MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Wall Street & Technology
January 5, 2005
David Tan
Combating Blended Threats Security experts agree that blended threats will continue to grow in frequency, complexity and severity. mark for My Articles similar articles
InternetNews
October 31, 2005
Jim Wagner
Alert Sounds Alarm From Within Security vendor Alert Logic has launched a hosted subscription service that protects enterprise networks from internal attacks. mark for My Articles similar articles
InternetNews
April 6, 2005
Sean Michael Kerner
Report: IM Threats All The Rage The first-quarter report by the IMlogic Threat Center says attack increase will likely continue. mark for My Articles similar articles
Defense Update
Issue 3, 2005
DARPA gears to Counter Network Worms One of the most imminent threats to C4 systems, particularly mobile ad-hoc and COTS based networks, are large scale attacks by computer worms spreading malicious code. mark for My Articles similar articles
InternetNews
April 16, 2009
Alex Goldman
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. mark for My Articles similar articles
T.H.E. Journal
December 2002
Vincent Weafer
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous. mark for My Articles similar articles
InternetNews
July 28, 2010
Cyberattacks Hit Businesses With Big Bills New study from Ponemon Institute and security vendor ArcSight details rising cost of cyber-attacks, with businesses reporting at least one major attack a week. mark for My Articles similar articles
InternetNews
July 28, 2010
Cisco Warns on Enterprise Security Threats In its latest quarterly Global Threat Report, networking giant Cisco outlines a broad-ranging list of threats to enterprise security culled from its various security products. mark for My Articles similar articles
InternetNews
February 20, 2009
Richard Adhikari
Group Warns of Top Web 2.0 Security Threats We can't stand in the path of progress with Web 2.0 technologies, but we can make it safer, an industry group says. mark for My Articles similar articles
InternetNews
January 29, 2007
Michael Hickins
Microsoft Warns of New Zero-Day Flaw Microsoft is investigating new public reports of limited "zero-day" attacks using a vulnerability in Microsoft Word 2000. mark for My Articles similar articles
InternetNews
June 16, 2005
Tim Gray
Browser-Based Attacks on the Rise Browser-based attacks such as pharming and phishing scams are now the fastest-growing security threat on the Internet. mark for My Articles similar articles
InternetNews
June 11, 2009
Alex Goldman
Malware Keeps Creeping Onto Mac OS X The Apple Mac is still seeing far fewer attacks than Windows experiences, but researchers say there's a disturbing trend at work. mark for My Articles similar articles
Bank Systems & Technology
June 1, 2005
Deena M. Amato-McCoy
Virtual Lock-Down Although executives are well aware of the risks surrounding the security of their internal information, companies around the globe still fail to safeguard themselves from potential threats. mark for My Articles similar articles
InternetNews
July 8, 2009
Alex Goldman
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
T.H.E. Journal
February 2005
Patrick Hinojosa
Information Security: Where We've Been and Where We Need to Go Proactive technologies that can protect against new, unknown threats without human intervention must be deployed to ensure the integrity of IT systems. mark for My Articles similar articles
InternetNews
November 29, 2007
World Faces 'Cyber Cold War' Threat Cybercrime is no longer just a threat to industry and individuals but increasingly to national security. mark for My Articles similar articles
Chemistry World
June 10, 2015
Emma Stoye
Security experts warn chemical plants are vulnerable to cyber-attacks Security experts are warning that the computers controlling machinery in chemical plants, power stations and other critical infrastructure are vulnerable to attacks from hackers. mark for My Articles similar articles
InternetNews
August 4, 2005
Tim Gray
IM Threats Bombard Systems The increase in attacks on instant messaging systems has corporations on guard. mark for My Articles similar articles
InternetNews
October 27, 2010
Malware Scams Pick Up In Retail Sector Targeted attacks are becoming more and more common as hackers seek out specific individuals or groups to steal proprietary information. mark for My Articles similar articles
InternetNews
March 28, 2005
Tim Gray
Alliance Formed to Finger Hackers The Fingerprint Sharing Alliance, an initiative comprised of global communications service providers, attempts to decrease the number of Internet attacks. mark for My Articles similar articles
InternetNews
April 3, 2009
Stuart J. Johnston
PowerPoint Hit in Latest Microsoft Office Zero-Day Microsoft issues a security advisory to warn of possible attacks on the company's presentation software. mark for My Articles similar articles
D-Lib
Sep/Oct 2012
Vermaaten et al.
Identifying Threats to Successful Digital Preservation: the SPOT Model for Risk Assessment Digital preservation strategies, as well as the processes and tools that implement those strategies, are designed to secure the long-term future of digital materials. A successful digital preservation strategy must account for and mitigate the impact of various threats. mark for My Articles similar articles
InternetNews
June 23, 2010
Core Tapping Virtualization to Manage Security Core Security debuts beta version of Core Insight Enterprise platform, offering firms an automated testbed for monitoring and managing security threats. mark for My Articles similar articles
National Defense
November 2010
Stew Magnuson
DHS Warns Local Law Enforcement Of New Homegrown Terrorist Threat The general consensus in the intelligence community is that the homegrown terrorist threat during the last year has supplanted plots that originate overseas. mark for My Articles similar articles
InternetNews
February 9, 2007
Clint Boulton
RSA Reminds Us to Fight The Good Fight There is no bullet-proof way to outmaneuver people who want your data. But we need to try. mark for My Articles similar articles
InternetNews
December 15, 2009
CA Warns Enterprises of 'Malvertising' in 2010 An increase in online scams and attacks on the Apple Mac platform are in store for the coming year. mark for My Articles similar articles
PC Magazine
April 5, 2006
Robert Lemos
This Man Has a Virus Security software can do little about the most dangerous delivery mechanism of all: the user. mark for My Articles similar articles
HBS Working Knowledge
May 30, 2005
Deepak Malhotra
Six Steps for Making Your Threat Credible Sometimes the best way to make your threat credible is to act in a way that would normally be considered irrational. Restricting your options, sinking money into a potentially useless enterprise, and surrendering authority are the types of behaviors that smart negotiators usually try to avoid. mark for My Articles similar articles
InternetNews
April 10, 2008
Susan Kuchinskas
An Imperfect (Cyber) Storm The federal government has been working with private companies and security vendors to develop protocols and communications systems that will let them respond quickly and share relevant information on threats and attacks. mark for My Articles similar articles
InternetNews
September 29, 2006
Sean Michael Kerner
IM Attacks on The Rise New IM attacks are more stealthful than before so you might not even know you've been hit. mark for My Articles similar articles