Your Search returned 5 results from our Editorial content

Sort By


Why spy tools are booming in Latin America

We investigate the state of surveillance and censorship across Latin America


Duqu spy group also targeted telecommunications companies...

The group behind the Duqu cyberespionage tool has compromised at least two telecommunications operators and one electronic equipment manufacturer, in addition to...



Is that Twitter account a bot? Researchers make app to find...

They spread lies. They push products you don't care about. They make unpopular people look popular. Sometimes, they take over your machine with malware.


Report: Malware-infected Android apps spike in the Google...

The number of mobile apps infected with malware in Google's Play store nearly quadrupled between 2011 and 2013, a security group has reported.



Android one-click Google authentication method puts users,...

A feature that allows Android users to authenticate themselves on Google websites without having to enter their account password can be abused by rogue apps to give...


Your Search returned 8 results from our White Paper Library

Sort By
Symantec Corporation


Symantec Internet Security Threat Report

Symantec’s analysts unparalleled sources of data with which to identify, analyse, and provide informed commentary on emerging trends in attacks, malicious...

Symantec Corporation

Endpoint Security

Customer Success - Tree in The Glen

Treehouse in the Glen (, a certified Green toy store in Silicon Valley, replaced a variety of security solutions with Symantec...

Symantec Corporation

Endpoint Security

Small Business Endpoint Protection Performance Benchmarks...

Download the Passmark competitive benchmark report and check out how Symantec Endpoint Protection Small Business Edition performs against competing solutions....

Symantec Corporation

Internet Security

The Tangled Web: Silent Threats & Invisible Enemies

This white paper will cover how spyware steals personal identities and confidential data, the risks and vulnerabilities in your business.



Addressing Advanced Fraud Threats in Today’s Mobile Environment:...

This white paper looks at the potentials threats& stumbling blocks of mobile finance, as well as the opportunities available.


Endpoint Security

A Buyer's Guide to Endpoint Protection Platforms

This Gartner paper acts as buyer's guide to endpoint protection platforms, listing the most advanced features to help buyers differentiate solutions.


Microsoft Windows

Corporate Av/Epp Comparative Analysis: Exploit Protection...

This paper tests 11 enterprise level Endpoint protection (EPP) products to measure their effectiveness in protecting Windows computers against exploits....



Build a Better Sandbox: A working strategy for comprehensive...

This paper proposes a logical design strategy for dynamic malware analysis that optimizes detection.

Recommended for You


US ‘hacking back’ law could create a cyber wild west of vigilantism

Dan Swinhoe casts a critical eye on the future


A c-suite guide to blockchain 2018

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.


Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.



If it were legal, would your organization hack back?