sponsored by Sophos, Inc.
Posted:  28 Jul 2009
Published:  01 Jul 2009
Format:  PDF
Length:  20  Page(s)
Type:  White Paper
Language:  English
ABSTRACT:
Today, most companies have guarded their email gateways and broadened their defenses against email-borne malware and malicious spam. Consequently, cybercriminals are developing techniques to infect machines behind-the-scenes by embedding malicious code on innocent websites and luring victims to them.

2009 has proven attacks are continuing to broaden. While the number of web-based attacks outweighs the attacks through email, financially motivated cybercriminals are turning their attention to Web 2.0 platforms such as Facebook and Twitter and alternative programs and tools such as Adobe Flash and PDFs.

Read this paper to see a carefully documented discussion of recent security threats and attempts by cybercriminals to exploit social networking sites, email, mobile devices, and legitimate websites throughout the first half of 2009.






BROWSE RELATED RESOURCES
Cybersecurity | Email Security | Email Threats | Mac OS | Malware | Mobile Device Management | Phishing | Social Networking | Spam | Virus Protection | Web 2.0 | Web Application Security | Web Services Security | Wireless Security

View All Resources sponsored by Sophos, Inc.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement