MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
March 25, 2008
Sean Michael Kerner
Report: 90% of Web Sites Vulnerable to Hackers New study claims Cross-Site Scripting attacks are all over the place. Should we be afraid? mark for My Articles similar articles
InternetNews
February 20, 2009
Richard Adhikari
Group Warns of Top Web 2.0 Security Threats We can't stand in the path of progress with Web 2.0 technologies, but we can make it safer, an industry group says. mark for My Articles similar articles
InternetNews
February 4, 2009
Sean Michael Kerner
IBM AppScan Takes Aim at Securing Flash New application security release tries to secure the latest Web apps, but IBM admits that challenges still remain. mark for My Articles similar articles
InternetNews
July 18, 2007
Sean Michael Kerner
Google's Black Box Lemon Google, the company's security team is developing a black box fuzzing tool called Lemon, which is intended to automatically find XSS problems in applications. mark for My Articles similar articles
InternetNews
August 10, 2009
IBM Adds Web App Defense to Security Portfolio IBM today unveiled new enhancements to its security suite aimed at safeguarding Web applications and data, as attacks preying on such targets continue to dominate the headlines. mark for My Articles similar articles
InternetNews
February 2, 2009
Richard Adhikari
Are Legitimate Sites the Next Malware Threat? Businesses may be exposing their customers to malware by leaving their sites unpatched, IBM warns in a new study. mark for My Articles similar articles
InternetNews
November 13, 2007
Sean Michael Kerner
IBM on Fire Five months after being acquired by IBM, Watchfire is out with its latest release of its security scanning product AppScan. mark for My Articles similar articles
InternetNews
April 17, 2007
Sean Michael Kerner
Watchfire Expands to Open Source Ecosystem Application security vendor Watchfire is opening up its AppScan product to help extend its vulnerability scanning capabilities. mark for My Articles similar articles
InternetNews
January 4, 2010
Big Blue Brings Better Code Security to Rational Thanks to a recent acquisition, IBM is integrating static analysis into its Rational family of products. mark for My Articles similar articles
InternetNews
August 27, 2009
IBM's X-Force Report Praises Sun for Fast Fixes Security report on trends in vulnerabilities, threats, spam, and phishing finds Sun has passed Microsoft in terms of reporting and fixing OS problems. mark for My Articles similar articles
InternetNews
March 30, 2010
IBM to Help Defend FAA From Cyber Attacks IBM will test a new system to monitor and safeguard the FAA's networks against hackers, data theft and malware. mark for My Articles similar articles
InternetNews
February 5, 2010
SQL Injections Led to 60% of UK Data Breaches Malicious hackers are relying on growing numbers of increasingly complex SQL attacks to get at companies' data. mark for My Articles similar articles
InternetNews
July 31, 2006
Clint Boulton
SQL Injection Threatens to Needle Web Users A scripting flaw that lets perpetrators pull any content from a database is a scary tool for IT admins. mark for My Articles similar articles
InternetNews
March 2, 2010
IBM Looks to Secure IT From Soup to Nuts At annual RSA security show, IBM unveils enterprise IT security suite that includes products to secure operations from application code all the way through deployment. mark for My Articles similar articles
InternetNews
September 22, 2008
Sean Michael Kerner
IBM Targets Security at Developers AppScan Developer Edition is aimed at integrating into the development process - helping developers stamp out vulnerabilities early in the process. mark for My Articles similar articles
InternetNews
August 25, 2010
More Security Holes in Software, Fewer Patches According to IBM's X-Force security research group, vulnerabilities are proliferating, and while companies are getting better about reporting those flaws, the number of unpatched problems continues to rise. mark for My Articles similar articles
InternetNews
February 9, 2010
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. mark for My Articles similar articles
InternetNews
June 8, 2010
IBM Offers Secure Application Design Tools New security offerings will deal with security issues during the application development process rather than after the app is done. mark for My Articles similar articles
InternetNews
February 25, 2010
Malware Thrives Despite Improved Security: IBM Security researchers at IBM's X-Force find 6,601 new software vulnerabilities in 2009, down 11 percent from last, but that hasn't stopped hackers and phishers from finding new ways to rip off consumers. mark for My Articles similar articles
Bank Technology News
September 2009
Rebecca Sausner
Everything That Can Go Wrong The aftermath of the breach of Albert Gonzalez has had some positive effects. mark for My Articles similar articles
The Motley Fool
July 20, 2010
Eric Bleeker
IBM Delivers, Then Drops Like A Rock Big Blue's earnings growth can't hide revenue woes mark for My Articles similar articles
InternetNews
March 31, 2011
Report: Nearly Half of Vulnerabilities Left Unpatched IBM's X-Force 2010 Trend and Risk Report details a 27 percent rise in vulnerabilities, with nearly half left unpatched by year's end. mark for My Articles similar articles
InternetNews
July 20, 2004
Ryan Naraine
MasterCard, Others Plug Script Injection Leak Credit card giant MasterCard is among many online financial institutions rushing to fix Web site design security flaws. mark for My Articles similar articles
InternetNews
June 11, 2007
Erin Joyce
Big Blue to Buy Telelogic For $745M IBM adds more software development tools for the complexities of the automotive sector. mark for My Articles similar articles
InternetNews
June 6, 2007
Clint Boulton
Where There's IBM, There's Watchfire IBM today agreed to buy security and compliance testing software vendor Watchfire for an undisclosed sum. mark for My Articles similar articles
InternetNews
December 10, 2009
Fast-Moving SQL Attack Hits 125,000-Plus Sites Nasty SQL injection attack has ties to a credit card-snatching trojan - and may just be getting started. mark for My Articles similar articles
InternetNews
October 17, 2008
Richard Adhikari
Adobe Sites Hit by Malware Just weeks after a BusinessWeek Web site was hit by an SQL injection attack, comes news that Adobe has had to deal with two of its Web sites compromised the same way. mark for My Articles similar articles
InternetNews
April 21, 2009
Alex Goldman
IBM Says Cloud, Virtualized Tech Need Lockdown In their haste to embrace the latest technologies, many enterprises have architected new security holes in their networks, IBM warns. mark for My Articles similar articles
InternetNews
April 19, 2011
IBM Kicks Off First Quarter With Strong Results IBM exceeds expectations and raises outlook for the full year. mark for My Articles similar articles
InternetNews
June 5, 2006
Sean Michael Kerner
IBM's Rational Takes One For The 'Team' End-to-end integration and capabilities are on the table as IBM moves to solidify its position in the application development space. mark for My Articles similar articles
PC World
February 21, 2007
Erik Larkin
Don't Let Bad Guys Pose as You Flaws let attackers trick a Web site into providing your personal information. mark for My Articles similar articles
InternetNews
October 5, 2007
Andy Patrizio
IBM Unleashes Rational, Tivoli Tools For SMBs IBM announced new software designed to provide growing companies with the kinds of tools normally only available to enterprises. mark for My Articles similar articles
InternetNews
July 1, 2009
Sean Michael Kerner
Twitter Bug Hunt Highlights bit.ly Flaws The Month of Twitter Bugs gets rolling with the popular link-shortening service receiving the brunt of attention on its first day. mark for My Articles similar articles
The Motley Fool
March 16, 2011
Cindy Johnson
Hidden in Plain Sight, Wall Street Discovers a Tech Gem Misunderstood and underappreciated for years, IBM is starting to get credit for transforming itself over the last couple of decades into a well-oiled, cash-generation machine. mark for My Articles similar articles
The Motley Fool
August 12, 2008
Mac Greer
Fool Video: 3 Tech Stocks for Now Is it time for investors to buy tech? This question is discussed in this video. mark for My Articles similar articles
InternetNews
April 1, 2010
IBM Offers Software, Expertise to Startups IBM announces it will give away free access to its software and technologists to startups as part of its Smarter Planet marketing strategy - and build its brand in the process. mark for My Articles similar articles
InternetNews
April 12, 2005
Michael Singer
Oracle Security Updates Include PeopleSoft Fixes The company issued 15 separate patches for multiple security vulnerabilities, but older flaws still loom. mark for My Articles similar articles
T.H.E. Journal
February 2009
John K. Waters
IT Security: Target: The Web No longer focused on the network, hackers have a bull's eye now trained squarely on web-based applications. What, if anything, can school districts do to thwart them? mark for My Articles similar articles
InternetNews
March 30, 2010
Apple Tackles 53 Security Holes in OS X OS X "Snow Leopard" gets updated to 10.6.3 while earlier versions get updated to 10.5.8. mark for My Articles similar articles
InternetNews
August 18, 2010
IBM Builds Out Rational Power Appliance Family Big Blue releases new turnkey application development appliances for IBM Power Systems. mark for My Articles similar articles
InternetNews
February 1, 2010
Programming Errors Exacerbate Flash Flaws Foreground Security analyst Mike Bailey's trial-and-error approach to researching Adobe Flash and its security model yields some interesting - and troubling - findings for programmers. mark for My Articles similar articles
InternetNews
October 18, 2010
IBM Surges Past Q3 Earnings Forecast IBM handily tops analysts' projections for its third-quarter profits, citing across-the-board increases in hardware, software and services, and rising margins. mark for My Articles similar articles
InternetNews
December 15, 2006
Sean Michael Kerner
Google Fixes Adwords Security Flaw Google AdWords advertisers can rest easy this weekend, secure in the knowledge that Google has acted quickly to fix a potential cross-site scripting security vulnerability. mark for My Articles similar articles
InternetNews
January 14, 2009
Richard Adhikari
New York Plans Application Security Program Developers must straighten up and fly right if they want to do business with the Empire State. mark for My Articles similar articles
The Motley Fool
December 14, 2006
Tom Taulli
Searching for Big Blue IBM is moving aggressively into the software space. mark for My Articles similar articles
Search Engine Watch
April 14, 2011
Kristine Schachinger
3 Website Exploits - Are You Protected? Examining three common attacks that can hurt your visitors and rankings, and tips on how to prevent your site from being hacked. mark for My Articles similar articles
InternetNews
September 12, 2007
Sean Michael Kerner
Was IBM.com at Cross-Site Scripting Risk? A Japanese security researcher has alleged that an Atom format syndication feed on IBM.com was at risk from a Cross-Site Scripting attack. mark for My Articles similar articles
The Motley Fool
June 9, 2010
Is IBM a Buy? While other tech companies -- such as Apple -- take a lot of heat for hoarding cash, IBM leverages its balance sheet better than any other tech company. mark for My Articles similar articles
InternetNews
May 4, 2005
Tim Gray
IBM to Cut up to 13,000 Jobs IBM said it will lay off up to 13,000 employees in Europe as part of a restructuring plan to address a sagging global revenue picture. mark for My Articles similar articles
InternetNews
April 22, 2009
Sean Michael Kerner
Mozilla Firefox 3.0.9 Fixes XSS Flaws Simply refreshing a site is a security risk? mark for My Articles similar articles