MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC World
September 28, 2001
Kim Zetter
Three Minutes With Security Expert Bruce Schneier Security expert pushes full disclosure, forcing vendors to admit and fix bugs quickly... mark for My Articles similar articles
PC World
November 2001
Kim Zetter
PC Security: Holey Software! New security bugs appear weekly, letting hackers attack your data. Here's why apps are so full of holes and how you can protect yourself... mark for My Articles similar articles
Real Estate Portfolio
Mar/Apr 2002
Scott Laliberte
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... mark for My Articles similar articles
CIO
October 1, 2003
Art Jahnke
Should Software Vulnerabilities Be Posted Online? Readers weigh in with their opinions on this thorny issue. mark for My Articles similar articles
PC World
December 20, 2001
Matt Berger
Windows Patch Plugs 'Critical' Holes Microsoft issues a fix for a major flaw -- kept secret for five weeks -- that leaves Windows XP, Me, and some 98 systems vulnerable when online... mark for My Articles similar articles
PC World
May 2001
Kim Zetter
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... mark for My Articles similar articles
BusinessWeek
August 22, 2005
Grow & Hamm
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. mark for My Articles similar articles
InternetNews
July 18, 2005
XP At Risk From DoS Newly discovered flaw may leave XP users at risk from a Denial of Service attack. mark for My Articles similar articles
PC World
August 3, 2002
Andrew Brandt
Reality Douses DefCon Camaraderie Nation's new security priorities put new risks, greater penalties on cybercrime. mark for My Articles similar articles
Information Today
November 2001
Stephanie C. Ardito
Legal Issues - The Case of Dmitry Sklyarov Some of us who regularly write about intellectual property issues jokingly refer to publishers as the "copyright police," and contemplate being thrown into "copyright jail" for "violating" fair-use laws. Now a civilian is being tried by the U.S. government for such a "crime"... mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
InternetNews
April 13, 2004
Jim Wagner
Microsoft Releases Flurry of 'Critical' Patches Monthly patches for April include plugs for three critical vulnerabilities, including holes in Outlook Express and later versions of IE. mark for My Articles similar articles
InternetNews
November 24, 2009
Microsoft Confirms Bug in Older IE Versions The question is how long will it take hackers to launch attacks in the wild, and will Microsoft have a patch by then? mark for My Articles similar articles
InternetNews
October 6, 2006
Ed Sutherland
Microsoft Plans Nearly Dozen Patches Critical vulnerabilities in Microsoft's Windows operating system and the widely-used Office application suite are part of 11 patches slated to be released next week, according to a Microsoft. mark for My Articles similar articles
InternetNews
April 9, 2004
Jim Wagner
IE Vulnerability Flagged Other Web browsers could also be affected because of a flaw in Internet Explorer's ITS protocol handler, CERT warns. mark for My Articles similar articles
InternetNews
July 12, 2005
Jim Wagner
Microsoft Patch Day Plugs 3 The fixes plug security holes in Word, IE and Windows. mark for My Articles similar articles
CRM
October 1, 2005
Marshall Lager
The Hot Skinny on Hackers What do they know, and how do they find out? A recent "hackers convention" revealed some of their secrets. mark for My Articles similar articles
InternetNews
August 11, 2009
Microsoft's Patch Tuesday Fixes More ATL Holes Microsoft issued patches for 19 security holes in its products as part of this month's Patch Tuesday roundup - including updates designed to lock down several persistent, high-profile vulnerabilities. mark for My Articles similar articles
Bank Systems & Technology
July 22, 2007
Nancy Feig
Bank's IT Security Vulnerability Growing Improvements in overall security have been achieved in most industry sectors, but the financial services industry has seen an increase in the average number of IT vulnerabilities, according to to a study. mark for My Articles similar articles
Salon.com
July 19, 2000
Damien Cave
Code on trial Does the DVD-decrypting DeCSS do for video what Napster did for music, and can copyright law stop it? mark for My Articles similar articles
T.H.E. Journal
September 2003
Roger Del Russo
Securing Your Computer Network Your entire district could be brought to its knees by a hacker's assault, and the costs of reviving the network could be astronomical. While district administrators may have devised plans for securing the physical plant of the school, they rarely consider the vulnerability of their computer networks. mark for My Articles similar articles
InternetNews
April 1, 2005
Jim Wagner
Code Exec Bugs Hit Windows Microsoft's mum on the Windows vulnerabilities since it still hasn't released a patch for them. mark for My Articles similar articles
PC World
August 22, 2006
Stuart J. Johnston
Bugs & Fixes: Hackers' Latest Office Target Is PowerPoint How hackers find holes in Windows applications... Critical Adobe flash player vulnerability... Recall of overheating JumpDrives... mark for My Articles similar articles
PC World
October 24, 2002
Paul Roberts
Microsoft Patches Lingering Win XP Hole Workaround aims at critics who seek major-vulnerability fix independent of SP1. mark for My Articles similar articles
Salon.com
August 18, 2000
Damien Cave
DeCSS judge: Code isn't free speech MPAA president Jack Valenti cheers the decision. Next stop: Appeals court. mark for My Articles similar articles
PC World
November 2004
Harry McCracken
Is This Any Way to Fix Security Holes? How today's software patching process actually helps hackers do their job. mark for My Articles similar articles
InternetNews
April 11, 2006
Ed Sutherland
Microsoft Patches IE, Windows, Office Microsoft released five patches today, three of which it deemed critical, including a highly exploited hole in Internet Explorer. mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
InternetNews
October 12, 2004
Wagner & Naraine
MS Patch Barrage Comes With IE Fix Microsoft released its October batch of security advisories Tuesday with a slew of "critical" patches, including a monster fix for the Internet Explorer browser. mark for My Articles similar articles
InternetNews
September 10, 2004
Ryan Naraine
MS Premium Customers Get Early Security Warnings Microsoft is giving premium customers advance notice of security bulletins. mark for My Articles similar articles
New Architect
February 2003
Joseph C. Panettieri
Dangerous Dealings Reformed hackers want to lend a hand with your IT security strategy. mark for My Articles similar articles
InternetNews
July 26, 2010
Microsoft Updates Bug Reporting Process Extending an olive branch to security researchers, Microsoft says it will provide new mechanisms to make it easier to report vulnerabilities. mark for My Articles similar articles
Salon.com
August 3, 2001
Damien Cave & Katharine Mieszkowski
Free Dmitry! A Russian programmer charged with violating the Digital Millennium Copyright Act languishes in jail. It's time to step up the pressure... mark for My Articles similar articles
InternetNews
September 7, 2006
Ed Sutherland
Microsoft Investigates Word 2000 Trojan Microsoft said it has launched an investigation into reports of a new Trojan horse targeting Word 2000. mark for My Articles similar articles
PC World
June 2004
Stuart J. Johnston
Worms Come Faster: Are You at Risk? Play it safe and install the latest Outlook and MSN Messenger updates to protect against the new worms. mark for My Articles similar articles
eCFO
December 2000
Karen J. Bannan
Fear of the Black Hats Increasingly, companies are hiring hackers to test their network firewalls. This may not be such a good idea. mark for My Articles similar articles
InternetNews
February 2, 2009
Richard Adhikari
Are Legitimate Sites the Next Malware Threat? Businesses may be exposing their customers to malware by leaving their sites unpatched, IBM warns in a new study. mark for My Articles similar articles
InternetNews
August 6, 2010
Adobe Hurries Patch for PDF Security Flaw The vulnerability in Adobe Reader could give hackers control of a user's computer. mark for My Articles similar articles
The Motley Fool
July 9, 2004
Alyce Lomax
Next Target: Mozilla? Internet users are in search of safe surfing, but is it just a pipe dream? The Web browser reported a security flaw yesterday, although within 24 hours it had issued a patch to plug the hole. mark for My Articles similar articles
InternetNews
November 23, 2009
Zero-Day Exploit a Threat to IE6 & 7 Browsers? Another zero-day hole emerges in key Microsoft software. mark for My Articles similar articles
InternetNews
August 13, 2010
Microsoft's Patch Tuesday Fixes Spoofing Flaw In one of its biggest patch drops in history, Microsoft has issued a fix for a hole in a bit of Windows code that could enable hackers to carry out a spoofing attack. mark for My Articles similar articles
InternetNews
March 9, 2004
Ryan Naraine
Microsoft Patches Trio of Vulnerabilities Security fixes issued for Microsoft Outlook, MSN Messenger and the Windows Media Services. mark for My Articles similar articles
Fast Company
Neal Ungerleider
95% Of Android Phones Could Be Hacked With Just One Text Android users, beware: Security researchers have discovered that 95% of Android phones are vulnerable to attack through the dispatch of just one text message. mark for My Articles similar articles
JavaWorld
July 2001
Todd Sundsted
Secure your Java apps from end to end, Part 2 Little mistakes during application development often lead to big security problems for developers and users. This article introduces the most common types of design and implementation flaws that turn into security vulnerabilities and describes how to avoid them... mark for My Articles similar articles
InternetNews
October 9, 2007
Andy Patrizio
Microsoft Patches IE, Office Holes A favorite target of virus writers, Internet Explorer, is the recipient of four new vulnerability fixes today from Microsoft in the latest of the company's regular monthly product updates. mark for My Articles similar articles
Unix Insider
May 2000
Carole Fennelly & Brian Martin
Hacker's toolchest What is a hacker's approach to penetration testing? What tools do hackers use? I decided to find out. mark for My Articles similar articles
PC World
November 20, 2002
Paul Roberts
'Critical' Windows, IE Hole Plugged Microsoft urges users to download patch for flaw that permits intruder access. mark for My Articles similar articles
InternetNews
July 11, 2006
Ed Sutherland
Microsoft Patches Five 'Critical' Flaws Microsoft Windows and Office have the spotlight today, as the company released seven patches, five deemed critical, as part of its patch Tuesday. mark for My Articles similar articles
PC World
April 10, 2001
Hacking's History From phone phreaks to Web attacks, hacking has been a part of computing for 40 years... mark for My Articles similar articles
InternetNews
May 4, 2004
Ryan Naraine
Apple Issues Patch for Mac OS X Mac OS X users are at risk of system hijack, security bypass, DoS attacks and other threats. mark for My Articles similar articles