IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

Hackers

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A honey pot is a computer system on the Internet that is expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems. (This includes the hacker, cracker, and script kiddy.) To set up a honey pot, it is recommended that you:Install the operating system without patches installed and using typical defaults and optionsMake sure that there is no data on the system  … 
Definition continues below.
Hackers Reports
1 - 25 of 225 Matches Previous Page  |  Next Page
Security predictions for 2015
sponsored by Imperva
WHITE PAPER: With the insight of security experts and the help of analytics tools, this white paper presents five security predictions for the 2015 security landscape.
Posted: 27 Feb 2015 | Published: 31 Jan 2015

Imperva

Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This in-depth white paper can help you discover the latest security threats and how to stop them.
Posted: 26 Feb 2015 | Published: 31 Dec 2014

Dimension Data

Why DNS Security is Essential
sponsored by Cloudmark
WHITE PAPER: This white paper covers exactly how attackers use DNS to compromise a network.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

Cloudmark

Financial Malware Explained
sponsored by IBM
WHITE PAPER: This white paper gets you inside the head of a fraudster and gives you insight into how they work.
Posted: 25 Feb 2015 | Published: 31 Dec 2014

IBM

Old Techniques in a New Channel: The Evolving Threats of Mobile Banking
sponsored by IBM
WHITE PAPER: This white paper describes in detail the attacks mobile banking users face.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

IBM

10 Ways Everyone Should Approach Cybersecurity in 2015
sponsored by Global Knowledge
WHITE PAPER: This paper reviews key security issues and focuses attention on 10 responses that we all need to adopt in our approach to security in 2015.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

Global Knowledge

Get Inside the Thriving Malware Industry
sponsored by IBM
WHITE PAPER: This white paper helps you understand how a malware attack works by getting you inside the mind of a hacker.
Posted: 24 Feb 2015 | Published: 31 Jan 2014

IBM

Win the War on Cybercrime with Four Key Elements
sponsored by IBM
WHITE PAPER: The following white paper helps you stay ahead of cybercriminals by outlining the four key elements of fraud prevention.
Posted: 24 Feb 2015 | Published: 31 Dec 2013

IBM

Behavior-based Protection Strategies from the Network to Remote Endpoints.
sponsored by IBM
WHITE PAPER: This white paper looks at behavior-based protection, a comprehensive security system that fights the latest threats.
Posted: 24 Feb 2015 | Published: 31 Oct 2014

IBM

The Evolving Threat Landscape
sponsored by Threat Track Security
WHITE PAPER: The following white paper presents an interview with a leadinging expert on security technology on how cybercrime has evolved.
Posted: 20 Feb 2015 | Published: 31 Dec 2014

Threat Track Security

IBM X-Force Threat Intelligence Quarterly - 3Q 2014
sponsored by IBM
WHITE PAPER: This exclusive white paper takes a look at how Heartbleed impacted organizations around the world.
Posted: 20 Feb 2015 | Published: 31 Aug 2014

IBM

Better Defend Your Network with Better Anti-Malware
sponsored by Threat Track Security
WEBCAST: This webcast gives you the details on a comprehensive, reliable anti-malware system.
Posted: 19 Feb 2015 | Premiered: Feb 19, 2015

Threat Track Security

Discover How to Guard Against Healthcare Cybercrime
sponsored by NaviSite
WHITE PAPER: Healthcare data is as valuable as gold on the black market, and thieves are drawn to the profits. Now, with more data stored digitally and more hackers taking advantage of that, the healthcare industry needs better security than ever.
Posted: 19 Feb 2015 | Published: 01 Jan 2015

NaviSite

New Threats to Healthcare and How to Stop them
sponsored by NaviSite
WEBCAST: This webcast provides you with a detailed analysis of healthcare's security threats and suggestions for combatting them.
Posted: 19 Feb 2015 | Premiered: Feb 19, 2015

NaviSite

Optimizing Enterprise Security: Intelligence, Control, and Response
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explores the factors that make network security management and operations more difficult today than ever before.
Posted: 17 Feb 2015 | Published: 28 Nov 2014

ForeScout Technologies, Inc.

Profiling an Enigma: What We Know About North Korea's Cyber Warfare Capabilities
sponsored by Hewlett-Packard Company
PODCAST: This podcast takes a look at what is known about North Korea's cyber warfare programs, and how the country maintains such secrecy in these matters.
Posted: 16 Feb 2015 | Premiered: Oct 29, 2014

Hewlett-Packard Company

Cisco 2015 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This report reveals up-to-date data on many of the most important security concerns facing organizations in 2015.
Posted: 16 Feb 2015 | Published: 01 Jan 2015

Cisco Systems, Inc.

How to Speed Up Detection of Advanced Attacks
sponsored by Threat Track Security
WEBCAST: This webcast provides guidelines for catching and stopping threats before they have time to do damage.
Posted: 16 Feb 2015 | Premiered: Dec 3, 2014

Threat Track Security

North Korea and the Attack on Sony Pictures Entertainment
sponsored by Hewlett-Packard Company
WHITE PAPER: While the FBI has named North Korea as a culprit in the significant breach on Sony Pictures Entertainment in 2014, it's still possible that the regime didn't act alone. This resource discusses the critical threat intelligence issues that the breach highlights; analyzes North Korea's purported involvement and motivation; and much more.
Posted: 13 Feb 2015 | Published: 19 Dec 2014

Hewlett-Packard Company

4 Data Traffic Security Challenges Exposing Enterprises to Hack Attacks
sponsored by Certes Networks
WHITE PAPER: This white paper discusses the 4 major points of weakness that your enterprise needs to prioritize in 2015 in order to defend your business-critical data from hackers.
Posted: 12 Feb 2015 | Published: 22 Jan 2015

Certes Networks

Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

How Hackers Exploit Admin Rights to Access Your Systems
sponsored by Viewfinity
WEBCAST: In this webcast you can watch a live hack to see how hackers gain admin rights in order to compromise your system.
Posted: 09 Feb 2015 | Premiered: Feb 9, 2015

Viewfinity

The 2014 Bitglass Healthcare Breach Report
sponsored by BitGlass
WHITE PAPER: This informative report takes a close look at reported healthcare data breaches over the past 3 years and discusses what they mean for consumers, healthcare organizations, and the future of digital healthcare records.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

BitGlass

Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape
sponsored by Hewlett-Packard Company
WHITE PAPER: This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.
Posted: 05 Feb 2015 | Published: 29 Aug 2014

Hewlett-Packard Company

Survey Shows Organizations Have Plenty of Room for Improvement with IT Security
sponsored by Hewlett-Packard Company
WHITE PAPER: The following white paper explores what far too many organizations are leaving out of their IT security practices and explains what can be done to improve their overall effectiveness. Read on to learn if your own IT security protocols are leaving you open to a malicious attack.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Hewlett-Packard Company
1 - 25 of 225 Matches Previous Page    1 2 3 4    Next Page
 
HACKERS DEFINITION (continued): … A honey pot is a computer system on the Internet that is expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems. (This includes the hacker, cracker, and script kiddy.) To set up a honey pot, it is recommended that you:Install the operating system without patches installed and using typical defaults and optionsMake sure that there is no data on the system that cannot safely be destroyedAdd the application that is designed to record the activities of the invaderMaintaining a honey pot is said to require a considerable amount of attention and may offer as its highest value nothing more than a learning experience (that is, you may not catch any hackers).
Hackers definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement