Your Search returned 38 results from our Editorial content

Sort By
  • Close-button

    Threat and Vulnerability Management

MALWARE

Maliciously crafted MKV video files can be used to crash...

A malicious application or Web page could be used to crash Android devices, in some cases persistently, due to a vulnerability in a multimedia processing component....

MALWARE

Maliciously crafted MKV video files can be used to crash...

A malicious application or Web page could be used to crash Android devices, in some cases persistently, due to a vulnerability in a multimedia processing component....

   

MALWARE

Cyberespionage group Pawn Storm uses exploit for unpatched...

A sophisticated group of hackers known for targeting military, government and media organizations is currently using an exploit for a vulnerability in Java that...

MALWARE

Ad fraud Trojan updates Flash Player so that other malware...

Someone call the malware antitrust commission: Recent versions of the Kovter ad fraud Trojan, which infects computers through Web-based exploits, close the door...

   

SECURITY

US, UK spies said to attack security software

Spies working for the U.S. National Security Agency and its British counterpart found anti-virus and security software a hindrance to their intelligence gathering...

BUSINESS MANAGEMENT

NSA said to increase monitoring of US 'Net traffic to catch...

The U.S. National Security Agency is reportedly intercepting Internet communications from U.S. residents without getting court-ordered warrants, in an effort to...

   

MALWARE

Equation cyberspies use unrivaled, NSA-style techniques...

A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia....

MALWARE

Hackers hoped for slam dunk on Japan Basketball Association...

The sole target detected by Symantec of attacks using a recent Internet Explorer vulnerability was the website of the Japan Basketball Association, whose chairman...

   

THREAT AND VULNERABILITY MANAGEMENT

CloudFlare launches bug bounty program

CloudFlare started a bug bounty program on Monday, joining a host of companies that are turning to independent security researchers to spot bugs in their network....

IDENTITY FRAUD & THEFT

Netcraft tool flags websites affected by Heartbleed

Worried about how the Heartbleed vulnerability may affect your personal accounts? A new tool may be of help.

   
   
Previous 1 3 4

Your Search returned 279 results from our White Paper Library

Sort By
  • Close-button

    Threat and Vulnerability Management

Guardium

Data Privacy and Security

Creating a Database Security Plan -- Why Basic Database...

 SQL injection attacks and internal data thefts are on the rise—but DBAs spend less than 5% of their time on database security. View this on-demand webcast...


Symantec Corporation

Security

Internet Security Threat Report

The Symantec Internet Security Threat Report offers analysis and discussion of threat activity over a one-year period. It covers Internet threat activities,...


McAfee

Security

The Security Paradox - the First Global Study that Quantifies...

Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies...


Symantec Corporation

Security

Symantec Report: Rogue Security Software Executive Summary...

New ways to conduct Internet fraud continue to be unleashed on the unsuspecting public. One of the growing trends is the use of misleading software programs....


Symantec Corporation

Security

Symantec Intelligence Quarterly, July-September, 2009

Symantec Intelligence Quarterly offers analysis and discussion of threat activity over a three-month period. It covers Internet attacks, vulnerabilities,...


Imperva

Patch Management

Closing the Window of Exposure with Database Virtual Patching...

IT organizations are searching for a more efficient approach that enables quicker deployment of security patches while ensuring the safety and productivity...


McAfee

Firewalls

Eight ‘Must Haves’ Firewall Rules

With the torrent of new threats resulting from Web 2.0, it’s likely that your existing firewall is leaving you exposed.


Imperva

Threat and Vulnerability Management

Managing Risk to Sensitive Data with SecureSphere

In this white paper we will explore the need to discover and classify sensitive data in enterprise databases.


Imperva

Security

Gartner: The Structure and Scope of an Effective Information...

This Gartner research paper can help you build an effective information security program in your organization. Learn how to drive security through all...


Previous 1 3 4 5 27 28

Blogs

jon-collins

Thinking Different

Today’s tech can’t beat my stupid email response

Jon Collins’ in-depth look at tech and society

phil-muncaster

China Rising

The South China Sea: A new hacking hotspot

Phil Muncaster reports on China and beyond

mark-chillingworth

CIO Watch

Losing CIOs to startups could be costly

Mark Chillingworth on IT leadership

Most Recent Comments

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk

Poll

Crowdfunding: Viable alternative to VC funding or glorified marketing?