MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
February 16, 2007
Ed Sutherland
Symantec Sounds Warning on Router Passwords Symantec warns on a vulnerability in some home broadband routers. mark for My Articles similar articles
InternetNews
September 17, 2007
Andy Patrizio
Have We Reached The End Of The Virus? Not quite. The old-fashioned virus infestation is fading as the biggest nuisance for computer users in favor of Trojans, Symantec's new malware study finds. mark for My Articles similar articles
InternetNews
April 14, 2009
Alex Goldman
Credit Cards, Banks Targeted by Cyber Criminals Sophisticated criminal gangs are organized and focused on stealing, buying and selling identities across shadowy online markets. mark for My Articles similar articles
InternetNews
April 8, 2008
Andy Patrizio
Malware Problem Shows no Sign of Slowing It's easier than ever to write a phishing virus that looks like a Facebook app thanks to virus writer's toolkits, Symantec finds. mark for My Articles similar articles
PC Magazine
April 20, 2005
Karen Jones
Pharming Your Identity Identity theft is on the rise, and phishing--e-mail scams disguised as legitimate correspondence--has risen to epidemic proportions. Now, phishing's newest mutation, called "pharming," poses a more insidious threat. mark for My Articles similar articles
Entrepreneur
July 2005
Amanda C. Kooser
Pharm's Way Learn how to protect yourself from the latest internet attack, pharming, which can lead to hijacked accounts or identity theft. mark for My Articles similar articles
InternetNews
October 31, 2007
Andy Patrizio
Symantec's Latest: Customized Threat Protection Symantec announced a custom threat analysis and protection service through its Global Services Security Response unit. Managed Threat Analysis, is designed to help companies facing more targeted attacks from criminals looking to steal intellectual property. mark for My Articles similar articles
PC Magazine
November 29, 2006
Robert Lemos
Hacking for Dollars Viruses and worms are so last-decade. Today's PC users have to worry more about online burglary than stolen bandwidth. mark for My Articles similar articles
PC World
February 3, 2003
Paul Roberts
The Net Is Dangerous, Research Says Attack rates decline, but worms and software flaws keep cyberspace hazardous, Symantec reports. mark for My Articles similar articles
InternetNews
July 7, 2009
Alex Goldman
Symantec: USB Keys Threaten the Enterprise As criminals innovate to attack PCs, Symantec promised to continue to fight them. mark for My Articles similar articles
InternetNews
August 3, 2009
Alex Goldman
Mobile, Social Networks Threaten IT: Symantec IT management is getting tougher as new threats (e.g. 'scareware') emerge and old ones persist. mark for My Articles similar articles
Information Today
June 2005
Phillip Britt
No Phishing Allowed Today, the biggest threats for companies and consumers are the new crimes with funny-looking names: phishing, pharming, and spim. mark for My Articles similar articles
PC World
February 26, 2007
Robert McMillan
Phishing Sites Explode on the Web Online criminals are thriving even in the face of new automated defenses. mark for My Articles similar articles
InternetNews
June 16, 2005
Tim Gray
Browser-Based Attacks on the Rise Browser-based attacks such as pharming and phishing scams are now the fastest-growing security threat on the Internet. mark for My Articles similar articles
InternetNews
September 25, 2006
Ed Sutherland
Report: Home Users Blind To Hackers According to a new status report from security vendor Symantec, home users are the target of 86 percent of attacks. Financial services ranked second, the target of 84 percent of phishing attempts in the first half of 2006. mark for My Articles similar articles
Popular Mechanics
February 2006
Brian Krebs
It's 10 PM. Do You Know Where Your Identity Is? Global identity thieves may know their way around your computer better than you do. Learn how to protect yourself in the scary new world of zombies, RATs, Trojan horses and evil twins. mark for My Articles similar articles
InternetNews
March 3, 2005
Roy Mark
New Senate Bill Looks to Hook Phishers The Anti-Phishing Act of 2005 targets both the e-mail bait and the Web site switch by entering two new crimes into the U.S. Code. mark for My Articles similar articles
InternetNews
May 13, 2004
Ryan Naraine
Symantec Scrambles to Fix Firewall Flaws Users of Symantec's popular firewall product suite are at risk of code execution attacks. mark for My Articles similar articles
AskMen.com
March 12, 2003
Steve Richer
How To: Avoid Identity Theft Criminals steal identities to commit all kinds of fraud and hide the misdeeds they commit. In 2001, there were more than 86,000 victims of this crime in the United States; that figure almost doubled to 162,000 in 2002. Read on to learn how to avoid being the next victim. mark for My Articles similar articles
InternetNews
May 30, 2006
Roy Mark
Symantec Patches Antivirus Vulnerability Symantec said today it has fixed a vulnerability in its antivirus software suite that potentially could open a backdoor to hackers. mark for My Articles similar articles
InternetNews
March 7, 2005
Sean Michael Kerner
DNS-Based Phishing Attacks on The Rise Phishers are using a pair of DNS exploits to help give them the illusion of credible domains. mark for My Articles similar articles
PC World
June 1, 2008
Erik Larkin
Web 2.0 Sites a Thriving Marketplace for Malware Malicious software makers are using social networks, video sites, and blogs to peddle their wares to other online criminals. mark for My Articles similar articles
CIO
December 16, 2009
Robert McMillan
Five Things You Need to Know About Social Engineering How hackers can steal your data. mark for My Articles similar articles
Wired
October 2009
Vince Beiser
Nils Christie: Empty the Prisons From the death penalty to "three strikes" laws, Americans love tough responses to crime, but not necessarily smart ones. Nils Christie has a better idea: Stop treating lawbreakers like criminals. mark for My Articles similar articles
Fast Company
March 2000
Rekha Balu
Cyber Crime Report from the Futurist mark for My Articles similar articles