Your Search returned 33 results from our Editorial content

Sort By

MALWARE

Stung by file-encrypting malware, researchers fight back...

Jose Vildoza's 62-year-old father was using his old Windows computer when a warning in broken English flashed on the screen: your files have been encrypted.

DATA PRIVACY AND SECURITY

Sality malware, growing old, takes on a new trick

A botnet that was slowly shrinking has taken on a new trick: brute-forcing routers set to easy-to-guess credentials.

   

MALWARE

Mistake in ransomware program leaves decryption key accessible...

A malicious software program that encrypts a person's files until a ransom is paid has a crucial error: it leaves the decryption key on the victim's computer.

DATA PRIVACY AND SECURITY

Speedy attack targets Web servers with outdated Linux kernels...

Web servers running a long-outdated version of the Linux kernel were attacked with dramatic speed over two days last week, Cisco Systems said on Thursday.

   

DATA PRIVACY AND SECURITY

Target says it investigated but dismissed early signs of...

Target said Thursday it investigated but ultimately dismissed early signs of a data breach, a decision it likely regrets after suffering one of the largest payment-card...

MALWARE

NSA denies Facebook snooping as Zuckerberg lays into Obama...

An article that accused the National Security Agency of impersonating Facebook to spy on U.S. citizens has triggered a denial from the NSA and a reprimand for the...

   

HANDHELD DEVICES

Google Play 'night vision camera' app will empty your wallet...

It's no secret that Android is the target for almost all identified mobile malware. Generally speaking, though, if you stick to the official Google Play store your...

MALWARE

Need your Mt. Gox bitcoins back? Steer clear of this website...

Empty-handed customers of bankrupt bitcoin exchange Mt. Gox are being targeted in a ploy likely intended to distributed malware.

   

MALWARE

Android malware using TOR anonymity network makes a debut...

Kaspersky Lab has spotted malware for the Android mobile operating system employing the TOR anonymity network, a development previously only seen on Windows.

IT & SYSTEMS MANAGEMENT

Report: Malware-infected Android apps spike in the Google...

The number of mobile apps infected with malware in Google's Play store nearly quadrupled between 2011 and 2013, a security group has reported.

   
   
Previous 1 3 4

Your Search returned 96 results from our White Paper Library

Sort By
Trend Micro

Enterprise Data Protection

Standard security products and point solutions are no match...

Advanced persistent threats (APTs) or targeted attacks use social engineering tactics like spear phishing to download malware onto an employee’s computer...


Clearswift

Security

10 Essential Steps to Email Security

This white paper from Clearswift provides a best practice guide on achieving better email security.


Tenable

Malware

Attack Path Analytics: A Strategic Approach to Vulnerability...

This paper explains how Attack path analytics can help companies address the threat of modern malware in three steps.


Entrust

Malware

Addressing Advanced Fraud Threats in Today’s Mobile Environment:...

This white paper looks at the potentials threats& stumbling blocks of mobile finance, as well as the opportunities available.


Blue Coat

Malware

Blue Coat Systems 2013 Mobile Malware Report: How Users...

This report examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications,...


Endace

Security

How Security Operations Can Successfully Battle New Threats...

This white paper outlines current shortcomings in Security Operations, and how to improve analysts’ productivity and throughput by streamlining their workflows....


Endace

Security

How Security Operations Can Successfully Battle New Threats...

This white paper outlines current shortcomings in Security Operations, and how to improve analysts’ productivity and throughput by streamlining their workflows....


Endace

Security

How Security Operations Can Successfully Battle New Threats...

This white paper outlines current shortcomings in Security Operations, and how to improve analysts’ productivity and throughput by streamlining their workflows....


Moka5

Encryption

Essential Technology for Mobile Workforce Security

Mobile devices, once a convenience, are now critical for all aspects of business. How remote employees access data, apps and corporate networks is one...


Sophos

Unified Threat Management

Network protection and UTM Buyers Guide

This buyers guide is designed to help you choose the right UTM solution for your organization.


Previous 1 3 4 5 9 10

Most Recent Comments

IDG Connections

  • conect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • conect
  • conect
  • conect
  • conect
  • conect
no-image

Resource Center

  • /view_company_report/213/brocade
  • /view_company_report/1487/canon
  • /view_company_report/103/cisco-systems-inc
  • /view_company_report/1432/exablox
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/31/ipswitch
  • /view_company_report/1219/jama-software
  • /view_company_report/16/netapp
  • /view_company_report/506/qualys
  • /view_company_report/1304/ringcentral-inc
  • /view_company_report/1242/teradata

Poll

Is tech more of a problem or solution to climate change?