sponsored by Sophos, Inc.
Posted:  06 Aug 2009
Published:  06 Jul 2009
Format:  PDF
Length:  20  Page(s)
Type:  White Paper
Language:  English
ABSTRACT:
Today, most companies have guarded their email gateways and broadened their defenses against email-borne malware and malicious spam. Consequently, cybercriminals are developing techniques to infect machines behind-the-scenes by embedding malicious code on innocent websites and luring victims to them.

The large number of attacks that have occurred in the first half of 2009 has proven that attacks are continuing to broaden. While the number of web-based attacks outweighs the attacks through email, financially motivated cybercriminals are turning their attention to Web 2.0 platforms such as Facebook and Twitter and alternative programs and tools such as Adobe Flash and PDFs.

Read this paper to see a carefully documented discussion of recent security threats and attempts by cybercriminals to exploit social networking sites, email, mobile devices, and legitimate websites throughout the first half of 2009.






BROWSE RELATED RESOURCES
Cybersecurity | Email Security | Hackers | Malware | Secure Content Management | Security | Security Threats | Vulnerability Management | Web 2.0 | Web Application Security

View All Resources sponsored by Sophos, Inc.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement