MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
May 15, 2009
Alex Goldman
Facebook Attacks Threaten All Web Sites Why would users want your user name and password? Perhaps because it could give them access to your money and your e-mail. mark for My Articles similar articles
InternetNews
November 6, 2008
Richard Adhikari
Adobe Unveils Another Set of Critical Patches For the second time this week, Adobe Systems has released a set of critical vulnerability patches. mark for My Articles similar articles
InternetNews
June 25, 2004
Ryan Naraine
Malware Hacker Attack Linked to Spammers Experts warn that a highly sophisticated malicious hacker attack could turn millions of PCs into spam zombies. Infected IIS web servers are spreading the malicious software to Internet Explorer users. mark for My Articles similar articles
InternetNews
September 29, 2004
Ryan Naraine
Real Plugs Media Player Holes The company released patches to protect RealPlayer users from code execution attacks. mark for My Articles similar articles
InternetNews
October 28, 2008
Richard Adhikari
Yahoo Tightens HotJobs After Hackers Hit In a move that could have saved thousands of potential victims of identity theft, Yahoo techs have fixed a flaw in it's HotJobs Web site, one of the leading online job sites with thousands of subscribers. mark for My Articles similar articles
RootPrompt.org
July 19, 2000
Tyler
My experience with being cracked Tyler sent in this story about his experience getting cracked. In it he tells us what should not happen after you find you've been cracked. mark for My Articles similar articles
InternetNews
February 2, 2009
Richard Adhikari
Are Legitimate Sites the Next Malware Threat? Businesses may be exposing their customers to malware by leaving their sites unpatched, IBM warns in a new study. mark for My Articles similar articles
Registered Rep.
May 24, 2011
Lauren Barack
Cyber-Hackers: Faster, Better Equipped Than You Security should be the responsibility of all employees - not just the chief technology officer, or the principal of an advisory firm. mark for My Articles similar articles
InternetNews
April 20, 2010
Hackers Breached Google's Password Hub: Report New report cites source close to investigation claiming that hackers in China were able to compromise the password service that acts as gateway to Google's Web products and services. mark for My Articles similar articles
PC Magazine
December 20, 2006
Robert Lemos
The New Security Threats More secure operating systems mean that attackers are looking elsewhere for holes to sneak through. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
InternetNews
April 16, 2009
Alex Goldman
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. mark for My Articles similar articles
Entrepreneur
June 2010
Ericka Chickowski
Protect Your Small Business Against Cyber Attacks Cybercrime costs the economy more than $1 trillion per year, and crooks are increasingly setting their sights on small businesses. A look at the most destructive threats to your network - and what you need to do about them. mark for My Articles similar articles
InternetNews
October 25, 2004
Ryan Naraine
Fake Red Hat Alert Making Rounds Unknown attacker sends spam messages with a malicious file masquerading as a Red Hat security update. mark for My Articles similar articles
T.H.E. Journal
February 2009
John K. Waters
IT Security: Target: The Web No longer focused on the network, hackers have a bull's eye now trained squarely on web-based applications. What, if anything, can school districts do to thwart them? mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
InternetNews
February 19, 2004
Ryan Naraine
Linux Kernel Flaws Uncovered Malicious attackers could gain full super-user privileges, according to a security research firm. mark for My Articles similar articles
Search Engine Watch
April 14, 2011
Kristine Schachinger
3 Website Exploits - Are You Protected? Examining three common attacks that can hurt your visitors and rankings, and tips on how to prevent your site from being hacked. mark for My Articles similar articles
InternetNews
July 8, 2009
Alex Goldman
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. mark for My Articles similar articles
PC Magazine
April 19, 2006
Robert Lemos
Password Policies A simple password could be the weak link that leaves your data open to attack. mark for My Articles similar articles
The Motley Fool
June 13, 2011
Arunava De
Are Hackers the Next Threat to Your Portfolio? Before you respond to a malicious attack on one of your investments in your portfolios, measure the impact that such an attack can have on the company. mark for My Articles similar articles
InternetNews
February 10, 2004
Ryan Naraine
Microsoft Patches 'Critical' ASN.1 Vulnerability Buffer overflows could give malicious hackers complete control of unpatched machines. mark for My Articles similar articles
InternetNews
October 5, 2004
Ryan Naraine
Apple Patches QuickTime Flaw Apple issues a patch for its media player and tends to other flaws in OS X. mark for My Articles similar articles
Technology Research News
August 10, 2005
Kimberly Patch
Plug-in Protects Passwords Researchers have created a browser plug-in, dubbed PwdHash, that produces a different password for each website you visit without requiring the you to remember more than a single password. mark for My Articles similar articles
InternetNews
July 13, 2004
Ryan Naraine
MS Patch Day: 7 Alerts; 2 Critical The two critical flaws are found in the Windows Task Scheduler and HTML Help features. mark for My Articles similar articles
The Motley Fool
July 13, 2009
Rich Smith
Welcome! You've Got Hackers! Someone threw a cyber war this week. It's great to know that the government is spending billions hardening the IT system against more competent attackers, but what we really need here is a solution to the real problem: Identifying who the attackers are. mark for My Articles similar articles
The Motley Fool
June 18, 2011
Anders Bylund
How to Thwart Digital Thieves and Stay Safe Online You wouldn't give your keys to a stranger on the street, right? Then don't do it online. mark for My Articles similar articles
PC Magazine
November 29, 2006
Robert Lemos
Hacking for Dollars Viruses and worms are so last-decade. Today's PC users have to worry more about online burglary than stolen bandwidth. mark for My Articles similar articles
InternetNews
June 23, 2004
Susan Kuchinskas
Microsoft High on Performance Microsoft will be joining the supercomputer game when it serves up Windows Server 2003, high-performance edition. mark for My Articles similar articles
Wall Street & Technology
January 5, 2007
Larry Tabb
Preparing for the Inevitable While electronic thefts can be cleaner, less physical and certainly less bloody, the chance of getting money out of a brokerage or bank illegally is usually greater with a gun than a computer. But as the criminals and terrorists get smarter, we too must raise the bar. mark for My Articles similar articles
National Defense
December 2010
Eric Beidel
Cybersecurity Threatened By Common Password Buster GTRI researchers have proven that an inexpensive graphics processing unit (GPU) can bust passwords at the speed of a $100 million supercomputer. mark for My Articles similar articles
InternetNews
January 29, 2007
Michael Hickins
Microsoft Warns of New Zero-Day Flaw Microsoft is investigating new public reports of limited "zero-day" attacks using a vulnerability in Microsoft Word 2000. mark for My Articles similar articles
InternetNews
September 2, 2004
Ryan Naraine
MIT Warns of Kerberos 5 Flaws Security holes in the network authentication protocol could lead to code execution and DoS attacks. mark for My Articles similar articles
InternetNews
January 4, 2008
David Needle
Wi-Fi Networks Face Virus Threat? Unprotected routers could spread malicious software rapidly to thousands of computers. mark for My Articles similar articles
Investment Advisor
June 2008
Irace & Mehta
Security in a New Age How to protect your firm from 21st century online criminals mark for My Articles similar articles
Inc.
November 1, 2009
Michael Fitzgerald
Are Your Passwords Too Weak? Hacked passwords can compromise company data security. Strategies for creating the best passwords mark for My Articles similar articles
Information Today
February 4, 2013
Paula J. Hane
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. mark for My Articles similar articles
InternetNews
May 11, 2004
Ryan Naraine
MS Patches Windows Code Execution Flaw A Help and Support Center flaw leaves Windows XP and Windows Server 2003 users are at risk of remote code execution attacks. mark for My Articles similar articles
PC World
May 2001
Kim Zetter
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... mark for My Articles similar articles
PC Magazine
December 9, 2003
The Lookout: Faulty Patch Leaves IE Open An incomplete patch has opened a vulnerability in Internet Explorer, and security experts say there are at least four methods attackers can use to compromise vulnerable PCs. mark for My Articles similar articles
InternetNews
October 27, 2010
Malware Scams Pick Up In Retail Sector Targeted attacks are becoming more and more common as hackers seek out specific individuals or groups to steal proprietary information. mark for My Articles similar articles
BusinessWeek
August 13, 2009
Joel Schectman
Computer Hacking Made Easy Botnet attacks like the one that took down Twitter are becoming so easy and cheap, almost anyone can do it. mark for My Articles similar articles
InternetNews
October 12, 2004
Wagner & Naraine
MS Patch Barrage Comes With IE Fix Microsoft released its October batch of security advisories Tuesday with a slew of "critical" patches, including a monster fix for the Internet Explorer browser. mark for My Articles similar articles
InternetNews
January 12, 2011
Hacker to Expose Wi-Fi Flaw Using Amazon EC2 At next week's Black Hat conference, a security expert reportedly plans to divulge method for breaking wireless networking passwords through brute force attack. mark for My Articles similar articles
The Motley Fool
July 23, 2009
Tim Beyers
This Mistake Could Ruin Your Financial Life Personal digital security has never been more important. mark for My Articles similar articles
InternetNews
February 2, 2010
Twitter Responds to Phishing Attack Twitter's popularity has once again made it the target of the bad guys. mark for My Articles similar articles
PC World
April 2004
Scott Spanbauer
Lock Down Your PC Hackers. Spammers. Even rogue coworkers and employees. How can you keep the bad guys out and the good data in? Safeguard your system's perimeter with these 29 beyond-the-basics security steps. mark for My Articles similar articles
Bank Technology News
May 2005
John Adams
Security: Voca Tackles The Threat Within UK-based electronic payments engine Voca deploys a password management platform that automates control over access, in an attempt to stave off security breaches from inside the enterprise. mark for My Articles similar articles