Software  >   Malware  >  

Computer Worms

RSS Feed    Add to Google    Add to My Yahoo!
Computer WormsWhite Papers (View All Report Types)
 
Next Generation Web Application Firewalls (NG-WAF)
sponsored by Imperva
WHITE PAPER: This paper describes Imperva's vision for the next generation of WAFs. It details Web application security problems and solutions today, and gives perspectives on the future.
Posted: 02 Jun 2010 | Published: 02 Jun 2010

Imperva

The Advantages of a Hosted Security Model
sponsored by Websense, Inc.
WHITE PAPER: Learn how organizations today are responding to new types of email threats. This white paper discusses how a hosted security is now a viable solution for organizations and is increasingly deployed to ensure better security and reduced costs.
Posted: 19 Jun 2008 | Published: 01 Apr 2008

Websense, Inc.

The Next Generation of Cybercrime: How it's evolved, where it's going
sponsored by Dell, Inc.
WHITE PAPER: Cybercrime is continuously evolving and attacks occur everyday, costing businesses significant loss and money. In order develop a strong security strategy to reduce your risk of attacks, you must understand cybercrime. Read this executive brief to explore several generations of cybercriminals and the methods and motivations of their attacks.
Posted: 19 May 2011 | Published: 19 May 2011

Dell, Inc.

Drive-by Downloads--The Web Under Siege
sponsored by Kaspersky Lab
WHITE PAPER: In this white paper, we will explore what actually happens during a drive-by attack, the lures used to perpetrate attacks, the technology behind the attacks, and the use of drive-by download attacks in personal data theft and computer takeovers.
Posted: 19 Aug 2009 | Published: 19 Aug 2009

Kaspersky Lab

Global Threat Trends- February 2010
sponsored by ESET
WHITE PAPER: Review this report to see what threats had the highest number of detections in the past month according to the results of a sophisticated analysis provided by ESET's ThreatSense.Net®.
Posted: 25 Feb 2010 | Published: 25 Jan 2010

ESET

Understanding and Detecting Malware Threats Based on File Size
sponsored by Fortinet, Inc.
WHITE PAPER: Malware is typically within files that are less than one megabyte(MB) in size. According to Fortine research, 97% of malware discovered since the beginning of 2006 is below one MB in size.
Posted: 18 Feb 2008 | Published: 01 Dec 2006

Fortinet, Inc.

Global Threat Trends - December 2009
sponsored by ESET
WHITE PAPER: Review this report to see what threats had the highest number of detections in the past month according to the results of a sophisticated analysis provided by ESET's ThreatSense.Net.
Posted: 16 Sep 2009 | Published: 02 Sep 2009

ESET

Shavlik Customer Update: What is the Conficker worm, referred to as "Downadup"?
sponsored by Shavlik Technologies
WHITE PAPER: This paper describes the risks posed by the Downadup worm and how Shavlik is uniquely suited to help customers respond quickly. Read this brief paper to learn how Shavlik makes it easy for users to do targeted installation of solutions that automate and control patch and configuration management processes while minimizing operational impact.
Posted: 11 Feb 2009 | Published: 11 Feb 2009

Shavlik Technologies

Heuristic Analysis- Detecting Unknown Viruses
sponsored by ESET
WHITE PAPER: The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

ESET

Spyware in the Enterprise: The Problem and the Solution
sponsored by Sunbelt Software
WHITE PAPER: Spyware is a serious threat to the enterprise network, and the threat is growing. Download this informative white paper to learn more about the costs, problems and solutions associated with counting spyware.
Posted: 10 Jan 2007 | Published: 10 Jan 2007

Sunbelt Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement