MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
December 9, 2009
Symantec Brings Storage, Security to Amazon EC2 Security software vendor now offering endpoint security and storage foundation apps through Amazon's cloud. mark for My Articles similar articles
InternetNews
September 16, 2009
Larry Barrett
Hackers Targeting Web 2.0 Sites at Alarming Rate Security software vendor Websense claims 95 percent of user-generated comments on blogs and message boards are either spam or contain malicious code. mark for My Articles similar articles
InternetNews
May 20, 2010
South America Emerges As Cybercrime Hotspot China gets all the bad press but it turns out that Luxembourg, the Cayman Islands and a bunch of South American countries are actually the least discriminating when it comes to filtering malware. mark for My Articles similar articles
Bank Technology News
September 2008
Rebecca Sausner
Security Reaches For the Clouds Just about the only business-naming trend hotter these days than "as a service" is "in the cloud," and IT security offerings are no exception. The cloud has become a trendy buzzword; many company's re-branding all their hosted services and calling them cloud based." mark for My Articles similar articles
InternetNews
February 11, 2009
Richard Adhikari
Spammers Hijack Facebook Group of 1.5 Million Facebook site is taken over by get-rich-quick and other familiar spam. mark for My Articles similar articles
InternetNews
December 31, 2010
Smartphone, Social Threats to Mark 2011 Security As enterprises increasingly embrace popular consumer technology, experts warn of coming threats to social networks and popular devices like the iPhone. mark for My Articles similar articles
Entrepreneur
June 2010
Ericka Chickowski
Protect Your Small Business Against Cyber Attacks Cybercrime costs the economy more than $1 trillion per year, and crooks are increasingly setting their sights on small businesses. A look at the most destructive threats to your network - and what you need to do about them. mark for My Articles similar articles
InternetNews
December 2, 2010
Targeted Malware, Spam Will Surge in '11 Security software vendor predicts more malware campaigns will use social media to target mobile devices, apps and industry-specific systems. mark for My Articles similar articles
PC World
August 12, 2002
Tom Mainelli
Symantec Unveils Automated Norton AntiVirus Updated program zaps latest worms, seeks out instant messaging nasties, and doesn't bother you with the details. mark for My Articles similar articles
InternetNews
July 22, 2010
Shortened URLs Are Spam Magnets: Gartner Abbreviated URLs are standard operating procedure on Twitter and everyone loves Twitter. So it's no surprise hackers are embedding malware in shortened URLs to evade security apps. mark for My Articles similar articles
InternetNews
June 2, 2010
Facebook Users Fend Off 'Likejacking' Attacks Hackers looking to take over Web sessions via Facebook are hiding malware under click-inducing, socially engineered links. mark for My Articles similar articles
InternetNews
August 17, 2010
FaceTime Service Locks Down Social Nets The enterprise security firm unveils a new SaaS offering for helping enterprises manage employees' use of Facebook, Twitter and similar services. mark for My Articles similar articles
PC Magazine
February 1, 2006
Cade Metz
The Sorry State of Security Time to face facts: when it comes to our online safety woes, everybody is to blame. mark for My Articles similar articles
InternetNews
August 13, 2010
Malware Discovered on Another Red Cross Website The Red Cross of Serbia was targeted by hackers who injected malicious JavaScript files onto several of the organization's web pages. mark for My Articles similar articles
InternetNews
January 24, 2011
Cloud, Virtualization Driving 2011 IT Spending While the recession still has IT budgets in deep freeze, CIOs in 2011 are turning their resources to new models of computing, including the cloud and virtualized environments. mark for My Articles similar articles
Bank Technology News
February 2006
Shane Kite
Security: Aberdeen Doles Out Web-Safety Business Years of acquisitions created a network of systems that were making Internet security increasingly problematic. Aberdeen Asset Management's answer? Tap a managed security provider. mark for My Articles similar articles
InternetNews
July 21, 2009
Alex Goldman
Erin Andrews Virus Infects Search, Blogs The taping of the original video was a Peeping Tom crime that criminals are now exploiting to infect PCs. mark for My Articles similar articles
InternetNews
August 6, 2009
Did Koobface Cause Twitter, Facebook Outages? A new variant of the widespread Internet worm Koobface made its debut today - just as Twitter and Facebook were hit by denial-of-service attacks. mark for My Articles similar articles
InternetNews
October 27, 2009
Cisco Buys ScanSafe for $183M in Security Play Cisco's acquisition spree continues with purchase of SaaS security vendor ScanSafe. mark for My Articles similar articles
InternetNews
October 19, 2009
McAfee Takes E-Mail Security to Cloud, Streets Security software vendor unveils new e-mail security strategy that gives customers lots of options. mark for My Articles similar articles
InternetNews
November 20, 2009
Symantec's 'Unlucky 13' Security Trends for 2010 Hackers and malware purveyors are becoming more sophisticated, meaning computer users need to become wiser and more proactive, too. mark for My Articles similar articles
PC Magazine
September 23, 2008
Matthew D. Sarrel
A Day in the Life of a Web 2.0 Hacker They harvest data about you, your family, your friends, and your work directly from the Web apps you use and the sites you visit. Here's how they do it. mark for My Articles similar articles
The Motley Fool
July 28, 2004
Alyce Lomax
Software Strengthening Like a Virus With security threats rampant, it's no wonder McAfee grew its quarterly earnings. mark for My Articles similar articles
PC Magazine
June 21, 2006
Matthew D. Sarrel
Safety in Layers A successful antivirus strategy is one that stacks security. mark for My Articles similar articles
InternetNews
June 22, 2009
Alex Goldman
Security Software Revenues Grew 19% in 2008 Security software and appliances remains one of the few areas of IT where spending is staying even strong, even as businesses cut or delay many of their projects in other areas. mark for My Articles similar articles
InternetNews
March 3, 2009
Richard Adhikari
Digg Hackers Strike Next at YouTube Attacks are on the rise, with malware authors dabbling in spreading worms and scareware via comments. mark for My Articles similar articles
InternetNews
September 10, 2009
Symantec Norton 2010 Hinges on Reputation Symantec's latest offering takes a different approach to evaluating files and applications on the fly. mark for My Articles similar articles
BusinessWeek
February 19, 2007
Stephen H. Wildstrom
Mischief-Proofing Your PC Vista comes with only some of the protection you'll need. mark for My Articles similar articles
InternetNews
October 20, 2009
Cloud, Social Computing Lead Gartner's Top 10 Tech research firm presents its list of top 10 technologies and trends for enterprises in 2010. mark for My Articles similar articles
InternetNews
February 23, 2009
Richard Adhikari
Malware Authors Exploit Facebook App Is a bogus application making the rounds on Facebook just a failed marketing ploy? Or something more dangerous? mark for My Articles similar articles
PC World
June 2004
Liane Cassavoy
Viruses Target IM Virus writers and scammers are now plying their trade via instant messaging. Here are the real threats, and tips on avoiding them, including software solutions. mark for My Articles similar articles
PC World
March 2006
Andrew Sullivan
Programs in Peril Popular applications have more security flaws than Windows does. mark for My Articles similar articles
Search Engine Watch
May 19, 2010
Simon Heseltine
Can Facebook Drive Great Traffic to Websites? Data from April suggests maybe sites don't need to be as beholden to the big three search engines as we may think. mark for My Articles similar articles
InternetNews
December 5, 2008
Richard Adhikari
Latest Facebook Attack Stems from Previous One Businesses with Facebook links must watch out. mark for My Articles similar articles
InternetNews
January 13, 2009
Richard Adhikari
AVG Buys Sana For ID Theft Protection Pure play antivirus vendors are making sure they don't become extinct. mark for My Articles similar articles
The Motley Fool
November 7, 2011
Tim Beyers
Facebook Can't Go Public Now The slightest misstep could set both Facebook and cloud-computing peers such as Google and salesforce.com back years in their efforts to replace install-and-maintain software alternatives. mark for My Articles similar articles
PC Magazine
June 22, 2004
Robert P. Lipschutz
Business Security Our buying guide sorts out the technologies and explains the best ways to protect yourself. mark for My Articles similar articles
InternetNews
January 15, 2008
Andy Patrizio
Webroot Offers Cloud-Based E-mail Scanning Service New service compliments Webroot's client-side software and provides filtering of e-mail for viruses, spyware, phishing and unwanted images. mark for My Articles similar articles
PC Magazine
November 4, 2003
The PC Innovations Just Don't Stop Contrary to conventional wisdom, PCs just keep getting better. mark for My Articles similar articles
CFO
January 30, 2004
Esther Shein
Spy vs. Spy Companies are spending billions on network security, but staying ahead of hackers may be a pipe dream. mark for My Articles similar articles
Search Engine Watch
June 19, 2010
Johnny Widerlund
Social Media: The Privacy and Security Repercussions How risky is our online behavior? A closer look at social media's privacy and security vulnerabilities. mark for My Articles similar articles
InternetNews
December 17, 2008
Warning, Your Antivirus Software May be Leaky If you think you're protected because you have antivirus applications installed, think again. mark for My Articles similar articles
InternetNews
September 21, 2010
Twitter Hit With Mouseover Malware Attack Twitter hit with attack that sees hackers embed JavaScript within URLs in tweets that display a pop-up directing users to malicious or pornographic websites. mark for My Articles similar articles
InternetNews
March 16, 2004
Sharon Gaudin
Report: Threats Coming from all Sides A Symantec study shows that the number of software security flaws has leveled off over the past year. That sounds like good news until you find out that it's leveled off at seven new vulnerabilities a day, or 2,636 a year. mark for My Articles similar articles
Information Today
February 2001
Marshall Breeding
A Prescription for Computer Health We finished the year with little to no damage to our computer systems. Read on to learn more about how to develop a successful strategy for computing in an increasingly dangerous world... mark for My Articles similar articles
T.H.E. Journal
April 2005
Jackson Ratcliffe
Dominican U. Secures Network to Protect Students and Faculty Dominican University of California takes steps to combat worms, viruses and spyware. mark for My Articles similar articles
InternetNews
November 4, 2009
McAfee Unveils Appliance for SMB Set E-mail and Web security appliance protects networks with minimal system administration requirements. mark for My Articles similar articles
CRM
September 2011
Brittany Farb
Cloud Expected to Keep Rising SaaS revenue will surpass $21 billion by 2015 mark for My Articles similar articles
PC World
March 2006
Tony Bradley
The New Virus Fighters Today's antivirus programs have no trouble stopping familiar intruders, but how safe are you from the unknown? A test of ten contenders reveals a new Best Buy. mark for My Articles similar articles
PC Magazine
August 11, 2008
Matthew D. Sarrel
The Rise of Blended Threats Technology has made the world smaller, and therefore more dangerous. mark for My Articles similar articles