Your Search returned 50 results from our Editorial content

Sort By

MALWARE

Why does everyone forget the unwitting DDoS foot soldiers?...

As bots and botnets become smarter and larger the likelihood of your business becoming the unwitting perpetrator of a DDoS attack is getting stronger

MALWARE

InfoShot: Most dangerous celebs to search for

Which celebrity searches end up on malicious sites?

   

MALWARE

Maliciously crafted MKV video files can be used to crash...

A malicious application or Web page could be used to crash Android devices, in some cases persistently, due to a vulnerability in a multimedia processing component....

MALWARE

Maliciously crafted MKV video files can be used to crash...

A malicious application or Web page could be used to crash Android devices, in some cases persistently, due to a vulnerability in a multimedia processing component....

   

MALWARE

Cyberespionage group Pawn Storm uses exploit for unpatched...

A sophisticated group of hackers known for targeting military, government and media organizations is currently using an exploit for a vulnerability in Java that...

MALWARE

Ad fraud Trojan updates Flash Player so that other malware...

Someone call the malware antitrust commission: Recent versions of the Kovter ad fraud Trojan, which infects computers through Web-based exploits, close the door...

   

MALWARE

Trojan that hides inside images infects healthcare organizations...

A computer Trojan that hides its malicious code inside PNG image files counts healthcare organizations in the U.S. among its primary targets.

ANTI-SPYWARE

Duqu spy group also targeted telecommunications companies...

The group behind the Duqu cyberespionage tool has compromised at least two telecommunications operators and one electronic equipment manufacturer, in addition to...

   

MALWARE

Scammers using obituary notices to acquire new victims

Everyday, email-based scams circulate the Web targeting users of services such as iTunes, Amazon, PayPal, and Google.

MALWARE

Equation cyberspies use unrivaled, NSA-style techniques...

A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia....

   
   
Previous 1 3 4 5

Your Search returned 111 results from our White Paper Library

Sort By
Symantec.cloud

Cloud Computing Platforms

Next Generation of Web Exploits: When Good Sites Go Bad...

Download this FREE whitepaper to find out about the latest generation of Web attacks and what you can do to protect your organization.


IBM

Managed Security Services

X-Force® 2010 Trend and Risk Report

The IBM X-Force 2010 Trend and Risk Report provides an overview of last year's security lessons, including statistical information about all aspects of...


Symantec Corporation

Anti-Spam

Symantec Intelligence Report: December 2012

This report provides the latest analysis of cyber security threats, trends, and insights from the Symantec Intelligence team concerning malware, spam,...


Symantec Corporation

Content Filtering

Symantec Named a Leader in Gartner Magic Quadrant for Secure...

Read Gartner Magic Quadrant for Secure Email Gateways to learn more about why Symantec is positioned as a leader.


Symantec Corporation

Secure Content Management

Symantec Messaging Gateway Named a Leader in the Forrester...

This November 2012 research report details Forrester Research, Inc.’s 47-criteria evaluation of email content security vendors, identifying the nine most...


McAfee

Malware

2013 Threats Predictions

McAfee Labs researchers recently debated the leading threats for the coming year. This white paper outlines the threats they expect to increase in or be...


Blue Coat

Security

Secure Web Gateways Buyer’s Guide

Secure Web Gateways give you more control over your Web traffic and protect you from Web-based threats such as malware, botnets, etc. But not all Secure...


McAfee

Risk Management

Manage Security And Risk

Risk was once a fairly static concept. Now that once static risk picture fluctuates like a kaleidoscope. This white paper from McAfee outlines risk management...


McAfee

Security

Achieve Situational Awareness

If you can know more about an incident than just which system you fixed or quarantined, you may end up saving your organization time and money. See how...


Blue Coat

Malware

Blue Coat Systems 2013 Mobile Malware Report: How Users...

This report examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications,...


Previous 1 3 4 5 11 12

Recommended for You

silhouette

Which Enterprise Password Managers work the best?

IDG Connect tackles the tech stories that matter to you

kathryn-cave

The IoT “time bomb” report: 49 security experts share their views

Kathryn Cave looks at the big trends in global tech

phil-muncaster

China’s Cybersecurity Law: Game over for foreign firms?

Phil Muncaster reports on China and beyond

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should companies have Bitcoins on hand in preparation for a Ransomware attack?