MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC Magazine
May 17, 2006
Robert Lemos
A Moving Target Today, cell-phone viruses are not a big deal. But if you think your phone will always be safe, think again. mark for My Articles similar articles
InternetNews
March 7, 2005
Tim Gray
Virus Threatens Mobile Phones Again A new mobile phone virus is capable of going global in minutes. mark for My Articles similar articles
InternetNews
March 27, 2008
Judy Mottl
Mobile Device Threats on The Way Experts say it's only a matter of time until hackers and virus makers turn their attention to mobile tools -- and enterprises are unprepared. mark for My Articles similar articles
InternetNews
February 16, 2005
Tim Gray
Cabir Hits U.S. Finnish antivirus firm F-Secure has detected the first U.S. variants of the Cabir virus, which infects cell phones using the Symbian operating system. mark for My Articles similar articles
Inc.
September 2004
Lora Kolodny
New Virus Goes After BlackBerries Look for the next generation of computer viruses to target mobile devices, from smart phones to PDAs. mark for My Articles similar articles
InternetNews
March 4, 2005
Jim Wagner
Viruses Gearing up For The Smart Set As the boundaries between cell phones and desktop functionality blur, the danger of a worldwide wireless virus increases. mark for My Articles similar articles
InternetNews
December 29, 2004
Tim Gray
New Cabir Variants are Spreading Fast Code for virus that hits Symbian-based cell phones released. mark for My Articles similar articles
T.H.E. Journal
August 2005
Irene Sandler
Road Warriors on Trojan Horses Ensuring end user compliance reduces the cost of network security. mark for My Articles similar articles
InternetNews
January 12, 2005
Tim Gray
Lasco.A Poses New Mobile Threat Finnish antivirus firm F-Secure said it has detected a quick spreading and versatile new worm capable of infecting both Windows and cell phones using the Symbian operating system. mark for My Articles similar articles
InternetNews
March 17, 2006
Tim Scannell
Are RFID Tags Vulnerable to Viruses? Dutch researchers claim RFID technology is open to hacker attacks and disruptive viruses. What's the answer? mark for My Articles similar articles
Insurance & Technology
July 19, 2004
Peggy Bresnick Kendler
Victory Over Viruses? Insurers must rely on a combination of tools - such as e-mail filters and firewalls - training and common sense to safeguard their systems and their operations from viruses and worms. mark for My Articles similar articles
InternetNews
February 15, 2008
Mobile Industry Sees New Security Risks Security professionals cite progress in combating threats to wireless handsets, but more work lies ahead. mark for My Articles similar articles
PC Magazine
January 12, 2005
Sebastian Rupley
The Virus Wars--In Your Palm Build a big user base and the malicious-code writers will come. That's the logic that analysts and security software companies alike are following as they warn that smartphones and other mobile devices will become significant targets for security threats in 2005. mark for My Articles similar articles
InternetNews
November 18, 2004
Tim Gray
McAfee, DoCoMo Inoculate 3G Phones McAfee will provide the Tokyo-based wireless giant's users with its VirusScan content-scanning technology as a built-in service on their FOMA 901i series 3G mobile phones. mark for My Articles similar articles
PC World
December 2000
Kim Zetter
Computer Viruses: The Next Generation What will be the next virulent outbreak? No one knows, except that it's guaranteed to be more lethal than ever... mark for My Articles similar articles
InternetNews
August 6, 2004
Roy Mark
Trojan Horse Charges PDAs First known backdoor attack on handhelds probably written by Russian virus coder. mark for My Articles similar articles
PC Magazine
June 22, 2004
Robert P. Lipschutz
Business Security Our buying guide sorts out the technologies and explains the best ways to protect yourself. mark for My Articles similar articles
PC World
July 29, 2002
Sam Costello
Symantec Unveils Blended Security Software New product mixes firewall, antivirus, and intrusion detection tools to better protect PCs from a new wave of threats. mark for My Articles similar articles
PC Magazine
July 13, 2004
Alexandra Robbins
The Virus Wars As the problem continues to escalate, the future direction of the virus wars is something of an unknown, because it depends on so many variables, including the shifting motivations for virus writing. mark for My Articles similar articles
T.H.E. Journal
December 2002
Vincent Weafer
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous. mark for My Articles similar articles
PC Magazine
May 2, 2008
John Brandon
Gadget Viruses Still An Empty Threat The risk of malware attacking mobile devices has been largely exaggerated. But does that mean your cell phone is completely safe? mark for My Articles similar articles
T.H.E. Journal
February 2006
Don't Be Out'smart'ed The new breed of smart mobile phones will soon pose the biggest danger to your data security. Software companies are gearing up to nullify the threat. mark for My Articles similar articles
PC Magazine
April 29, 2004
Jay Munro
Symantec Client Security 2.0 Symantec Client Security 2.0 provides a strong defense for PC users on your network. With its easy-to-use interface, clear documentation, and straightforward setup, SCS is a good choice for corporate protection. mark for My Articles similar articles
PC World
August 12, 2002
Tom Mainelli
Symantec Unveils Automated Norton AntiVirus Updated program zaps latest worms, seeks out instant messaging nasties, and doesn't bother you with the details. mark for My Articles similar articles
PC World
December 4, 2002
Paul Roberts
Klez Worm Was Worst of 2002 The prolific virus was reported more than any other this year, and simple human error likely caused its spread. mark for My Articles similar articles
InternetNews
April 12, 2004
Sean Michael Kerner
Beware of Browser-based Attacks Hackers entering through holes in browsers 'may pose the next significant security threat to IT operations,' a new report warns. mark for My Articles similar articles
Information Today
February 2001
Marshall Breeding
A Prescription for Computer Health We finished the year with little to no damage to our computer systems. Read on to learn more about how to develop a successful strategy for computing in an increasingly dangerous world... mark for My Articles similar articles
Bank Technology News
August 2006
Michael Sisk
Roving Trouble The use of handheld devices in financial services provides the freedom to work remotely and can increase employee productivity, but there's a downside: Securing email access to corporate server-based accounts and providing remote access to corporate networks and Web-based email is harder than ever. mark for My Articles similar articles
InternetNews
May 26, 2006
Tim Scannell
Jamie de Guerre, Director, Partner Programs, Cloudmark Spam isn't going anywhere, and Jamie de Guerre's company is tracking its trails through our inboxes. mark for My Articles similar articles
PC Magazine
March 16, 2005
Dennis Fisher
New Virus Attack Bypasses Filters Virus writers have once again gotten the drop on antivirus vendors and IT administrators with a new technique that's finding considerable success. mark for My Articles similar articles
Wall Street & Technology
January 5, 2005
David Tan
Combating Blended Threats Security experts agree that blended threats will continue to grow in frequency, complexity and severity. mark for My Articles similar articles
CFO
May 1, 2005
John Goff
New Holes for Hackers Are businesses prepared for the digital demons about to be unleashed by smart phones and PDAs? mark for My Articles similar articles
InternetNews
August 30, 2005
The Pain in the Endpoints A study by SupportSoft says mobile devices are a pain in the IT department's neck. mark for My Articles similar articles
InternetNews
August 12, 2004
Ryan Naraine
Widcomm Bluetooth a Virus Risk A security research firm has discovered a serious vulnerability in Widcomm's widely deployed Bluetooth Connectivity Software that could lead to wireless delivery of malicious worms and viruses. mark for My Articles similar articles
PC Magazine
August 3, 2005
The Ten Biggest Problems in Computing and How We'll Solve Them Malicious computer attacks will go on, but you can be confident we'll get better at fighting them. mark for My Articles similar articles
Fast Company
October 2005
Scott Kirsner
Sweating In the Hot Zone Imagine what life would be like if your product were never finished, if your work were never done, if your market shifted 30 times a day. The computer-virus hunters at Symantec don't have to imagine. mark for My Articles similar articles
PC World
May 28, 2002
Frank Thorsberg
Worms Crawl Toward Instant Messaging IM users should become more security-conscious as IM spreads across devices and invites viruses... mark for My Articles similar articles
Entrepreneur
August 2006
Amanda C. Kooser
Fast Talk VoIP is wasting no time in going wireless. mark for My Articles similar articles
PC Magazine
April 19, 2006
Sascha Segan
Buying Guide: Windows Mobile Devices Windows Mobile is winning the mobile OS wars. mark for My Articles similar articles
PC World
September 2002
Andrew Brandt
Klez: The Virus That Won't Die Already the most prolific virus ever, Klez continues to wreak havoc. mark for My Articles similar articles
PC World
November 2005
Erik Larkin
Threat Alert: Antivirus Killers Savvy invaders can erode your PC's defenses and make it even more vulnerable. mark for My Articles similar articles
PC Magazine
September 15, 2004
Neil J. Rubenking
Norton vs. McAfee: Top Antivirus Apps Square Off The best antivirus apps distinguish themselves by adding features outside the ordinary, features that give them additional power against attack by viruses, worms, or Trojans. mark for My Articles similar articles
InternetNews
March 17, 2006
Sean Michael Kerner
Beware The Wardriver at Your Next Conference Security research firm scans an IT tech show and provides some interesting results on the security of Wi-Fi signals. mark for My Articles similar articles
CIO
August 1, 2005
Grant Gross
VoIP Security Debate Heats Up Voice over IP (VoIP) telephony and malicious software for mobile devices are among the most-hyped IT security threats, according to Gartner. mark for My Articles similar articles
Entrepreneur
April 2007
Amanda C. Kooser
Look Smart Today's smartphones are elegant, powerful, must-have business accessories for entrepreneurs who want to minimize their mobile devices. mark for My Articles similar articles
InternetNews
August 4, 2005
Tim Gray
IM Threats Bombard Systems The increase in attacks on instant messaging systems has corporations on guard. mark for My Articles similar articles
BusinessWeek
June 12, 2006
Stephen H. Wildstrom
A Lean, Mean Handheld Motorola's Q is a low-cost but stylish way to handle calls and e-mail. mark for My Articles similar articles
Entrepreneur
October 2004
Amanda C. Kooser
Sharper Image Smartphones are the brainier mobile choice. mark for My Articles similar articles
T.H.E. Journal
August 2004
Ozkan & Gunay
Minimizing Security Vulnerabilities in High-Tech Classrooms Emerging technologies are quickly becoming part of our daily learning and teaching endeavors in academia, however only a few students, faculty members and administrators are aware of the risks and vulnerabilities that exist in their network operating systems. mark for My Articles similar articles
PC Magazine
September 28, 2005
Dan Dinicolo
Securing Bluetooth Devices As Bluetooth becomes more pervasive, it's likely to become the target of more security threats. mark for My Articles similar articles