MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC Magazine
March 7, 2008
Larry Seltzer
ID Theft: The Next Level The new virus Trojan.Silentbanker regularly patrols the Internet for banking sites it can manipulate. mark for My Articles similar articles
InternetNews
August 28, 2009
New Trojan Snags Skype Calls on Windows PCs Trojan.Peskyspy beats Skype encryption through Windows API attack. How serious is the threat? mark for My Articles similar articles
InternetNews
December 27, 2006
Andy Patrizio
The Evolution Of Malware Continues Skype is the latest target of electronic thieves. mark for My Articles similar articles
InternetNews
September 29, 2004
Ryan Naraine
Large Scale IM Virus Attack Feared The first signs of a large-scale virus attack are spotted on newsgroups regarding a Windows flaw in the way JPEG images are processed. mark for My Articles similar articles
InternetNews
November 29, 2010
Malware Authors Hold Users' Data for Ransom A new twist on an old crime is making it possible for online thieves to extort cash from victims who are afraid they'll lose their data and photo files. mark for My Articles similar articles
PC World
September 26, 2007
Erik Larkin
Five of the Dirtiest Malware Tricks From disguising applets to look like part of Windows to co-opting security tools, Web crooks use a variety of methods to bypass your system's safeguards. mark for My Articles similar articles
InternetNews
April 23, 2004
Ryan Naraine
'Osama Captured' e-Mail is Malicious Trojan The 'Osama Bin Laden Captured' e-mail hammering your in-box today will attempt to download a Trojan if the embedded URL is clicked. mark for My Articles similar articles
InternetNews
April 21, 2009
Alex Goldman
Symantec Warns: Mac Botnet Could Strike Again Symantec, the company that discovered the first Macintosh worm in 1998, announced the discovery of the first Macintosh botnet. mark for My Articles similar articles
InternetNews
December 30, 2004
Tim Gray
Trojan Threatens XP Flaw may leave Windows XP vulnerable to attack. mark for My Articles similar articles
InternetNews
August 11, 2010
SMS-Sending Trojan Hits Android Devices Security software firm Kaspersky Lab has detected a Trojan that hides itself in a media player application to send text messages to premium numbers and run up users' wireless service bills. mark for My Articles similar articles
InternetNews
August 16, 2010
Symantec Uncovers Another Sneaky Spam Scam Latest Trojan conceals itself in innocent-looking attachments designed to get you or someone you know to open up the offending file. mark for My Articles similar articles
PC Magazine
August 1, 2007
Larry Seltzer
A Long-Ignored Threat: RTF Files A new danger is being exploited by malware. Learn which steps to take in order to avoid becoming a victim... Biggest and worse malicious programs and viruses... mark for My Articles similar articles
InternetNews
June 23, 2006
Sean Michael Kerner
Next-Gen Bank Trojans Are Upon Us Regardless of how much damage they may have done in the past, a new generation of banking Trojans is beginning to appear, and they're game for even more pilfering, according to at least one security researcher. mark for My Articles similar articles
InternetNews
May 28, 2009
Alex Goldman
Flood of Fake Western Union E-mails Hide Trojan An influx of malware-laden spam, which started two weeks ago, continues today as hackers seek credit card and banking information. mark for My Articles similar articles
InternetNews
August 6, 2004
Roy Mark
Trojan Horse Charges PDAs First known backdoor attack on handhelds probably written by Russian virus coder. mark for My Articles similar articles
InternetNews
April 27, 2005
Tim Gray
Google Typo Crashes Systems Spyware authors and phishing fraudsters have taken advantage of misspellings of google.com to infect computers with trojans and adware. mark for My Articles similar articles
PC World
January 28, 2002
Ellen Messmer
'My Party' E-Mail Virus Hides as URL Antivirus vendors urge update to protect against sneaky virus, which could open PCs to intruders... mark for My Articles similar articles
InternetNews
July 14, 2004
Ryan Naraine
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues. mark for My Articles similar articles
IEEE Spectrum
November 2005
Lauren Aaronson
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. mark for My Articles similar articles
InternetNews
May 19, 2009
Gumblar: Biggest Threat on the Web Today? A new trojan has grown quickly, and experts aren't mincing words in describing the danger. mark for My Articles similar articles
PC World
July 2003
Scott Spanbauer
Pest Zappers More utilities than ever claim to vanquish viruses and smash spyware. Our tests prove they're not all created equal. mark for My Articles similar articles
PC World
January 3, 2002
Joris Evers
Peer-to-Peer Apps Shared Trojan Horse Popular file-swapping programs installed spyware software even if users opted out, companies admit... mark for My Articles similar articles
InternetNews
July 28, 2004
Ryan Naraine
Microsoft: Out-of-Cycle Security Patch Coming Due out next week, the patch will fix a software flaw that led to the Download.Ject malware attack. mark for My Articles similar articles
InternetNews
February 26, 2009
Richard Adhikari
Microsoft Clamps Down on Excel Zero-Day Attack Microsoft is taking steps to protect customers from attacks through a zero-day flaw in Microsoft Excel discovered earlier this week. mark for My Articles similar articles
InternetNews
October 3, 2005
Tim Gray
Trojan Exploits Office A Trojan Horse attacking Microsoft Office has been around since April. The malicious code is disguised as a Microsoft Access file. mark for My Articles similar articles
PC World
August 2006
Andrew Brandt
The 10 Biggest Security Risks You Don't Know About Hackers, scammers, and identity thieves are constantly coming up with new ways to attack your PC and your privacy. Here are the newest perils and how to foil them. mark for My Articles similar articles
InternetNews
June 3, 2005
Tim Gray
Ever-Morphing Bagle Virus Going Strong A new variant of the Bagle downloader virus is spreading havoc again on unsuspecting users' machines, according to e-mail security firm MessageLabs. mark for My Articles similar articles
InternetNews
September 7, 2006
Ed Sutherland
Microsoft Investigates Word 2000 Trojan Microsoft said it has launched an investigation into reports of a new Trojan horse targeting Word 2000. mark for My Articles similar articles
InternetNews
February 24, 2009
Richard Adhikari
Hackers Pounce on Excel Vulnerability Hackers have launched a new attack that uses a previously undiscovered flaw in Microsoft Excel to target business executives and government agencies. mark for My Articles similar articles
InternetNews
January 16, 2008
Andy Patrizio
A Particularly Nasty Week For Malware From Excel to the revitalized Storm worm to a severe banking Trojan, it's enough to make you nostalgic for the days of BBSes. mark for My Articles similar articles
InternetNews
December 19, 2007
Trojan Found in Google Text Ads BitDefender says ads placed by Google in Web pages are being hijacked by Trojan software that replaces the intended text with ads from a different provider. mark for My Articles similar articles
PC Magazine
November 30, 2005
Jane Pinckard
Trojan Invades PSPs In early October, Symantec Security Response experts identified Trojan.PSPBrick, the first Trojan horse that targets Sony PlayStation Portable systems, as a Category 1 threat. mark for My Articles similar articles
PC World
March 2006
Tony Bradley
The New Virus Fighters Today's antivirus programs have no trouble stopping familiar intruders, but how safe are you from the unknown? A test of ten contenders reveals a new Best Buy. mark for My Articles similar articles
InternetNews
July 27, 2004
Jim Wagner
More Gloom from MyDoom Virus The latest version of the virus is a vehicle for another Trojan horse, which attacks Microsoft.com... Symantec releases a removal tool. mark for My Articles similar articles
InternetNews
July 6, 2006
Sean Michael Kerner
Trojans on The March Is it all Microsoft's fault? One security vendor suggests that users may well want to switch to a less-targeted OS. mark for My Articles similar articles
PC World
July 2006
Rebbapragada & Mainelli
All-in-One Security Suites of antivirus, antispyware, and firewall software can provide convenient, solid protection against today's worst threats... Earthlink fights spyware... 10 tips for running security suites... mark for My Articles similar articles
PC Magazine
August 19, 2003
Sheryl Canter
Effective Immunity Viruses keep spreading, and PCs keep getting infected. What can you do to stay secure? mark for My Articles similar articles
InternetNews
February 3, 2011
Hackers Use Facebook Mania to Spread Malware Facebook is a magnet for security threats and hackers are capitalizing on users' addiction to the social networking site to do even more damage. mark for My Articles similar articles
InternetNews
January 10, 2008
Andy Patrizio
First iPhone Malware Found The US Computer Emergency Response Team has issued a warning that a fraudulent iPhone upgrade is making its way around the Internet and users should not be fooled into installing it. mark for My Articles similar articles
InternetNews
February 27, 2007
Ed Sutherland
Storm Trojan Takes Social Measures Storm Trojan uses Web mail, blogs and message boards as conduits for spreading malware code. mark for My Articles similar articles
InternetNews
November 19, 2004
Jim Wagner
Skulls Hit Symbian Phones A relatively low-impact but threatening virus is popping up on some SymbianOS-powered phones, according to an F-Secure anti-virus report. mark for My Articles similar articles
Bank Technology News
November 2007
Four Step Hack Targets Banks A group of hackers, reputedly from the Russian UpLevel crew, have been aiming a hack at U.S. bank customers that requires a four-step process, according to security researchers at managed security service provider SecureWorks. mark for My Articles similar articles
InternetNews
May 25, 2005
Tim Gray
'Star Wars' Flavor Trojan Targets IM The new instant messaging threat is after Yahoo IM users. mark for My Articles similar articles
InternetNews
June 13, 2005
Tim Gray
New Trojan Pretends to be Antivirus Software Anti-virus maker F-Secure warned mobile phone users about a slippery new trojan disguising itself as an antivirus application. mark for My Articles similar articles
InternetNews
January 21, 2005
Sean Michael Kerner
The Worm in CNN's Headlines A recent virus threat masquerades as a legitimate headline pulled right from the news Web site. mark for My Articles similar articles
PC Magazine
June 20, 2007
Larry Seltzer
Beware Windows Hactivation Threat A new Trojan horse masquerading as a Windows security check is wreaking havoc on PCs. Find out how you can keep your system safe. mark for My Articles similar articles
InternetNews
June 10, 2005
Tim Gray
Trojan Spreads in Michael Jackson Spotlight British anti-virus firm Sophos says hackers are slamming computers around the world with a Trojan virus by sending e-mails claiming Michael Jackson has tried to kill himself. mark for My Articles similar articles
PC World
May 16, 2002
Sam Costello
Fake Xbox Emulator Hid Trojan Horse Host Angelfire removes Web site that secretly downloaded adware... mark for My Articles similar articles
PC World
October 31, 2006
Narasu Rebbapragada
First Look: McAfee Internet Security 2007 and Symantec Norton Internet Security 2007 Longtime rivals in the realm of security suites produce worthy upgrades for the new year. Symantec's suite is the better security value, though McAfee offers more nonsecurity utility features, the impressive SiteAdvisor tool, and excellent antiphishing components. mark for My Articles similar articles
InternetNews
May 26, 2006
Ed Sutherland
Microsoft Tells Word Users to Play it 'Safe' Rebounding from recent reports that China hackers are exploiting a zero-day vulnerability in Word to launch a Trojan horse, Microsoft is advising users to run the application in "safe mode." mark for My Articles similar articles