Software  >  

Malicious Computer Code

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Computer CodeReports
 
IBM Security Services Client Reference Guide
sponsored by IBM
WHITE PAPER: This in-depth guide explores essential case studies that will help you understand the evolving threat landscape and learn from your peers' compliance challenges.
Posted: 19 Mar 2014 | Published: 30 Nov 2013

IBM

Antivirus Evasion Techniques Show Ease In Avoiding Antivirus Detection
sponsored by Malwarebytes Corporation
EGUIDE: This expert e-guide uncovers what's next for avoiding some of the most dangerous cyber-attacks.
Posted: 21 Mar 2014 | Published: 21 Mar 2014


Hidden Lynx – Professional Hackers for Hire
sponsored by Symantec Corporation
WEBCAST: This in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

Symantec Corporation

Cisco 2014 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Cisco Systems, Inc.

Attacks on Point of Sales Systems
sponsored by Symantec Corporation
WHITE PAPER: Identity theft is one of the most common forms of cybercrime, and your Point of Sale (POS) system is especially vulnerable to this attack type. This in-depth guide explores how cybercriminals use malware to steal credit card information at the POS.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Symantec Corporation

Symantec Intelligence Report 2013
sponsored by Symantec Corporation
ANALYST REPORT: This in-depth report outlines the latest analysis surrounding cyber security threats and trends.
Posted: 18 Feb 2014 | Published: 30 Nov 2013

Symantec Corporation

Transforming Information Security: Future-Proofing Processes
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Adapting your security strategy to today's expanding threat landscape can be a daunting task. This guide explores strategies for enhancing your security strategy and how to adapt to the current threat landscape.
Posted: 17 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
Posted: 01 Apr 2014 | Published: 30 Jun 2013

Cisco

Once More Into the Breach: The Top 10 Mistakes Incident Responders Make Combatting Advanced Threats
sponsored by FireEye
WHITE PAPER: This guide explores 10 common mistakes businesses make when planning their security strategy.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

FireEye

Deep Security as a Service: Cloud Security for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: Access this white paper to unveil a deep security as a service option that offers scalable protection for the cloud's elastic environment. Click now to see how to get maximum value out of your cloud investment.
Posted: 16 Dec 2013 | Published: 16 Dec 2013

Trend Micro
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement