to national security requires nontraditional tactics, immediate attention. mark for My Articles similar articles
InternetNews
October 27, 2010
Does the U.S. Need an Internet 'Kill Switch'? A majority of U.S. consumers surveyed said the government should have the authority to shut down parts of the Internet if necessary to head off a cyber attack. mark for My Articles similar articles
Popular Mechanics
April 2009
Glenn Derene
How Vulnerable is U.S. Infrastructure to a Major Cyber Attack? The next world war might not start with a bang, but with a blackout. mark for My Articles similar articles
InternetNews
April 20, 2010
Google Details Censorship Policies YouTube, Google Docs and other Web services, including its core search engine, have all been subject to censorship in different parts of the world. mark for My Articles similar articles
PC World
May 2001
Kim Zetter
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... mark for My Articles similar articles
InternetNews
February 24, 2010
Cyber Attacks Hit 75% of Enterprises in 2009 Symantec's latest report has more unsettling news for IT security administrators. mark for My Articles similar articles
The Motley Fool
July 13, 2009
Rich Smith
Welcome! You've Got Hackers! Someone threw a cyber war this week. It's great to know that the government is spending billions hardening the IT system against more competent attackers, but what we really need here is a solution to the real problem: Identifying who the attackers are. mark for My Articles similar articles
National Defense
July 2012
Eric Beidel
iCollege Takes Nation's Cybersecurity Leaders Back to School The iCollege, also known as the Information Resources Management College, is working to fill the gap in knowledge that exists among the senior leadership trying to carve out policies and strategies under which the government's "cyberwarriors" must operate. mark for My Articles similar articles
InternetNews
July 29, 2010
U.S. General Details the Impact of Cyber War At the Black Hat security conference, retired General and former CIA director Michael Hayden explains the dangers of cyber attacks. mark for My Articles similar articles
Bank Technology News
April 2001
Maria Bruno
Hackers Steal 1 Million Card Numbers Teams of Russian and Ukrainian hackers stole more than 1 million credit card numbers from 40 American e-businesses in recent months, according to the Federal Bureau of Investigation... mark for My Articles similar articles
National Defense
October 2007
Breanne Wagner
Computer Crimes Keep Government and Industry on the Defensive The complexity of new malicious code and the elusive nature of cyber attackers have become significant impediments to detecting or preventing most intrusions. mark for My Articles similar articles
National Defense
August 2012
Eric Beidel
Companies Rush to Tailor Products to New Cyber-Attacks The cybersecurity marketplace is flooded with products that tout the ability to keep networks and computers safe from intruders. mark for My Articles similar articles
InternetNews
August 4, 2009
Cyber War Could Cause Global Collateral Damage The effects of an all-out cyber war would be impossible to control and could be felt worldwide, experts say. mark for My Articles similar articles
InternetNews
November 29, 2007
World Faces 'Cyber Cold War' Threat Cybercrime is no longer just a threat to industry and individuals but increasingly to national security. mark for My Articles similar articles
Registered Rep.
May 24, 2011
Lauren Barack
Cyber-Hackers: Faster, Better Equipped Than You Security should be the responsibility of all employees - not just the chief technology officer, or the principal of an advisory firm. mark for My Articles similar articles