Your Search returned 49 results from our Editorial content

Sort By

MALWARE

InfoShot: Most dangerous celebs to search for

Which celebrity searches end up on malicious sites?

MALWARE

Maliciously crafted MKV video files can be used to crash...

A malicious application or Web page could be used to crash Android devices, in some cases persistently, due to a vulnerability in a multimedia processing component....

   

MALWARE

Maliciously crafted MKV video files can be used to crash...

A malicious application or Web page could be used to crash Android devices, in some cases persistently, due to a vulnerability in a multimedia processing component....

MALWARE

Cyberespionage group Pawn Storm uses exploit for unpatched...

A sophisticated group of hackers known for targeting military, government and media organizations is currently using an exploit for a vulnerability in Java that...

   

MALWARE

Ad fraud Trojan updates Flash Player so that other malware...

Someone call the malware antitrust commission: Recent versions of the Kovter ad fraud Trojan, which infects computers through Web-based exploits, close the door...

MALWARE

Trojan that hides inside images infects healthcare organizations...

A computer Trojan that hides its malicious code inside PNG image files counts healthcare organizations in the U.S. among its primary targets.

   

ANTI-SPYWARE

Duqu spy group also targeted telecommunications companies...

The group behind the Duqu cyberespionage tool has compromised at least two telecommunications operators and one electronic equipment manufacturer, in addition to...

MALWARE

Scammers using obituary notices to acquire new victims

Everyday, email-based scams circulate the Web targeting users of services such as iTunes, Amazon, PayPal, and Google.

   

MALWARE

Equation cyberspies use unrivaled, NSA-style techniques...

A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia....

DATA PRIVACY AND SECURITY

Some hackers are unknowingly gathering intel for the NSA...

The U.S. National Security Agency and its intelligence partners are reportedly sifting through data stolen by state-sponsored and freelance hackers on a regular...

   
   
Previous 1 3 4 5

Your Search returned 56 results from our White Paper Library

Sort By
Altor Networks

Virtualization

Alternatives for Securing Virtual Networks

Discover the next generation security solution for the virtual environment. Check out how Altor VF monitors and controls inter-VM traffic, enforcing security...


Symantec.cloud

Cloud Computing Platforms

Next Generation of Web Exploits: When Good Sites Go Bad...

Download this FREE whitepaper to find out about the latest generation of Web attacks and what you can do to protect your organization.


IBM

Managed Security Services

X-Force® 2010 Trend and Risk Report

The IBM X-Force 2010 Trend and Risk Report provides an overview of last year's security lessons, including statistical information about all aspects of...


Symantec Corporation

Anti-Spam

Symantec Intelligence Report: December 2012

This report provides the latest analysis of cyber security threats, trends, and insights from the Symantec Intelligence team concerning malware, spam,...


Symantec Corporation

Content Filtering

Symantec Named a Leader in Gartner Magic Quadrant for Secure...

Read Gartner Magic Quadrant for Secure Email Gateways to learn more about why Symantec is positioned as a leader.


Symantec Corporation

Secure Content Management

Symantec Messaging Gateway Named a Leader in the Forrester...

This November 2012 research report details Forrester Research, Inc.’s 47-criteria evaluation of email content security vendors, identifying the nine most...


McAfee

Malware

2013 Threats Predictions

McAfee Labs researchers recently debated the leading threats for the coming year. This white paper outlines the threats they expect to increase in or be...


Blue Coat

Security

Secure Web Gateways Buyer’s Guide

Secure Web Gateways give you more control over your Web traffic and protect you from Web-based threats such as malware, botnets, etc. But not all Secure...


Palo Alto Networks

Network Security

Palo Alto Networks Modern Malware Review

The Modern Malware Review analyzes more than 26,000 unique and unknown malware samples collected by Palo Alto Networks over a 3 month period.


McAfee

Risk Management

Manage Security And Risk

Risk was once a fairly static concept. Now that once static risk picture fluctuates like a kaleidoscope. This white paper from McAfee outlines risk management...


Previous 1 3 4 5 6

Blogs

mark-chillingworth

CIO Watch

Banks finally welcome cloud computing cover

Mark Chillingworth on IT leadership

jon-collins

Thinking Different

Bitcoin anonymity advocates ignore a darker truth

Jon Collins’ in-depth look at tech and society

phil-muncaster

China Rising

VPNs: The Cat-and-Mouse Game in China Continues

Phil Muncaster reports on China and beyond

Most Recent Comments

no-image

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk

Poll

Do you think undersea data centers are a good idea?