Your Search returned 5 results from our Editorial content

Sort By


Why spy tools are booming in Latin America

We investigate the state of surveillance and censorship across Latin America


Duqu spy group also targeted telecommunications companies...

The group behind the Duqu cyberespionage tool has compromised at least two telecommunications operators and one electronic equipment manufacturer, in addition to...



Is that Twitter account a bot? Researchers make app to find...

They spread lies. They push products you don't care about. They make unpopular people look popular. Sometimes, they take over your machine with malware.


Report: Malware-infected Android apps spike in the Google...

The number of mobile apps infected with malware in Google's Play store nearly quadrupled between 2011 and 2013, a security group has reported.



Android one-click Google authentication method puts users,...

A feature that allows Android users to authenticate themselves on Google websites without having to enter their account password can be abused by rogue apps to give...


Your Search returned 8 results from our White Paper Library

Sort By
Symantec Corporation


Symantec Internet Security Threat Report

Symantec’s analysts unparalleled sources of data with which to identify, analyse, and provide informed commentary on emerging trends in attacks, malicious...

Symantec Corporation

Endpoint Security

Customer Success - Tree in The Glen

Treehouse in the Glen (, a certified Green toy store in Silicon Valley, replaced a variety of security solutions with Symantec...

Symantec Corporation

Endpoint Security

Small Business Endpoint Protection Performance Benchmarks...

Download the Passmark competitive benchmark report and check out how Symantec Endpoint Protection Small Business Edition performs against competing solutions....

Symantec Corporation

Internet Security

The Tangled Web: Silent Threats & Invisible Enemies

This white paper will cover how spyware steals personal identities and confidential data, the risks and vulnerabilities in your business.



Addressing Advanced Fraud Threats in Today’s Mobile Environment:...

This white paper looks at the potentials threats& stumbling blocks of mobile finance, as well as the opportunities available.


Endpoint Security

A Buyer's Guide to Endpoint Protection Platforms

This Gartner paper acts as buyer's guide to endpoint protection platforms, listing the most advanced features to help buyers differentiate solutions.


Microsoft Windows

Corporate Av/Epp Comparative Analysis: Exploit Protection...

This paper tests 11 enterprise level Endpoint protection (EPP) products to measure their effectiveness in protecting Windows computers against exploits....



Build a Better Sandbox: A working strategy for comprehensive...

This paper proposes a logical design strategy for dynamic malware analysis that optimizes detection.


Most Recent Comments

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk


Do you use any voice/digital assistants to help you work?