Your Search returned 3 results from our Editorial content

Sort By

INTERNET

Is that Twitter account a bot? Researchers make app to find...

They spread lies. They push products you don't care about. They make unpopular people look popular. Sometimes, they take over your machine with malware.

IT & SYSTEMS MANAGEMENT

Report: Malware-infected Android apps spike in the Google...

The number of mobile apps infected with malware in Google's Play store nearly quadrupled between 2011 and 2013, a security group has reported.

   

ANTI-SPYWARE

Android one-click Google authentication method puts users,...

A feature that allows Android users to authenticate themselves on Google websites without having to enter their account password can be abused by rogue apps to give...

   

Your Search returned 11 results from our White Paper Library

Sort By
Symantec Corporation

Anti-Spam

Symantec Internet Security Threat Report

Symantec’s analysts unparalleled sources of data with which to identify, analyse, and provide informed commentary on emerging trends in attacks, malicious...


Symantec Corporation

Endpoint Security

Customer Success - Tree in The Glen

Treehouse in the Glen (www.treehouseintheglen.com), a certified Green toy store in Silicon Valley, replaced a variety of security solutions with Symantec...


Symantec Corporation

Endpoint Security

Small Business Endpoint Protection Performance Benchmarks...

Download the Passmark competitive benchmark report and check out how Symantec Endpoint Protection Small Business Edition performs against competing solutions....


Symantec.cloud

Encryption

Encryption and Data Protection

Your company’s critical data is constantly under threat. Find out all you need to know about the benefits of encryption, including how it can provide strong...


Symantec Corporation

Internet Security

The Tangled Web: Silent Threats & Invisible Enemies

This white paper will cover how spyware steals personal identities and confidential data, the risks and vulnerabilities in your business.


Entrust

Malware

Addressing Advanced Fraud Threats in Today’s Mobile Environment:...

This white paper looks at the potentials threats& stumbling blocks of mobile finance, as well as the opportunities available.


McAfee

Endpoint Security

A Buyer's Guide to Endpoint Protection Platforms

This Gartner paper acts as buyer's guide to endpoint protection platforms, listing the most advanced features to help buyers differentiate solutions.


McAfee

Microsoft Windows

Corporate Av/Epp Comparative Analysis: Exploit Protection...

This paper tests 11 enterprise level Endpoint protection (EPP) products to measure their effectiveness in protecting Windows computers against exploits....


Webroot

Fraud Detection & Prevention

Phishing 2.0

This white paper looks at how phishing emails have changed in recent years, and how companies can protect against them.


McAfee

Malware

Build a Better Sandbox: A working strategy for comprehensive...

This paper proposes a logical design strategy for dynamic malware analysis that optimizes detection.


Previous 1
no-image

Most Recent Comments

no-image

Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/213/brocade
  • /view_company_report/1487/canon
  • /view_company_report/103/cisco-systems-inc
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/31/ipswitch
  • /view_company_report/1219/jama-software
  • /view_company_report/1592/pivotal
  • /view_company_report/506/qualys
  • /view_company_report/1242/teradata

Poll

Does sealed hardware stifle innovation?