MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
May 20, 2010
South America Emerges As Cybercrime Hotspot China gets all the bad press but it turns out that Luxembourg, the Cayman Islands and a bunch of South American countries are actually the least discriminating when it comes to filtering malware. mark for My Articles similar articles
InternetNews
September 7, 2010
Cybersecurity Czar: Privacy Won't Be a Casualty NSA Director Gen. Keith Alexander reaffirmed his view that protecting U.S. government, military and civilian data networks doesn't mean sacrificing citizens' right to privacy. mark for My Articles similar articles
InternetNews
March 25, 2010
Symantec: China Is Tops in Targeted Malware Symantec's latest report pinpoints China as the leading source of malware tailored to hoodwink execs in specific industries. mark for My Articles similar articles
InternetNews
January 15, 2010
Larry Barrett
Russia Blamed for 13% of Global Cyber Attacks New report from Akamai awards Russia the dubious distinction of world's leading source of cyber threats. mark for My Articles similar articles
InternetNews
February 24, 2010
Cyber Attacks Hit 75% of Enterprises in 2009 Symantec's latest report has more unsettling news for IT security administrators. mark for My Articles similar articles
InternetNews
April 23, 2009
Kenneth Corbin
House Panel Begins Work on Online Privacy Law In NebuAd's shadow, lawmakers probe data-collection practices of ISPs as they debate just how far online privacy legislation should reach. mark for My Articles similar articles
InternetNews
December 28, 2010
Security 2010: The Year in Review Stuxnet, embarrassing data leaks and sophisticated phishing attacks dominated the data security landscape in 2010. mark for My Articles similar articles
InternetNews
August 3, 2010
Most Don't Object to Cyber Spying: Report A survey by a prominent security software firm reveals that most people don't mind if the government uses cyber spying techniques to keep tabs on our enemies. mark for My Articles similar articles
InternetNews
February 25, 2010
CTIA Calls for Location-Based Privacy Rules As the privacy debate turns to location-based services, wireless association seeks clarification from Congress on the rules for sharing data with law enforcement authorities. mark for My Articles similar articles
InternetNews
February 17, 2010
When the Cyber Attack Comes, Will We Be Ready? War-game simulation of a massive cyber attack on U.S. infrastructure highlights emergency provisions administration officials might be forced to take. mark for My Articles similar articles
PC World
September 11, 2002
Andrew Brandt
A Year Later, Online Privacy and Security Still Weak Guarding both virtual and physical shores remains a challenge of checks and balances. mark for My Articles similar articles
InternetNews
December 30, 2010
Looking Back on Web Privacy: 2010 Internet privacy was a favorite topic among regulators, lawmakers and advocacy groups, but for all the debate, how far did the government get toward reining in online data collection? mark for My Articles similar articles
InternetNews
February 9, 2010
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. mark for My Articles similar articles
InternetNews
January 22, 2008
Kenneth Corbin
Google, Consumer Groups Fire Opening Salvos in EU Talks As the European Commission reviews the blockbuster Google/DoubleClick merger, rivals debate the impact on privacy. mark for My Articles similar articles
InternetNews
November 20, 2009
Microsoft: No 'Back Door' in Windows 7 But cozy ties between spy agency and tech industry have some privacy advocates worried. mark for My Articles similar articles
InternetNews
February 20, 2009
Kenneth Corbin
Privacy Groups Blast ISP Data-Retention Bill Privacy advocates are lashing out at a renewed effort by lawmakers to impose requirements on ISPs and wireless network operators to keep records about the identities of Internet users. mark for My Articles similar articles
Search Engine Watch
June 19, 2010
Johnny Widerlund
Social Media: The Privacy and Security Repercussions How risky is our online behavior? A closer look at social media's privacy and security vulnerabilities. mark for My Articles similar articles
Bank Systems & Technology
September 15, 2007
Sharon Gaudin
Number Of Hackers Attacking Banks Jumps 81% Hackers no longer need to be technical wizards to set up an operation to steal people's banking information and then rob their accounts. mark for My Articles similar articles
Reason
April 2002
Jeremy Lott
Fake IDs Facial recognition technology is often billed as a tradeoff between privacy and security. A recent American Civil Liberties Union report suggests that it's closer to a no-win deal, resulting in less privacy and precious little added security... mark for My Articles similar articles
PC World
November 2004
Andrew Brandt
Listening In to Net Phone Conversations The ability to make phone calls over the Internet creates new communication options for all of us--including, unfortunately, criminals. Federal law enforcement officials want to make sure that when bad guys use Net phones, the cops can listen in. mark for My Articles similar articles
InternetNews
September 7, 2010
Google Faces Heat Over Privacy Tweaks A move to reduce legalese has one privacy advocacy group up in arms. mark for My Articles similar articles
InternetNews
February 25, 2010
Malware Thrives Despite Improved Security: IBM Security researchers at IBM's X-Force find 6,601 new software vulnerabilities in 2009, down 11 percent from last, but that hasn't stopped hackers and phishers from finding new ways to rip off consumers. mark for My Articles similar articles
Information Today
November 12, 2015
FCC Allows Internet Companies to Keep Tracking User Activities According to The Washington Post, the Federal Communications Commission will not impose a requirement on Google, Facebook, and other internet companies that could make it more difficult to track user activities. mark for My Articles similar articles
InternetNews
March 4, 2010
DHS Chief: Security Requires Faster Response Department of Homeland Security Secretary Janet Napolitano told security experts and media that while many great ideas have been suggested, less talk and more action is needed to safeguard government and corporate networks. mark for My Articles similar articles
InternetNews
March 19, 2004
Ryan Naraine
It is Time for Some 'Friendly' Worms Let's face it folks, the virus writers have the upper hand these days. Is it time for the industry to be bold and imaginative about fighting back? mark for My Articles similar articles
InternetNews
January 28, 2010
IT Managers Brace for a Barrage of Cyber Attacks Despite increased awareness and new state and federal legislation, most enterprise IT managers expect to be victimized by a major cyber attack in the next five years. mark for My Articles similar articles
CIO
January 1, 2002
Stephanie Viscasillas
Privacy Versus the FBI The antiterrorism law President Bush signed in late October makes it easier for officials investigating potential terrorist activity to get court orders to search companies' business records. It is important to take that into account in your privacy policy. mark for My Articles similar articles
InternetNews
February 20, 2009
Richard Adhikari
Attack Preys on New Adobe Acrobat Vulnerability Experts warn businesses and government agencies on the latest flaw uncovered in one of Adobe's popular applications. mark for My Articles similar articles
InternetNews
April 20, 2010
Hackers Breached Google's Password Hub: Report New report cites source close to investigation claiming that hackers in China were able to compromise the password service that acts as gateway to Google's Web products and services. mark for My Articles similar articles
InternetNews
May 13, 2010
One Gang Responsible For Most Phishing Attacks More than two-thirds of all phishing attacks in the second half of 2009 were the work of one gang, according to an anti-phishing group. mark for My Articles similar articles
Information Today
May 3, 2012
Paula J. Hane
Online Consumer Privacy in the Spotlight Choose Privacy Week is being held May 1-7, 2012. The theme is "Freedom from Surveillance." The American Library Association's Office for Intellectual Freedom established Choose Privacy Week to deepen public awareness about this issue. The event is timely with many privacy issues like CISPA in the news. mark for My Articles similar articles
InternetNews
February 24, 2010
Lawmakers Dig In On Cybersecurity Bill Supporters of the Cybersecurity Act of 2009 remain steadfast in their support of a bill that would expand President Obama's authority to intervene in the event of a major cyber attack. mark for My Articles similar articles
InternetNews
December 3, 2009
Kenneth Corbin
Privacy Advocates Press for Net Legislation A new effort by the Center for Democracy and Technology coincides with signs of movement in Congress on Internet privacy. mark for My Articles similar articles
InternetNews
June 3, 2009
Kenneth Corbin
Microsoft, Google Cautiously Endorse Privacy Bill Privacy attorneys for leading Web firms offer support for a limited, general privacy bill as debate in Congress looms. mark for My Articles similar articles
Search Engine Watch
June 5, 2010
Johnny Widerlund
Avoiding Online Risks Kicking Off with the 2010 FIFA World Cup Cyber criminals will continue hijacking current news and events to serve malware. A rundown of the most prevalent online security risks, and how to avoid them. mark for My Articles similar articles
InternetNews
December 30, 2009
Malware Targeting Adobe, Social Sites in 2010 Security player McAfee runs down its picks for malware creators' highest-priority targets in the coming year. mark for My Articles similar articles
PC World
September 12, 2001
Tom Spring & Frank Thorsberg
Will Attack Hurt Net Privacy? Privacy advocates urge government to balance security needs and civil liberties... mark for My Articles similar articles
InternetNews
May 13, 2010
APWG Fingers 'Avalanche' Phishing Syndicate The Anti-Phishing Working Group says one highly sophisticated and well-organized group of cyber thieves was responsible for a huge spike in phishing attacks late last year. mark for My Articles similar articles
PC World
October 7, 2002
Michelle Madigan
Privacy Concerns Pushed to Front Lines Feds must explore, explain any effect on privacy by new policies or practices, under pending legislation. mark for My Articles similar articles
InternetNews
February 17, 2011
RSA: Security Experts Debate Cyberwar Threat From corporate espionage to WikiLeaks, experts at the RSA conference debate the challenge of maintaining computer security. mark for My Articles similar articles
InternetNews
August 23, 2010
Facebook Touts Places Privacy Controls Responding to early criticism about the privacy settings of its new location-based service Places, Facebook takes pains to point out the various ways that people can control their information. mark for My Articles similar articles
InternetNews
April 8, 2010
Massive Cyber Spy Ring Seen Operating in China New report details the activities of the "Shadow network," a sophisticated group of cyber criminals traced back to China, prompting denial from a state official. mark for My Articles similar articles
Salon.com
September 14, 2001
Katharine Mieszkowski
Send in the online spooks? In the aftermath of terrorism, civil libertarians are running for cover. But are they protesting too much? mark for My Articles similar articles
InternetNews
November 11, 2005
Roy Mark
FBI Hunkered in The Bunker Cyber G-men are responsible for investigating cyber attacks by foreign adversaries and terrorists, and for preventing online criminals from using the Internet to steal, defraud and otherwise victimize U.S. citizens, businesses and communities. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
InternetNews
June 4, 2010
Hackers Zero In On Execs With World Cup Scam A flurry of malware scams are using e-mails related to the upcoming World Cup to target executives at companies and organizations around the world. mark for My Articles similar articles
Commercial Investment Real Estate
Sep/Oct 2015
Alan Lyons
Cyber Scares Protect your real estate business from online security breaches. mark for My Articles similar articles
BusinessWeek
May 12, 2011
Sara Forden
Online Privacy: Can the U.S. Get Its Act Together? A spate of high-profile data security breaches may finally compel Washington to draft a comprehensive privacy policy. mark for My Articles similar articles
PC World
April 16, 2001
David Clarke
Internet Privacy: A Matter of Competition? Privacy policy debate considers legislation, self-regulation, and letting the market decide... mark for My Articles similar articles
InternetNews
October 26, 2010
Obama Administration Forms Online Privacy Panel New Subcommittee on Privacy and Internet Policy includes representatives from a broad range of executive agencies, aims to help formulate administration policy on a hot-button Internet issue. mark for My Articles similar articles