sponsored by Sophos, Inc.
Posted:  04 Oct 2011
Published:  01 Sep 2011
Format:  PDF
Length:  16  Page(s)
Type:  White Paper
Language:  English
ABSTRACT:

This paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infecting your network and your users.






BROWSE RELATED RESOURCES
Integrated Threat Management | Internet Security | Intrusion Detection | Intrusion Prevention | Security Management | Security Threats

View All Resources sponsored by Sophos, Inc.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement