MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
June 3, 2005
Tim Gray
Ever-Morphing Bagle Virus Going Strong A new variant of the Bagle downloader virus is spreading havoc again on unsuspecting users' machines, according to e-mail security firm MessageLabs. mark for My Articles similar articles
InternetNews
December 19, 2007
Trojan Found in Google Text Ads BitDefender says ads placed by Google in Web pages are being hijacked by Trojan software that replaces the intended text with ads from a different provider. mark for My Articles similar articles
PC World
January 28, 2002
Ellen Messmer
'My Party' E-Mail Virus Hides as URL Antivirus vendors urge update to protect against sneaky virus, which could open PCs to intruders... mark for My Articles similar articles
PC World
January 3, 2002
Joris Evers
Peer-to-Peer Apps Shared Trojan Horse Popular file-swapping programs installed spyware software even if users opted out, companies admit... mark for My Articles similar articles
PC World
April 9, 2001
Andrew Brandt
Eyes on the Spies Here's how to stop the three most common methods snoops use to monitor you on the Internet... mark for My Articles similar articles
PC Magazine
August 19, 2003
Sheryl Canter
Effective Immunity Viruses keep spreading, and PCs keep getting infected. What can you do to stay secure? mark for My Articles similar articles
PC World
August 5, 2002
Kim Zetter
Trojan Horse Technology Exploits IE Researchers show a tool that could admit hackers by pretending to be a trusted Microsoft application. mark for My Articles similar articles
InternetNews
September 15, 2009
Malware Ads Hit New York Times Media company's advertising staff approved bogus Vonage ad that distributed malware. mark for My Articles similar articles
InternetNews
April 27, 2005
Tim Gray
Google Typo Crashes Systems Spyware authors and phishing fraudsters have taken advantage of misspellings of google.com to infect computers with trojans and adware. mark for My Articles similar articles
IEEE Spectrum
November 2005
Lauren Aaronson
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. mark for My Articles similar articles
PC Magazine
June 20, 2007
Larry Seltzer
Beware Windows Hactivation Threat A new Trojan horse masquerading as a Windows security check is wreaking havoc on PCs. Find out how you can keep your system safe. mark for My Articles similar articles
PC Magazine
November 30, 2005
Jane Pinckard
Trojan Invades PSPs In early October, Symantec Security Response experts identified Trojan.PSPBrick, the first Trojan horse that targets Sony PlayStation Portable systems, as a Category 1 threat. mark for My Articles similar articles
PC World
November 26, 2001
Sam Costello
Antivirus Vendors Warn of Badtrans Worm Patch available for Outlook flaw that allows worm to propagate... mark for My Articles similar articles
PC World
October 2001
Ramon G. McLeod
Play CD-ROMs Without Using a Drive Farstone Technology's Virtual Drive 6.1 CD emulator speeds game play... mark for My Articles similar articles
PC Magazine
March 7, 2008
Larry Seltzer
ID Theft: The Next Level The new virus Trojan.Silentbanker regularly patrols the Internet for banking sites it can manipulate. mark for My Articles similar articles
InternetNews
July 27, 2004
Jim Wagner
More Gloom from MyDoom Virus The latest version of the virus is a vehicle for another Trojan horse, which attacks Microsoft.com... Symantec releases a removal tool. mark for My Articles similar articles
InternetNews
July 28, 2004
Ryan Naraine
Microsoft: Out-of-Cycle Security Patch Coming Due out next week, the patch will fix a software flaw that led to the Download.Ject malware attack. mark for My Articles similar articles
PC World
July 2001
Letters to PC World Your take on sharing music files, Trojan horses, and online safety... mark for My Articles similar articles
InternetNews
September 29, 2004
Ryan Naraine
Large Scale IM Virus Attack Feared The first signs of a large-scale virus attack are spotted on newsgroups regarding a Windows flaw in the way JPEG images are processed. mark for My Articles similar articles
InternetNews
July 14, 2004
Ryan Naraine
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues. mark for My Articles similar articles
InternetNews
January 9, 2004
Sean Michael Kerner
Fake Microsoft Service Pack is Xombe Trojan Another day, another virus. Unsuspecting Internet users were greeted Friday with an e-mail message purportedly from windowsupdate@microsoft.com to update their computers. Problem is, the message isn't from Microsoft and the patch is actually a back door Trojan. mark for My Articles similar articles
InternetNews
June 13, 2005
Tim Gray
New Trojan Pretends to be Antivirus Software Anti-virus maker F-Secure warned mobile phone users about a slippery new trojan disguising itself as an antivirus application. mark for My Articles similar articles
InternetNews
March 15, 2006
Sean Michael Kerner
New Trojan is Holding Data Ransom If you're the unlucky victim of the new cryzip Trojan making the rounds, it'll cost you $300 to get your data back from the Trojan's author. mark for My Articles similar articles
InternetNews
August 28, 2009
New Trojan Snags Skype Calls on Windows PCs Trojan.Peskyspy beats Skype encryption through Windows API attack. How serious is the threat? mark for My Articles similar articles
PC Magazine
August 17, 2004
Neil J. Rubenking
ShadowUser Pro 2.0 ShadowUser Pro 2.0 is best used by managers of public computers to protect the PCs (and their users) from malware. It's also an effective way for individuals to roll back to a good configuration after a problem (such as a virus attack) occurs, though it has only one such restore point. mark for My Articles similar articles
InternetNews
June 10, 2005
Tim Gray
Trojan Spreads in Michael Jackson Spotlight British anti-virus firm Sophos says hackers are slamming computers around the world with a Trojan virus by sending e-mails claiming Michael Jackson has tried to kill himself. mark for My Articles similar articles
PC World
April 2003
Zetter & Tweney
Internet Fixes Sneakier spam, wilier worms, more aggravating ads... no wonder it feels like your PC is under assault. Fight back with these simple steps for keeping the latest pests at bay. mark for My Articles similar articles
InternetNews
February 27, 2007
Ed Sutherland
Storm Trojan Takes Social Measures Storm Trojan uses Web mail, blogs and message boards as conduits for spreading malware code. mark for My Articles similar articles
PC World
August 17, 2001
Andrew Brandt
Code Red Worm Crawls Again Here's how to protect your systems from the potential menace's monthly emergence... mark for My Articles similar articles
PC World
September 26, 2007
Erik Larkin
Five of the Dirtiest Malware Tricks From disguising applets to look like part of Windows to co-opting security tools, Web crooks use a variety of methods to bypass your system's safeguards. mark for My Articles similar articles
InternetNews
October 3, 2005
Tim Gray
Trojan Exploits Office A Trojan Horse attacking Microsoft Office has been around since April. The malicious code is disguised as a Microsoft Access file. mark for My Articles similar articles
InternetNews
July 8, 2005
David Needle
CERT Warns on Latest Trojan Horse Attacks Targeted e-mail viruses may be behind some recent Internet outages. The trojan horse viruses can evade anti-virus software and appear to be from a trusted source. mark for My Articles similar articles
InternetNews
September 30, 2010
FBI Busts International Cybercrime Syndicate After a year-long investigation, the FBI and local law enforcement charges 37 hackers with using Zeus Trojan to steal more than $3 million from U.S. banks. mark for My Articles similar articles