IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Unsolicited Commercial e-Mail

RSS Feed    Add to Google    Add to My Yahoo!
Unsolicited Commercial e-Mail White Papers (View All Report Types)
 
NAC: Managing Unauthorized Computers
sponsored by Sophos, Inc.
WHITE PAPER: Unauthorized endpoint computers pose security risks to organizations. This paper looks at how a complete Network Access Control (NAC) solution can protect the network from unauthorized access from unknown computers or people with malicious intent.
Posted: 18 Feb 2008 | Published: 01 Apr 2007

Sophos, Inc.

Emerging Threats: The Changing Face of Email
sponsored by Kaspersky Lab
WHITE PAPER: More than three years after the infamous declaration from Microsoft's Bill Gates that "spam will be solved" in 2009, unsolicited junk mail continues to bombard email servers, dumping malicious attachments, phishing lures and spam advertising for fake pharmaceuticals.
Posted: 19 Aug 2009 | Published: 19 Aug 2009

Kaspersky Lab

McAfee Initiative to Fight Cybercrime
sponsored by Intel Security
WHITE PAPER: Fighting Cybercrime requires a three-pronged approach: technology & innovation, education, and legal frameworks.
Posted: 15 Dec 2008 | Published: 15 Dec 2008

Intel Security

Global Threat Trends- Year-End Report 2009
sponsored by ESET
WHITE PAPER: In this paper you'll learn the most prevalent threats, including their percentage values relative to all the threats detected by ThreatSense.Net®.
Posted: 21 Jan 2010 | Published: 21 Jan 2010

ESET

Slipping Through The Cracks Of Web Services To Serve Malware
sponsored by Trend Micro, Inc.
WHITE PAPER: Today's generation of cybercriminals continue to find more ways to abuse commonly used Web services for spamming and to spread malware. Leveraging the ever-growing number of Web 2.0 and computing platforms to facilitate operations, cybercriminals have moved away from simple and so much more.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

Symantec Intelligence Report – May 2013
sponsored by Symantec Corporation
WHITE PAPER: Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
Posted: 25 Jul 2013 | Published: 31 May 2013

Symantec Corporation

Attachment Spam - The Latest Trend
sponsored by GFI Software
WHITE PAPER: This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software.
Posted: 18 Mar 2008 | Published: 01 Jan 2007

GFI Software

Anti-Phishing: Best Practices for Institutions and Consumer
sponsored by Intel Security
WHITE PAPER: Phishing has become the most malicious form of spam, leaving both organizations and consumers vulnerable to financial losses and stolen information. Read this white paper to learn about best practices for protecting your company from phishing attacks.
Posted: 27 Mar 2007 | Published: 01 Nov 2005

Intel Security

Driving Down the Total Cost of Protection
sponsored by Kaspersky Lab
WHITE PAPER: This white paper touches on a new malware protection system that was designed for today and tomorrow. It provides the best overall protection for all businesses and does this with the best total cost of protection available today.
Posted: 12 May 2011 | Published: 11 May 2011

Kaspersky Lab

The Bot Threat
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
Posted: 01 Feb 2015 | Published: 13 Nov 2013

Hewlett Packard Enterprise
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement