MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
CIO
October 30, 2012
Lucian Constantin
Lack of Abuse Detection Allows Cloud Computing Instances to Be Used Like Botnets, Study Says Some cloud providers don't detect attacks launched from their networks, researchers say mark for My Articles similar articles
InternetNews
October 3, 2007
Andy Patrizio
Symantec Adds Bot Hunting to Managed Services By using a traceback method, Symantec can look for hidden botnets within a corporate network. mark for My Articles similar articles
InternetNews
June 22, 2010
Botnet Still King of Malware Underworld Latest report from Gartner finds that while more sophisticated malware and phishing scams will proliferate, botnets will still be the top challenge for security experts for the foreseeable future. mark for My Articles similar articles
InternetNews
January 15, 2009
Richard Adhikari
The Web's Latest Threat: Smarter 'Zombies' Hacker-controlled PCs are outwitting security software - and are growing in number. mark for My Articles similar articles
InternetNews
January 8, 2008
Andy Patrizio
Move Over Storm, There's a New Botnet in Town Nugache, a once-minor botnet, gets an extreme makeover and may be rivaling Storm in terms of size and scale of nuisance. mark for My Articles similar articles
InternetNews
March 18, 2011
Rustock Botnet Beaten Down by Microsoft On the heels of last year's successful takedown of another giant botnet, Microsoft just shut down a bigger and more sophisticated botnet this week. mark for My Articles similar articles
InternetNews
November 8, 2010
Microsoft Unveils Hyper-V Cloud Initiative Hyper-V is designed to make it easier for customers to deploy private cloud environments either in-house or from a hosting provider. mark for My Articles similar articles
InternetNews
December 22, 2009
Andy Patrizio
Malware Writers Get Bold, Rent Datacenters Not content with infecting individual PCs, the criminals who run botnets are now setting up shop in legitimate data centers. How? mark for My Articles similar articles
PC Magazine
August 20, 2008
Matthew D. Sarrel
There's a Bot in Your PC Aiding the rise of blended threats around the world, botnets are digging in and using your network as a base of operations. mark for My Articles similar articles
InternetNews
August 23, 2007
Andy Patrizio
Storm Worm Gathers Strength on The Internet The Storm worm virus is still around, still causing trouble and stronger than ever six months later. mark for My Articles similar articles
InternetNews
January 22, 2009
Richard Adhikari
Downadup: The Web's Next Big Threat? Experts blame a lack of patching and an advanced design for the rise of a worm that could outpace Storm. mark for My Articles similar articles
InternetNews
May 5, 2009
Alex Goldman
Researchers Seize Botnet, Peer Into Net's Dark Side For 10 days, a UCSB team monitored a botnet known for stealing credit card data and bank account credentials. mark for My Articles similar articles
InternetNews
March 18, 2010
Stuart J. Johnston
What Microsoft Learned From Botnet Takedown Even software giant Microsoft had trouble corralling the Waledac malware-spreading botnight. mark for My Articles similar articles
The Motley Fool
August 11, 2008
Mac Greer
Fool Video: Amazon's Bright Cloud? Will cloud computing produce heavenly returns for Amazon.com? mark for My Articles similar articles
InternetNews
October 15, 2010
Microsoft Security Report: Botnets Enemy No. 1 In the latest installment of its Security Intelligence Report, Microsoft takes a look at the major online criminal blights plaguing enterprises and consumers, ranking botnets the worst of the worst. mark for My Articles similar articles
BusinessWeek
October 2, 2006
Ben Elgin
Click Fraud's Next Frontier If you place an advertisement on Google or Yahoo!, and you're paying the search giants each time somebody clicks, it would be nice to know that the clicker is a human being who might actually purchase your product. Unfortunately, there are no such assurances. mark for My Articles similar articles
Bank Systems & Technology
February 18, 2010
Penny Crosman
Q&A: Alex Cox, Discoverer of Today's Massive Botnet Attack Data security expert Alex Cox tells how banks can protect themselves against the Kneber botnet he discovered, which has infected 75,000 computers at 2,500 organizations around the world, and which is still active. mark for My Articles similar articles
InternetNews
January 26, 2009
Richard Adhikari
New Botnets Emerge as Older Peers Limp Along A changing of the guard has taken place among spam-spewing botnets. Who are some of the ones to watch? mark for My Articles similar articles
Information Today
April 1, 2014
dinCloud and ThreatSTOP Partner to Enhance Security Their collaboration gives dinCloud customers a constant threat-source-detection and blocking service that protects against criminal malware. mark for My Articles similar articles
InternetNews
August 13, 2010
Microsoft Execs Talk Cloud, Windows 7 Plans Windows 7 has been a huge hit among consumers for Microsoft, but the software giant is also counting on big enterprise sales. mark for My Articles similar articles
InternetNews
March 17, 2006
Sean Michael Kerner
Botnets on The Run? Security researchers have identified numerous botnets of zombies in recent days and in at least one case ended their reign of the undead. mark for My Articles similar articles
InternetNews
January 26, 2009
Richard Adhikari
Spammers Working to Regain Lost Ground Businesses can expect more malware this year as the spammers recover from the McColo take-down. mark for My Articles similar articles
InternetNews
March 16, 2009
Alex Goldman
Report Says Spam Arms Race Escalating The bad guys are recovering from the loss of McColo and learning how to prevent being taken down so easily again. mark for My Articles similar articles
InternetNews
May 25, 2007
Andy Patrizio
Standards Group OKs E-Mail Validation Spec The Internet Engineering Task Force has adopted a vendor-developed specification designed to detect e-mail with bogus header information. The technology could help reduce spam and phishing attacks that clog Internet traffic. mark for My Articles similar articles
InternetNews
June 29, 2010
McAfee Rolls Out SaaS Cloud Security Suite With its latest offering, SaaS Web Protection, security vendor McAfee is aiming to deliver a cloud-based software portfolio to combat malware and other online threats. mark for My Articles similar articles
PC Magazine
June 26, 2007
Jim Louderback
Beware of Botnets Botnets are the successors to spyware... Helio's new Ocean phone... ISP speed tests reveal surprising results about DSL, fiber, and cable... mark for My Articles similar articles
InternetNews
December 9, 2010
Public Cloud, Virtualization Uptake Slow: Cisco New study from networking giant quantifies global business usage of cloud and virtualization technologies, finding that adoption lags well behind intent. mark for My Articles similar articles
Bank Systems & Technology
August 17, 2010
Penny Crosman
Banks Still Face Obstacles to Cloud Computing Security concerns, old programs, vendor licensing issues and the risk of 'spreading the IT mess' all stand between banks and ideal cloud computing environments. mark for My Articles similar articles
InternetNews
December 1, 2008
Richard Adhikari
Botnets Bouncing Back Despite McColo's takedown, observers say that major senders of spam and malware are returning - and may be stronger than ever. mark for My Articles similar articles
InternetNews
July 30, 2007
Andy Patrizio
Trend Micro Readies Security SaaS Antivirus developer Trend Micro said it's ready to take on some big names with its new SecureCloud Software-as-a-Service security platform for businesses. mark for My Articles similar articles
InternetNews
June 6, 2007
Andy Patrizio
Microsoft IIS a Popular Target For Malware According to a report by Google, malware is as prevalent on Microsoft's Internet Information Servers as the far more popular Apache Web server. mark for My Articles similar articles
The Motley Fool
November 20, 2010
Matthew Lynley
Dell: The Public Cloud Doesn't Scare Us! Although maybe it should. mark for My Articles similar articles
InternetNews
November 2, 2010
HP's Details Hybrid Approach to Cloud Services HP has an "Instant-On" vision of how cloud services can enhance the traditional data center infrastructure. mark for My Articles similar articles
InternetNews
November 30, 2010
Most New Malware Disappears Within A Day: Study New strains of malware are popping up at an unprecedented rate but, fortunately, most of these variants are stamped out within the first 24 hours. mark for My Articles similar articles
InternetNews
November 20, 2009
Past Year's Malware Could Shape 2010's Threats Ever heard of Induc, Sninsfs or OSX.iservice? These new types of attacks emerged in 2009 and could become more prevalent in the year ahead. mark for My Articles similar articles
InternetNews
November 12, 2008
Christopher Saunders
Media Spotlight Scatters a Botnet Host ISPs spring into action after a mainstream publication fingers a U.S. Web hosting company for its role in the global spam and malware epidemic. mark for My Articles similar articles
InternetNews
February 11, 2010
Red Hat Talks Up Open Source Cloud Plans Red Hat details initiatives aimed at expanding infrastructure and applications through cloud-based open source projects at its Open Source Cloud Computing Forum. mark for My Articles similar articles
PHONE+ Countering Objections to Cloud Computing Armed with the right information, solution providers can counter common objections to cloud computing sales. mark for My Articles similar articles
InternetNews
March 27, 2009
Alex Goldman
Conficker Countdown: Experts Stress Caution Malware code has infected millions of PCs and will activate on April 1. What do security insiders say users need to know? mark for My Articles similar articles
PC Magazine
June 9, 2010
Neil J. Rubenking
Panda Cloud Antivirus 1.1 Review & Rating Panda Security has spent the last few years mastering behavior-based detection, cloud-based antivirus scanning, and free security software. Panda Cloud Antivirus 1.1 (free, direct) brings all these threads together. mark for My Articles similar articles
PC Magazine
July 25, 2007
Neil J. Rubenking
GarbageClean 2.0 Don't rely on GarbageClean for malware protection. It doesn't matter how little it costs -- it's still garbage. mark for My Articles similar articles
PHONE+
September 1, 2009
Steve Hilton
Ask Steve: Is Cloud Computing Ready for SMBs? Wide-scale cloud-based computing offerings for SMBs are still in the early design phase. mark for My Articles similar articles
InternetNews
November 17, 2010
Stuxnet, Mobile Threats Top 3Q Malware Report Security software vendor McAfee's 3Q Threats Report takes note of some older malware scams from the past and some new and discouraging new ones. mark for My Articles similar articles
IEEE Spectrum
December 2012
Ko et al.
Understanding Cloud Failures An analysis of 172 incidents reveal new categories of problems mark for My Articles similar articles
PC Magazine
August 19, 2003
Dennis Fisher
The Lookout: New Breed of Trojan Security researchers believe they have identified a new breed of Trojan horse that is infecting machines on the Internet, possibly in preparation for a larger coordinated attack. mark for My Articles similar articles
InternetNews
January 13, 2010
HP, Microsoft Team on Cloud, Datacenter Work The effort will center on Windows Azure, and aims to claim a bigger piece of the growing action in cloud computing. mark for My Articles similar articles
PC Magazine
May 11, 2009
Neil J. Rubenking
Prevx 3.0 This behavior-based tool does better overall than its signature-based competition-and it's tiny, because detection takes place in the cloud. mark for My Articles similar articles
PC Magazine
January 1, 2011
Larry Seltzer
Computer Security: How It Looks for 2011 Here are what security vendors predict for 2011. mark for My Articles similar articles
National Defense
October 2009
Jean & Erwin
Research Detects Spamming Attacks Researchers at Microsoft have developed a system to detect botnet attacks on Web email providers mark for My Articles similar articles
IndustryWeek
February 16, 2011
NIST Tackles Security Concerns on the Cloud Study includes recommendations for securely configuring and using full computing virtualization technologies. mark for My Articles similar articles