Your Search returned 5 results from our Editorial content

Sort By

ANTI-SPYWARE

Why spy tools are booming in Latin America

We investigate the state of surveillance and censorship across Latin America

ANTI-SPYWARE

Duqu spy group also targeted telecommunications companies...

The group behind the Duqu cyberespionage tool has compromised at least two telecommunications operators and one electronic equipment manufacturer, in addition to...

   

INTERNET

Is that Twitter account a bot? Researchers make app to find...

They spread lies. They push products you don't care about. They make unpopular people look popular. Sometimes, they take over your machine with malware.

IT & SYSTEMS MANAGEMENT

Report: Malware-infected Android apps spike in the Google...

The number of mobile apps infected with malware in Google's Play store nearly quadrupled between 2011 and 2013, a security group has reported.

   

ANTI-SPYWARE

Android one-click Google authentication method puts users,...

A feature that allows Android users to authenticate themselves on Google websites without having to enter their account password can be abused by rogue apps to give...

   

Your Search returned 8 results from our White Paper Library

Sort By
Symantec Corporation

Anti-Spam

Symantec Internet Security Threat Report

Symantec’s analysts unparalleled sources of data with which to identify, analyse, and provide informed commentary on emerging trends in attacks, malicious...


Symantec Corporation

Endpoint Security

Customer Success - Tree in The Glen

Treehouse in the Glen (www.treehouseintheglen.com), a certified Green toy store in Silicon Valley, replaced a variety of security solutions with Symantec...


Symantec Corporation

Endpoint Security

Small Business Endpoint Protection Performance Benchmarks...

Download the Passmark competitive benchmark report and check out how Symantec Endpoint Protection Small Business Edition performs against competing solutions....


Symantec Corporation

Internet Security

The Tangled Web: Silent Threats & Invisible Enemies

This white paper will cover how spyware steals personal identities and confidential data, the risks and vulnerabilities in your business.


Entrust

Malware

Addressing Advanced Fraud Threats in Today’s Mobile Environment:...

This white paper looks at the potentials threats& stumbling blocks of mobile finance, as well as the opportunities available.


McAfee

Endpoint Security

A Buyer's Guide to Endpoint Protection Platforms

This Gartner paper acts as buyer's guide to endpoint protection platforms, listing the most advanced features to help buyers differentiate solutions.


McAfee

Microsoft Windows

Corporate Av/Epp Comparative Analysis: Exploit Protection...

This paper tests 11 enterprise level Endpoint protection (EPP) products to measure their effectiveness in protecting Windows computers against exploits....


McAfee

Malware

Build a Better Sandbox: A working strategy for comprehensive...

This paper proposes a logical design strategy for dynamic malware analysis that optimizes detection.


Recommended for You

silhouette

Everything you need to know about… Tech Careers

IDG Connect tackles the tech stories that matter to you

kathryn-cave

What you need to know about cryptocurrencies

Kathryn Cave looks at the big trends in global tech

martin-veitch-thumbnail

What we know and don’t know about digital transformation

Martin Veitch's inside track on today’s tech trends

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Will Kotlin overtake Java as the most popular Android programming language in 2018?