malware

Results 226 - 250 of 852Sort Results By: Published Date | Title | Company Name

Securing the Network from Spam, Malware & Other Threats

Published By: Clearswift     Published Date: Jun 09, 2008
This white paper provides a comprehensive look at spam; from its early days to where we are today in terms of managing the daily threats.  With a strong policy, education and policy enforcement, and a multi-layer content security solution, organizations can address every kind of threat to its networks and its business; regardless of whether the threats are inbound or outbound.
Tags : 
clearswift, network security, internet security, web security, anti spam
    
Clearswift

Stuxnet Under the Microscope

Published By: ESET     Published Date: Sep 07, 2011
A lengthy analysis that considers many of these questions, as well as discussing some of the characteristics of this fascinating and multi-faceted malicious code.
Tags : 
eset, virus, scada, plcs, stuxnet, malware, siemens, code, anti virus, application security, internet security, network security appliance, security management, vulnerability management
    
ESET

What is a potentially unwanted application (PUA)?

Published By: ESET     Published Date: Sep 07, 2011
This paper gives some examples of "potentially unwanted" and "potentially unsafe" applications, explaining how they differ from out-and-out malware.
Tags : 
eset, pua, potentially unwated application, software, unsafe, antivirus, unwanted, malware, anti spyware, anti virus, application security, security management, security policies, vulnerability management
    
ESET

The Evolution of TDL: Conquering x64 a Comprehensive Analysis

Published By: ESET     Published Date: Sep 07, 2011
In this report, we investigate the implementation details of the malware and the ways in which it is distributed, and consider the cybercriminals' objectives.
Tags : 
eset, tdl, x64, cybercriminal, cybercrime, malware, security, rootkit, c&c servers, kernel-mode components, firmware, anti spyware, anti virus, hacker detection, internet security, intrusion detection, security management, security policies, vulnerability management
    
ESET

Top Ten Threats - July 2011

Published By: ESET     Published Date: Sep 07, 2011
We discuss about Internet users' behaviour when it comes to Internet security and the top ten threats of the month.
Tags : 
eset, threat report, internet security, malware industry, antivirus, cybercrime group, mobile devices
    
ESET

2011 Black Hat Conference: Hacking the Car

Published By: ESET     Published Date: Sep 07, 2011
Protection for small and medium businesses against viruses and cybercrimes.
Tags : 
eset, black hat conference, hacking the car, malware, protection, security, antivirus, anti virus, authentication, internet security, phishing, security management, security policies, vulnerability management
    
ESET

Dare-To-Compare: 7 Endpoint Security Solutions for Business

Published By: ESET     Published Date: Sep 07, 2011
This report presents a comparative analysis on the performance, effectiveness and usability of seven security solutions from some of the world's largest security vendors.
Tags : 
eset, security solutions for business, malware, antivirus, protection, cybercrime, anti virus, authentication, internet security, intrusion detection, intrusion prevention, security management, security policies, vulnerability management
    
ESET

CRN names Bitdefender Security Product of the Year!

Published By: BitDefender     Published Date: Feb 01, 2012
#1 Ranked Antimalware Engine! It's light, flexible & designed for SMBs!
Tags : 
bitdefender, free trial, smb, management, security, technology, vb100 awards, storage, business technology
    
BitDefender

Defeating Advanced Persistent Threat Malware

Published By: Infoblox     Published Date: Sep 04, 2013
Press headlines are filled by reports of malware attacks. Malware attacks, once the reserve of amateurs largely for amusement, are now launched by a number of entities. Today, a malware attack can literally come from anywhere in the world and can impact even the largest organization.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox

Are Your DNS Servers as Secure and Available as the Rest of Your Network?

Published By: Infoblox     Published Date: Nov 07, 2013
According to the Ponemon Institute, the annual cost of malware breaches averaged $8.4 million. Read this white paper to gain insights into critical information to safeguard against DNS security threats and disrupt malware communications to your DNS servers.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox

Splunk, Big Data and the Future of Security

Published By: Splunk     Published Date: Sep 17, 2012
Read this white paper to understand the evolving security landscape and how advanced persistent threats and sophisticated malware have fundamentally changed the way security teams must think about threats and the tools used for detective controls.
Tags : 
security threats, it security infrastructure, data protection, data loss prevention, data management, security intelligence, security, business technology
    
Splunk

Security Guide: Deploying Social Media Securely on a Global Scale

Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
The incredible reach of social media can be used to nurture business relationships and nourish invaluable customer relationships. But without an enterprise-wide security strategy, your organization is susceptible to a variety of internal and external threats, including account hijackings, malware and employee errors that can lead to brand and communication crises.
Tags : 
social media, social media management, enterprise, global, security, threats, permissions, hootsuite
    
uberVU via HootSuite

IT Solutions Guide: Secure Your Social Organization with HootSuite Enterprise

Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
Without a standard and secure environment for social media, your organization remains vulnerable to malware, unauthorized or fraudulent accounts, and data leakage. IT departments are usually the ones who get called in to clean up the mess. Why not take control of the situation now? Download this guide to HootSuite Enterprise for IT departments today.
Tags : 
social media, social media management, enterprise, hootsuite, solutions guide, security, permissions
    
uberVU via HootSuite

Symantec Positioned as a Leader in Leading Analyst Firm Magic Quadrant

Published By: Symantec     Published Date: Oct 19, 2012
Endpoint protection platforms continue to struggle to block typical malware threats, and are even less effective with low-volume targeted attacks. A few vendors have started to provide proactive tools - which ones are currently best-of-class?
Tags : 
endpoint protection, symantec, data security, proactive tools, security analysis, security, business technology
    
Symantec

Dennis Technology Lab Report: Symantec Endpoint Protection Proves Successful in Virtual Environments

Published By: Symantec     Published Date: Oct 19, 2012
This report from Dennis Technology Labs compares the effectiveness of anti-malware products designed to run in virtual desktop environments. It aims to compare the effectiveness of current anti-malware software. Read on to figure out which ran best.
Tags : 
virual environments, symantec, data security, malware, anti-malware products, security, data protection, business technology, virtualization
    
Symantec

Adaptive Behavior-Based Malware Protection

Published By: Symantec     Published Date: Oct 25, 2012
Enterprise Information Security executives and teams can use this document to understand a new behavior-based security technology that automatically identifies and blocks even highly obfuscated malicious code with no user intervention and more.
Tags : 
symantec, security, threat detection, fud, malware, business technology
    
Symantec

Symantec Endpoint Protection Comes Out On Top in Dennis Technology Labs Report

Published By: Symantec     Published Date: Nov 08, 2012
Results are in. Symantec Endpoint Protection rated best in independent, real-world tests recently published by Dennis Technology Labs. These tests are designed to more accurately reflect a simulated user environment.
Tags : 
virual environments, symantec, data security, malware, anti-malware products, security, business technology
    
Symantec

Anulando ataques sigilosos con visibilidad, amplia y profunda en sistemas de protección y respuesta

Published By: McAfee     Published Date: Sep 04, 2014
El tipo más amenazante de ataque cibernético es invisible. El riesgo para las empresas es real según lo evidenciado por los recientes ataques de alto nivel. Las organizaciones necesitan controles de seguridad por capas que funcionen en conjunto para detectar la presencia y las acciones de hackers y malwares furtivos.
Tags : 
ataques furtivos, malware, sistema de prevención de intrusiones, siem, controle de seguridad en capas
    
McAfee

Combata ataques furtivos com visibilidade integrada aos sistemas de proteção e reação

Published By: McAfee     Published Date: Nov 07, 2014
Usando técnicas sofisticadas para ocultar sua presença, um ataque furtivo pode operar fora do sistema operacional ou mover-se dinamicamente entre terminais (endpoints) para camuflar as ações dos hackers. O risco para as empresas é real e ataques de grande escala como a “Operação High Roller” prejudicam empresas em todo o mundo. Os antivírus e sistemas de prevenção de intrusões tradicionais não dão conta desse novo tipo de ataque: em vez disso, as empresas precisam de controles de segurança em camadas que funcionam em conjunto para detectar a presença e as ações de hackers e malwares furtivos.
Tags : 
ataques furtivos, malware, sistema de prevenção de intrusões, siem, controles de segurança em camadas, security
    
McAfee

Advanced Attacks Require Federal Agencies to Reimangine IT Security

Published By: FireEye     Published Date: Feb 28, 2014
Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security, it management, network security, business intelligence, data protection
    
FireEye

New Security Challenges for State and Local Governments

Published By: FireEye     Published Date: Mar 05, 2014
Never before have state and local governments been expected to do so much with so little. Even as budgets remain tight in a post-recession environment, tech-savvy citizens demand higher levels of service, they want to pay taxes by credit card, renew their driver's license online, and check traffic from their smartphone. These responsibilities make cyber security critical for state agencies, municipalities, and public utilities. Governments possess residents' most sensitive information - including inviolable personal data such as Social Security numbers and birth certificates. This white paper highlights: Why traditional tools fail to detect advanced attacks; Gaining a cohesive, correlated view of all major threat vectors; How to leverage signature-less, real-time security that thwarts zero-Day attacks.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security
    
FireEye

Five Reasons Your Small or Midsize Business is a Prime Target for Cybercriminals

Published By: FireEye     Published Date: Mar 05, 2014
Cyber attacks are growing more sophisticated and, more often than not, target small and midsize businesses (SMBs). One unlucky click - a malicious email attachment, a link to a legitimate but compromised website - could result in a costly data breach that drains your bank account and customer trust. This paper explains targeted attacks and examines reasons cyber attackers are aiming at small and midsize businesses, including: Value of your data; Low risk and high returns for criminals; Why SMBs are easier targets.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security
    
FireEye

The Top 10 Mistakes Incident Responders Make Combatting Advanced Threats

Published By: FireEye     Published Date: Mar 05, 2014
Whether they work for an up-and-coming startup or an industry giant, security response teams are under siege as never before. Today's cyber attacks are sophisticated, relentless, and devastating, costing U.S. businesses $8.9 million a year each on average. Attacking in multiple stages across multiple vectors, advanced persistent threats (APTs) and other sophisticated attacks easily evade signature-based detection and other traditional defenses. Thiswhite paper describes: The 10 most common mistakes, strategic and technical, that incident response teams make; The effect of these mistakes and how to avoid them with a well-defined incident response plan.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security
    
FireEye

Taking a Lead-Forward Approach to Combat Today's Cyber Attacks

Published By: FireEye     Published Date: Mar 05, 2014
Today's cyber attacks have changed radically from just a few years ago. No longer are they the sole province of opportunistic crooks, online vandals and digitial ""hacktivists."" Today, advanced cyber attacks are the weapon of choice for organized criminal enterprises and nation-states. This white paper highlights: Why organizations need much more than fundamental security tools; Strategies for dealing with advanced targeted attacks.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security
    
FireEye
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.