Your Search returned 39 results from our Editorial content

Sort By

BUSINESS MANAGEMENT

Chinese state-owned enterprises 'hired' military hacking...

A U.S. criminal indictment against Chinese Army personnel over alleged hacking describes how stolen intellectual property was funneled to Chinese companies, an unresolved...

   

SECURITY

Avast: Users frequently hitting websites loaded with ransomware...

Fresh statistics from the maker of a widely used free security product show the extent to which users are encountering file-encrypting malware known as ransomware....

MALWARE

Hackers hoped for slam dunk on Japan Basketball Association...

The sole target detected by Symantec of attacks using a recent Internet Explorer vulnerability was the website of the Japan Basketball Association, whose chairman...

   

INTERNET

Is that Twitter account a bot? Researchers make app to find...

They spread lies. They push products you don't care about. They make unpopular people look popular. Sometimes, they take over your machine with malware.

MALWARE

Worm-like Android malware spreads using text messages

A piece of malware targeting Russian-speaking Android users abuses a person's contact list to try and infect other devices, according to security vendor Eset.

   

MALWARE

Stung by file-encrypting malware, researchers fight back...

Jose Vildoza's 62-year-old father was using his old Windows computer when a warning in broken English flashed on the screen: your files have been encrypted.

DATA PRIVACY AND SECURITY

Sality malware, growing old, takes on a new trick

A botnet that was slowly shrinking has taken on a new trick: brute-forcing routers set to easy-to-guess credentials.

   

MALWARE

Mistake in ransomware program leaves decryption key accessible...

A malicious software program that encrypts a person's files until a ransom is paid has a crucial error: it leaves the decryption key on the victim's computer.

DATA PRIVACY AND SECURITY

Speedy attack targets Web servers with outdated Linux kernels...

Web servers running a long-outdated version of the Linux kernel were attacked with dramatic speed over two days last week, Cisco Systems said on Thursday.

   
   
Previous 1 3 4

Your Search returned 111 results from our White Paper Library

Sort By
Altor Networks

Virtualization

Alternatives for Securing Virtual Networks

Discover the next generation security solution for the virtual environment. Check out how Altor VF monitors and controls inter-VM traffic, enforcing security...


Kaspersky Lab

Security

When Legitimate Sites Threaten Your Network

Did you know that legitimate sites like BusinessWeek.com and MLB.com have been victimized by drive-by malware? This security brief discusses specific measures...


IronKey

Authentication

Protecting Commercial Online Banking Customers from Next-Generation...

In 2009, organized cyber crime rings began to shift away from massive phishing attacks against consumer banking users, and instead target bigger fish-corporate...


IronKey

Authentication

The Perils of Using the Wrong Approach to USB Flash Drive...

This paper examines how the IronKey flash drive uses hardware-based encryption and key management within a highly secure framework - including a physically...


NetIQ

Intrusion Detection and Prevention

Reduce Your Breach Risk: File Integrity Monitoring for PCI...

This white paper discusses the importance of file integrity monitoring (FIM), which facilitates the detection of malware as well as insider threats in...


NetIQ

Data Privacy and Security

The Last Line of Defense: Protecting Your Databases from...

This white paper addresses the database protection issues (including data discovery, activity monitoring, and compliance with regulations such as PCI DSS)...


NetIQ

Data Privacy and Security

PCI X-Ray: File Integrity Monitoring

In the independent research report, “PCI X-Ray: File Integrity Monitoring,” Forrester Research, Inc. provides practical technical guidance on how File...


M86 Security

Internet Security

M86 Security Labs: Threat Predictions 2011

In 2010, scareware became more nefarious, with malware and cybercriminals remaining a large threat.


Symantec.cloud

Security

Evolving Threats, Revolutionary Protection

This paper discusses the growing number of web threats that can affect your organization. Discover how to overcome them by improving your security policy...


Deloitte

Data Privacy and Security

2010 Financial Services Global Security Study

This global report from Deloitte reveals security practices in financial institutions around the world. Discover how leading companies are protecting themselves...


Previous 1 3 4 5 11 12
no-image

Most Recent Comments

no-image

Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/213/brocade
  • /view_company_report/1487/canon
  • /view_company_report/1590/check-point-software-technologies
  • /view_company_report/103/cisco-systems-inc
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/31/ipswitch
  • /view_company_report/1219/jama-software
  • /view_company_report/1433/nutanix
  • /view_company_report/1592/pivotal
  • /view_company_report/506/qualys
  • /view_company_report/1242/teradata

Poll

Would you buy a modular phone?