Your Search returned 38 results from our Editorial content

Sort By
  • Close-button

    Threat and Vulnerability Management

MALWARE

Maliciously crafted MKV video files can be used to crash...

A malicious application or Web page could be used to crash Android devices, in some cases persistently, due to a vulnerability in a multimedia processing component....

MALWARE

Maliciously crafted MKV video files can be used to crash...

A malicious application or Web page could be used to crash Android devices, in some cases persistently, due to a vulnerability in a multimedia processing component....

   

MALWARE

Cyberespionage group Pawn Storm uses exploit for unpatched...

A sophisticated group of hackers known for targeting military, government and media organizations is currently using an exploit for a vulnerability in Java that...

MALWARE

Ad fraud Trojan updates Flash Player so that other malware...

Someone call the malware antitrust commission: Recent versions of the Kovter ad fraud Trojan, which infects computers through Web-based exploits, close the door...

   

SECURITY

US, UK spies said to attack security software

Spies working for the U.S. National Security Agency and its British counterpart found anti-virus and security software a hindrance to their intelligence gathering...

BUSINESS MANAGEMENT

NSA said to increase monitoring of US 'Net traffic to catch...

The U.S. National Security Agency is reportedly intercepting Internet communications from U.S. residents without getting court-ordered warrants, in an effort to...

   

MALWARE

Equation cyberspies use unrivaled, NSA-style techniques...

A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia....

MALWARE

Hackers hoped for slam dunk on Japan Basketball Association...

The sole target detected by Symantec of attacks using a recent Internet Explorer vulnerability was the website of the Japan Basketball Association, whose chairman...

   

THREAT AND VULNERABILITY MANAGEMENT

CloudFlare launches bug bounty program

CloudFlare started a bug bounty program on Monday, joining a host of companies that are turning to independent security researchers to spot bugs in their network....

IDENTITY FRAUD & THEFT

Netcraft tool flags websites affected by Heartbleed

Worried about how the Heartbleed vulnerability may affect your personal accounts? A new tool may be of help.

   
   
Previous 1 3 4

Your Search returned 310 results from our White Paper Library

Sort By
  • Close-button

    Threat and Vulnerability Management

Guardium

Data Privacy and Security

Creating a Database Security Plan -- Why Basic Database...

 SQL injection attacks and internal data thefts are on the rise—but DBAs spend less than 5% of their time on database security. View this on-demand webcast...


Symantec Corporation

Security

Internet Security Threat Report

The Symantec Internet Security Threat Report offers analysis and discussion of threat activity over a one-year period. It covers Internet threat activities,...


M86 Security

Security

Today’s Blended Threats: Identifying and Stopping the Growing...

Blended threats are spam stealth attacks; moving undetected through your mail servers—blending in with all the other email—until they strike. They can...


McAfee

Security

The Security Paradox - the First Global Study that Quantifies...

Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies...


Symantec Corporation

Security

Symantec Report: Rogue Security Software Executive Summary...

New ways to conduct Internet fraud continue to be unleashed on the unsuspecting public. One of the growing trends is the use of misleading software programs....


Symantec Corporation

Security

Symantec Intelligence Quarterly, July-September, 2009

Symantec Intelligence Quarterly offers analysis and discussion of threat activity over a three-month period. It covers Internet attacks, vulnerabilities,...


Shavlik Technologies

Security

Cloud Computing:Making the Cloud Real, Making Cloud-Enabled...

IT security and operations are drowning in a cycle of evaluating new products and vendors, performing the R&D to select the right product, purchasing it,...


Immunet

Anti-Virus Solutions

Fighting Back Against Modern Malware Threats

Web threats are as rife as ever, even in the web 2.0 landscape. This paper outlines the modern threats facing businesses today and introduces a next generation...


Imperva

Patch Management

Closing the Window of Exposure with Database Virtual Patching...

IT organizations are searching for a more efficient approach that enables quicker deployment of security patches while ensuring the safety and productivity...


Previous 1 3 4 5 30 31

Blogs

jon-collins

Thinking Different

In 2016, get ready for the mobile API explosion

Jon Collins’ in-depth look at tech and society

phil-muncaster

China Rising

How far can China push its bid to control the internet?

Phil Muncaster reports on China and beyond

no-image

Most Recent Comments

no-image

Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/775/aruba-networks
  • /view_company_report/1450/carbon-black
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/1219/jama-software
  • /view_company_report/661/kaseya
  • /view_company_report/506/qualys
  • /view_company_report/391/silver-peak-systems
  • /view_company_report/2095/simply-hired
  • /view_company_report/419/splunk
  • /view_company_report/1352/tegile-systems

Poll

Do you think undersea data centers are a good idea?