Laptop Security

The New Threat Reality: Seven Threats to Watch Out For

Provided by Red Condor

Category Laptop Security

Type White Paper

Length 6

Publish Date May 12 2010

Date posted May 12 2010

Overview

New and emerging threats are comprised of highly sophisticated and potentially catastrophic campaigns. Cybercriminals use multiple components and social media elements and privilege escalation to bypass security and access private and confidential files and resources. Blended; Spear Phishing; Classic Phishing; Novel Media; Rapid-Evolution Malware; Highly Permuted, Short-Lived Campaigns; and Smartphone Attacks are covered in this paper. Only zero-minute defense will enable companies to protect their networks, data, and employees.

Blogs

rupert-goodwins

Tech Transformations

We can end this new IT security Cold War

Rupert Goodwins’ unique angle on tech change

phil-muncaster

China Rising

Look before you leap into an Asian IT role this year

Phil Muncaster reports on China and beyond

jon-collins

Thinking Different

How much are banks risking on mobile services?

Jon Collins’ in-depth look at tech and society

no-image

Most Recent Comments

no-image

Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/213/brocade
  • /view_company_report/1487/canon
  • /view_company_report/1590/check-point-software-technologies
  • /view_company_report/103/cisco-systems-inc
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/31/ipswitch
  • /view_company_report/1219/jama-software
  • /view_company_report/661/kaseya
  • /view_company_report/1433/nutanix
  • /view_company_report/1592/pivotal
  • /view_company_report/506/qualys
  • /view_company_report/391/silver-peak-systems
  • /view_company_report/1242/teradata

Poll

Would you buy a modular phone?