Your Search returned 31 results from our Editorial content

Sort By
  • Close-button

    Threat and Vulnerability Management

MALWARE

Hackers hoped for slam dunk on Japan Basketball Association...

The sole target detected by Symantec of attacks using a recent Internet Explorer vulnerability was the website of the Japan Basketball Association, whose chairman...

THREAT AND VULNERABILITY MANAGEMENT

CloudFlare launches bug bounty program

CloudFlare started a bug bounty program on Monday, joining a host of companies that are turning to independent security researchers to spot bugs in their network....

   

IDENTITY FRAUD & THEFT

Netcraft tool flags websites affected by Heartbleed

Worried about how the Heartbleed vulnerability may affect your personal accounts? A new tool may be of help.

DATA PRIVACY AND SECURITY

Sality malware, growing old, takes on a new trick

A botnet that was slowly shrinking has taken on a new trick: brute-forcing routers set to easy-to-guess credentials.

   

BUSINESS MANAGEMENT

Lawmakers fail to ask NSA chief about agency's malware plans...

U.S. lawmakers had a chance to pose questions to the director of the National Security Agency on Wednesday but declined to ask him about reports that the agency...

BUSINESS MANAGEMENT

NSA's Alexander defends surveillance, but calls for better...

U.S. National Security Agency director General Keith Alexander has called on Congress to pass new legislation focused on protecting the country's cyber assets while...

   

DATA PRIVACY AND SECURITY

Zeus banking malware nestles a crucial file in a photo

A newly discovered variant of the notorious Zeus banking trojan is disguising a crucial configuration code in a digital photo, a technique known as steganography....

DATA PRIVACY AND SECURITY

Hackers circulate thousands of FTP credentials, New York...

Hackers are circulating credentials for thousands of FTP sites and appear to have compromised file transfer servers at The New York Times and other organizations,...

   

SECURITY

Cybercriminals compromise home routers to attack online...

Attacks recently observed in Poland involved cybercriminals hacking into home routers and changing their DNS settings so they can intercept user connections to online...

DATA PRIVACY AND SECURITY

Engineer nets Facebook's biggest bug bounty, but not the...

Last November Reginaldo Silva, a computer engineer in Brazil, found one of the worst kinds of vulnerabilities in Facebook's software. It has netted him the biggest...

   
   
Previous 1 3 4

Your Search returned 221 results from our White Paper Library

Sort By
  • Close-button

    Threat and Vulnerability Management

Guardium

Data Privacy and Security

Creating a Database Security Plan -- Why Basic Database...

 SQL injection attacks and internal data thefts are on the rise—but DBAs spend less than 5% of their time on database security. View this on-demand webcast...


Symantec Corporation

Security

Internet Security Threat Report

The Symantec Internet Security Threat Report offers analysis and discussion of threat activity over a one-year period. It covers Internet threat activities,...


Kaspersky Lab

Security

Emerging Threats: The Changing Face of Email

More than three years after the infamous declaration from Microsoft’s Bill Gates that “spam will be solved” in 2009, unsolicited junk mail continues to...


Kaspersky Lab

Security

When Web 2.0 Becomes Security Risk 2.0

Cyber-criminals are targeting web surfers on popular social networking sites like Facebook, LinkedIn and MySpace. This security brief discusses how to...


Kaspersky Lab

Security

When Legitimate Sites Threaten Your Network

Did you know that legitimate sites like BusinessWeek.com and MLB.com have been victimized by drive-by malware? This security brief discusses specific measures...


Kaspersky Lab

Security

Drive-by Downloads—The Web Under Siege

In this white paper, we will explore what actually happens during a drive-by attack, the lures used to perpetrate attacks, the technology behind the attacks,...


Kaspersky Lab

Security

The Hidden Security Threat – When Ex-Employees Represent...

From the laid-off to the disgruntled, ex-employees with an axe to grind can make companies vulnerable to data theft. Kaspersky Lab security evangelist...


M86 Security

Security

Today’s Blended Threats: Identifying and Stopping the Growing...

Blended threats are spam stealth attacks; moving undetected through your mail servers—blending in with all the other email—until they strike. They can...


McAfee

Security

The Security Paradox - the First Global Study that Quantifies...

Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies...


Symantec Corporation

Security

Symantec Report: Rogue Security Software Executive Summary...

New ways to conduct Internet fraud continue to be unleashed on the unsuspecting public. One of the growing trends is the use of misleading software programs....


Previous 1 3 4 5 22 23
no-image

Most Recent Comments

no-image

Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/213/brocade
  • /view_company_report/1487/canon
  • /view_company_report/103/cisco-systems-inc
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/31/ipswitch
  • /view_company_report/1219/jama-software
  • /view_company_report/1592/pivotal
  • /view_company_report/506/qualys
  • /view_company_report/1242/teradata

Poll

Would you buy a modular phone?