Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >   Terrorism  >  

Organized Cybercrime

RSS Feed    Add to Google    Add to My Yahoo!
Organized Cybercrime White Papers (View All Report Types)
5 Ways to Build Trust with Customers
sponsored by Symantec Corporation
WHITE PAPER: Frail cyber security is a deal-breaker for today's digital customer. Discover five best practices that build customers' trust such as implementing security controls, providing evidence that said controls are active, and more.
Posted: 05 Nov 2015 | Published: 31 Dec 2014

Symantec Corporation

Stealth Compliance Strategies
sponsored by Unisys
WHITE PAPER: Access this guide to find software-defined security strategies that help government and commercial enterprises prevent highly sensitive data, systems, and intellectual property from being compromised.
Posted: 20 Nov 2015 | Published: 30 Jun 2015


5 Most Common Types of Malicious Hackers
sponsored by Raytheon|Websense
WHITE PAPER: This resource examines the five most common types of hackers and reveals how each one operates.
Posted: 16 Nov 2015 | Published: 16 Nov 2015


Slipping Through The Cracks Of Web Services To Serve Malware
sponsored by Trend Micro, Inc.
WHITE PAPER: Today's generation of cybercriminals continue to find more ways to abuse commonly used Web services for spamming and to spread malware. Leveraging the ever-growing number of Web 2.0 and computing platforms to facilitate operations, cybercriminals have moved away from simple and so much more.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

The Next Generation of Cybercrime: How it's evolved, where it's going
sponsored by Dell, Inc.
WHITE PAPER: Cybercrime is continuously evolving and attacks occur everyday, costing businesses significant loss and money. In order develop a strong security strategy to reduce your risk of attacks, you must understand cybercrime. Read this executive brief to explore several generations of cybercriminals and the methods and motivations of their attacks.
Posted: 19 May 2011 | Published: 19 May 2011

Dell, Inc.

Cybercrime and the Healthcare Industry
sponsored by RSA
WHITE PAPER: As technologies in healthcare continue to evolve, so will the cybercriminal activity targeted at healthcare organizations progress as well. This paper takes a look into cybercrime in the healthcare industry and discusses why access to data and information is fast becoming a target of scrutiny and risk.
Posted: 21 Jun 2011 | Published: 21 Jun 2011


The Reality of Cyber Warfare
sponsored by AT&T Corp
WHITE PAPER: Examine the topic of trench warfare in a cyber-world and discover many factors you need to know about these potentially disastrous events.
Posted: 28 Mar 2012 | Published: 13 Dec 2011

AT&T Corp

First Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies
sponsored by ArcSight, an HP Company
WHITE PAPER: The purpose of this benchmark study is twofold. First, we wanted to quantify the economic impact of a cyber attack. Second, we believed a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.
Posted: 02 Aug 2010 | Published: 02 Aug 2010

ArcSight, an HP Company

System z, x86, UNIX: Which is more secure?
sponsored by IBM
WHITE PAPER: Access this comprehensive survey to explore the business impact of different platform architectures -- in particular, their impact on security. Read now to see how IBM's System z, x86, and UNIX stack up in areas such as reliability, security, and total security cost.
Posted: 15 Nov 2013 | Published: 15 Nov 2013


Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy
sponsored by Trend Micro, Inc.
WHITE PAPER: This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement