Software  >   Malware  >   Spyware  >  

Advertising Software

RSS Feed    Add to Google    Add to My Yahoo!
Advertising Software Reports
 
eGuide:Mitigating malicious advertisement malware
sponsored by SearchSecurity.com
EGUIDE: More than one million websites were infected by malicious advertisements, also known as malvertisements, in the last quarter of 2010. This expert guide explains why and how this form of attack is quickly spreading and offers technical advice on how to avoid infection.
Posted: 24 Jun 2011 | Published: 24 Jun 2011

SearchSecurity.com

Cybercrime: I Spy
sponsored by SearchCIO.com
VIRTUAL ENVIRONMENT: This clasroom features expert advice on how to strategically identify and eradicate spyware, as well as the measures CIOs need to take to protect employees' and customers' digital identities.
Posted: 19 Jun 2014 | Premiered: 23 Jun 2014

SearchCIO.com

Sophos Computer Security Scan
sponsored by Sophos, Inc.
TRIAL SOFTWARE: Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found.
Posted: 07 Apr 2010 | Premiered: 07 Apr 2010

Sophos, Inc.

Pocket E-Guide: Data Breach Dangers -- Learn to How to Protect Data and Lower Security Spending
sponsored by IBM
EGUIDE: Information security is important, but justifying increased security spending isn't. Even though important factors such as stock performance and customer loyalty are directly affected by security breaches. This E-Guide outlines three specific actions for your company to take in order to protect and promote brand trust by preventing data breaches.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

IBM

Heuristic Analysis- Detecting Unknown Viruses
sponsored by ESET
WHITE PAPER: The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

ESET

Threatsaurus: The A-Z of Computer and Data Security Threats
sponsored by Sophos UK
BOOK: Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.
Posted: 25 May 2010 | Published: 01 Dec 2009

Sophos UK

APTs: Why the Best Defense is a Full Spectrum Offense
sponsored by Zscaler
WHITE PAPER: This white paper provides answers to all of your questions about advanced persistent threats, from the APT lifecycle to the best ways to evaluate potential APT defense solutions.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

Zscaler

How Extended Validation SSL Brings Confidence to Online Sales and Transactions
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the importance of increasing customer confidence in the security of online business transactions, and introduces Symantec Extended Validation SSL Certificates as a potential solution to this challenge.
Posted: 15 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

The Quality Challenges Associated with Implementing Agile and Scrum
sponsored by nfocus
WHITE PAPER: This white paper takes a closer look at these issues and explains how they can be resolved leading to delivering software at the appropriate quality level.
Posted: 07 Jan 2015 | Published: 07 Jan 2015

nfocus

Research Finds More Organizations Use Big Data Analytics for Security
sponsored by RSA
EGUIDE: This expert e-guide explores the rise of Big Data security analytics.
Posted: 02 Jan 2015 | Published: 02 Jan 2015

RSA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement