Your Search returned 50 results from our Editorial content

Sort By

MALWARE

Why does everyone forget the unwitting DDoS foot soldiers?...

As bots and botnets become smarter and larger the likelihood of your business becoming the unwitting perpetrator of a DDoS attack is getting stronger

MALWARE

InfoShot: Most dangerous celebs to search for

Which celebrity searches end up on malicious sites?

   

MALWARE

Maliciously crafted MKV video files can be used to crash...

A malicious application or Web page could be used to crash Android devices, in some cases persistently, due to a vulnerability in a multimedia processing component....

MALWARE

Maliciously crafted MKV video files can be used to crash...

A malicious application or Web page could be used to crash Android devices, in some cases persistently, due to a vulnerability in a multimedia processing component....

   

MALWARE

Cyberespionage group Pawn Storm uses exploit for unpatched...

A sophisticated group of hackers known for targeting military, government and media organizations is currently using an exploit for a vulnerability in Java that...

MALWARE

Ad fraud Trojan updates Flash Player so that other malware...

Someone call the malware antitrust commission: Recent versions of the Kovter ad fraud Trojan, which infects computers through Web-based exploits, close the door...

   

MALWARE

Trojan that hides inside images infects healthcare organizations...

A computer Trojan that hides its malicious code inside PNG image files counts healthcare organizations in the U.S. among its primary targets.

ANTI-SPYWARE

Duqu spy group also targeted telecommunications companies...

The group behind the Duqu cyberespionage tool has compromised at least two telecommunications operators and one electronic equipment manufacturer, in addition to...

   

MALWARE

Scammers using obituary notices to acquire new victims

Everyday, email-based scams circulate the Web targeting users of services such as iTunes, Amazon, PayPal, and Google.

MALWARE

Equation cyberspies use unrivaled, NSA-style techniques...

A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia....

   
   
Previous 1 3 4 5

Your Search returned 123 results from our White Paper Library

Sort By
Symantec.cloud

Cloud Computing Platforms

Next Generation of Web Exploits: When Good Sites Go Bad...

Download this FREE whitepaper to find out about the latest generation of Web attacks and what you can do to protect your organization.


IBM

Managed Security Services

X-Force® 2010 Trend and Risk Report

The IBM X-Force 2010 Trend and Risk Report provides an overview of last year's security lessons, including statistical information about all aspects of...


Symantec Corporation

Anti-Spam

Symantec Intelligence Report: December 2012

This report provides the latest analysis of cyber security threats, trends, and insights from the Symantec Intelligence team concerning malware, spam,...


Symantec Corporation

Content Filtering

Symantec Named a Leader in Gartner Magic Quadrant for Secure...

Read Gartner Magic Quadrant for Secure Email Gateways to learn more about why Symantec is positioned as a leader.


Symantec Corporation

Secure Content Management

Symantec Messaging Gateway Named a Leader in the Forrester...

This November 2012 research report details Forrester Research, Inc.’s 47-criteria evaluation of email content security vendors, identifying the nine most...


McAfee

Malware

2013 Threats Predictions

McAfee Labs researchers recently debated the leading threats for the coming year. This white paper outlines the threats they expect to increase in or be...


Blue Coat

Security

Secure Web Gateways Buyer’s Guide

Secure Web Gateways give you more control over your Web traffic and protect you from Web-based threats such as malware, botnets, etc. But not all Secure...


McAfee

Risk Management

Manage Security And Risk

Risk was once a fairly static concept. Now that once static risk picture fluctuates like a kaleidoscope. This white paper from McAfee outlines risk management...


McAfee

Security

Achieve Situational Awareness

If you can know more about an incident than just which system you fixed or quarantined, you may end up saving your organization time and money. See how...


Blue Coat

Malware

Blue Coat Systems 2013 Mobile Malware Report: How Users...

This report examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications,...


Previous 1 3 4 5 12 13

Recommended for You

kathryn-cave

Blockchain For Dummies: What you really need to know

Kathryn Cave looks at the big trends in global tech

martin-veitch-thumbnail

What we know and don’t know about digital transformation

Martin Veitch's inside track on today’s tech trends

silhouette

Four hot IT growth areas to guarantee a big salary bump

IDG Connect tackles the tech stories that matter to you

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should companies have Bitcoins on hand in preparation for a Ransomware attack?