MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Entrepreneur
June 2004
Eric Bender
Die Hard? Could smartphones really put laptops 6 feet under? mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
IEEE Spectrum
January 2011
Joshua J. Romero
Smartphones: The Pocketable PC Is your phone smarter than a fifth grader? mark for My Articles similar articles
InternetNews
December 14, 2010
Lisa Phifer
Top 10 Mobile Risks to Avoid During Holidays Between online shopping and checking in at work, the holiday season presents a number of security risks for smartphone users. mark for My Articles similar articles
InternetNews
November 20, 2006
Nicholas Carlson
Smartphone Sales Up 50% Smartphone unit sales almost tripled from 2004 to 2005, and increased by 50 percent in the first half of 2006 over 2005. But is anybody really using them for anything else but talking? mark for My Articles similar articles
National Defense
June 2013
Valerie Insinna
Personal Devices Pose Challenge for Defense Department Security The proliferation of smartphones has caused a dramatic shift in how hackers target the Defense Department and its industrial base, cybersecurity company officials said. mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
InternetNews
December 16, 2010
Mobile-Specific Malware Jumps 33 Percent: Study New report from mobile security software vendor finds a 33 percent spike in malware targeting mobile devices in 2010. mark for My Articles similar articles
CIO
February 24, 2010
John Brandon
Why You Need a Smartphone Application Strategy It's only a matter of time before employees want to use their smartphones for everything. So CIOs need to start thinking about smartphone apps as part of their enterprise application strategy. mark for My Articles similar articles
CIO
March 15, 2004
Christopher Lindquist
Model Hacker Behavior - Under Development Forget about patches. Researchers at the Florida Institute of Technology are looking for ways to fight hackers by modeling their methods, or "exploits." The research could eventually lead to new types of security tools capable of stopping attacks that hackers haven't even invented yet. mark for My Articles similar articles
InternetNews
December 28, 2010
Security 2010: The Year in Review Stuxnet, embarrassing data leaks and sophisticated phishing attacks dominated the data security landscape in 2010. mark for My Articles similar articles