| Similar Articles |
 |
Wall Street & Technology January 5, 2005 David Tan |
Combating Blended Threats Security experts agree that blended threats will continue to grow in frequency, complexity and severity.  |
InternetNews October 31, 2005 Jim Wagner |
Alert Sounds Alarm From Within Security vendor Alert Logic has launched a hosted subscription service that protects enterprise networks from internal attacks.  |
InternetNews April 6, 2005 Sean Michael Kerner |
Report: IM Threats All The Rage The first-quarter report by the IMlogic Threat Center says attack increase will likely continue.  |
Defense Update Issue 3, 2005 |
DARPA gears to Counter Network Worms One of the most imminent threats to C4 systems, particularly mobile ad-hoc and COTS based networks, are large scale attacks by computer worms spreading malicious code.  |
InternetNews April 16, 2009 Alex Goldman |
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security.  |
T.H.E. Journal December 2002 Vincent Weafer |
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous.  |
InternetNews July 28, 2010 |
Cyberattacks Hit Businesses With Big Bills New study from Ponemon Institute and security vendor ArcSight details rising cost of cyber-attacks, with businesses reporting at least one major attack a week.  |
InternetNews July 28, 2010 |
Cisco Warns on Enterprise Security Threats In its latest quarterly Global Threat Report, networking giant Cisco outlines a broad-ranging list of threats to enterprise security culled from its various security products.  |
InternetNews February 20, 2009 Richard Adhikari |
Group Warns of Top Web 2.0 Security Threats We can't stand in the path of progress with Web 2.0 technologies, but we can make it safer, an industry group says.  |
InternetNews January 29, 2007 Michael Hickins |
Microsoft Warns of New Zero-Day Flaw Microsoft is investigating new public reports of limited "zero-day" attacks using a vulnerability in Microsoft Word 2000.  |
InternetNews June 16, 2005 Tim Gray |
Browser-Based Attacks on the Rise Browser-based attacks such as pharming and phishing scams are now the fastest-growing security threat on the Internet.  |
InternetNews June 11, 2009 Alex Goldman |
Malware Keeps Creeping Onto Mac OS X The Apple Mac is still seeing far fewer attacks than Windows experiences, but researchers say there's a disturbing trend at work.  |
Bank Systems & Technology June 1, 2005 Deena M. Amato-McCoy |
Virtual Lock-Down Although executives are well aware of the risks surrounding the security of their internal information, companies around the globe still fail to safeguard themselves from potential threats.  |
InternetNews July 8, 2009 Alex Goldman |
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components.  |
Search Engine Watch January 20, 2010 Jason King |
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China.  |
T.H.E. Journal February 2005 Patrick Hinojosa |
Information Security: Where We've Been and Where We Need to Go Proactive technologies that can protect against new, unknown threats without human intervention must be deployed to ensure the integrity of IT systems.  |
InternetNews November 29, 2007 |
World Faces 'Cyber Cold War' Threat Cybercrime is no longer just a threat to industry and individuals but increasingly to national security.  |
Chemistry World June 10, 2015 Emma Stoye |
Security experts warn chemical plants are vulnerable to cyber-attacks Security experts are warning that the computers controlling machinery in chemical plants, power stations and other critical infrastructure are vulnerable to attacks from hackers.  |
InternetNews August 4, 2005 Tim Gray |
IM Threats Bombard Systems The increase in attacks on instant messaging systems has corporations on guard.  |
InternetNews October 27, 2010 |
Malware Scams Pick Up In Retail Sector Targeted attacks are becoming more and more common as hackers seek out specific individuals or groups to steal proprietary information.  |
InternetNews March 28, 2005 Tim Gray |
Alliance Formed to Finger Hackers The Fingerprint Sharing Alliance, an initiative comprised of global communications service providers, attempts to decrease the number of Internet attacks.  |
InternetNews April 3, 2009 Stuart J. Johnston |
PowerPoint Hit in Latest Microsoft Office Zero-Day Microsoft issues a security advisory to warn of possible attacks on the company's presentation software.  |
D-Lib Sep/Oct 2012 Vermaaten et al. |
Identifying Threats to Successful Digital Preservation: the SPOT Model for Risk Assessment Digital preservation strategies, as well as the processes and tools that implement those strategies, are designed to secure the long-term future of digital materials. A successful digital preservation strategy must account for and mitigate the impact of various threats.  |
InternetNews June 23, 2010 |
Core Tapping Virtualization to Manage Security Core Security debuts beta version of Core Insight Enterprise platform, offering firms an automated testbed for monitoring and managing security threats.  |
National Defense November 2010 Stew Magnuson |
DHS Warns Local Law Enforcement Of New Homegrown Terrorist Threat The general consensus in the intelligence community is that the homegrown terrorist threat during the last year has supplanted plots that originate overseas.  |
InternetNews February 9, 2007 Clint Boulton |
RSA Reminds Us to Fight The Good Fight There is no bullet-proof way to outmaneuver people who want your data. But we need to try.  |
InternetNews December 15, 2009 |
CA Warns Enterprises of 'Malvertising' in 2010 An increase in online scams and attacks on the Apple Mac platform are in store for the coming year.  |
PC Magazine April 5, 2006 Robert Lemos |
This Man Has a Virus Security software can do little about the most dangerous delivery mechanism of all: the user.  |
HBS Working Knowledge May 30, 2005 Deepak Malhotra |
Six Steps for Making Your Threat Credible Sometimes the best way to make your threat credible is to act in a way that would normally be considered irrational. Restricting your options, sinking money into a potentially useless enterprise, and surrendering authority are the types of behaviors that smart negotiators usually try to avoid.  |
InternetNews April 10, 2008 Susan Kuchinskas |
An Imperfect (Cyber) Storm The federal government has been working with private companies and security vendors to develop protocols and communications systems that will let them respond quickly and share relevant information on threats and attacks.  |
InternetNews September 29, 2006 Sean Michael Kerner |
IM Attacks on The Rise New IM attacks are more stealthful than before so you might not even know you've been hit.  |