IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Email Fraud

RSS Feed    Add to Google    Add to My Yahoo!
Email Fraud Reports
2012 Security Outlook
sponsored by
ESSENTIAL GUIDE: This report from the Corporate Executive Board, based on extensive research with Chief Information Security Officers, identifies the top 10 security imperatives for 2012.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

Email is Today's #1 Advanced Threat Vector – Here's Why
sponsored by Proofpoint, Inc.
RESOURCE: Check out this brief infographic to learn what files hackers are using to dupe employees into clicking malicious links. Uncover the succes - or unsuccessful - level of protection antivirus provides against targeted threats.
Posted: 20 Oct 2015 | Published: 14 Oct 2015

Proofpoint, Inc.

Information security breaches survey 2012
sponsored by
IT BRIEFING: Rising security breaches cost UK billions over the last 12 months as cyber attacks reached record levels, according to the 2012 Information Security Breaches survey.
Posted: 24 Apr 2012 | Published: 24 Apr 2012

Ransomware: How cyber criminals hold your data hostage
sponsored by IBM
WHITE PAPER: This white paper explores the growing ransomware threat and how you can defend against it.
Posted: 09 Sep 2015 | Published: 30 Jun 2015


Types of DNS Attacks Reveal DNS Defense Tactics
sponsored by
EGUIDE: This E-Guide from details different types of common domain name system (DNS) attacks, the unusual behaviors they invoke, and which defense tactics work best in the given scenario. View now to learn more!
Posted: 21 Mar 2013 | Published: 21 Mar 2013

Critical Capabilities for Client Management Tools
sponsored by Absolute
WHITE PAPER: This white paper lists the eight critical capabilities of good end user management tools. In addition, it presents reviews and ratings of fourteen different end user management platforms.
Posted: 05 Aug 2015 | Published: 13 Jun 2014


Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies

Symantec Internet Security Threat Report: Trends for 2011
sponsored by Symantec Corporation
WHITE PAPER: This threat report takes a thorough look back at the most significant threats, trends and outright attacks of the year that was. Read now for helpful tips and best practices for keeping your confidential information safe.
Posted: 25 May 2012 | Published: 30 Apr 2012

Symantec Corporation

McAfee 15 Minutes to a Secure Business: Daily Security Practices
sponsored by Intel Security
PRODUCT OVERVIEW: This paper explains how McAfee has developed 15 Minutes to a Secure Business. This unique approach to security management gives IT professionals a roadmap for ensuring a safe and secure IT environment, even with limited time.
Posted: 23 Nov 2009 | Published: 23 Nov 2009

Intel Security

Phishing: The Latest Tactics And Potential Business Impacts
sponsored by Symantec
WHITE PAPER: This informative guide takes an in-depth look at phishing and how it has become an effective tactic for cybercriminals.
Posted: 14 May 2014 | Published: 14 May 2014

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement