Software  >  

Malicious Software

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Software Reports
 
14 Steps to Protect Your Organization from Ransomware
sponsored by Carbon Black
WHITE PAPER: Ransomware is on track to be a $1 billion crime in 2017, according to FBI data. That's a substantial increase from 2015, when ransomware was a "mere" $24 million crime. Uncover immediate steps you can take today to protect against ransomware like WannaCry and NotPetya.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Carbon Black

Protect with this Endpoint Security & Save Money, Too
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Malware is becoming harder and harder to detect. Uncover strategies of how to protect against advanced malware attacks that are designed to target you.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Symantec & Blue Coat Systems

Your Guide to Mitigating Phishing Attacks
sponsored by PhishMe
WHITE PAPER: As one of the most persistent types of attacks, spear-phishing cannot be ignored. Discover the importance of implementing an incident response program that directly tackles phishing attacks.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

PhishMe

Securing DNS: What to Do, and What to be Aware of
sponsored by Cisco Umbrella
EGUIDE: In order to understand how DNS attacks work, it is important to understand DNS security weaknesses. In this e-guide, security pros Peter Wenham and Vladimir Jirasek reveal best practices and recommendations for securing DNS and staying ahead of its vulnerabilities.
Posted: 27 Jul 2017 | Published: 24 Jul 2017

Cisco Umbrella

The Mobile Risk Matrix
sponsored by Lookout
RESOURCE: Download this mobile risk matrix to gain a deeper understanding of the prevalence and impact of mobile threats and vulnerabilities to your organizations' apps, devices, network, web and content.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Lookout

IT Pro's Guide to Endpoint Protection
sponsored by Barkly
WHITE PAPER: Uncover key information on stopping malware and securing your business in this guide to endpoint protection. Discover why endpoint protection is more critical than ever, endpoint attackers' favorite targets, and more.
Posted: 01 Aug 2017 | Published: 31 Dec 2016

Barkly

Malware Year in Review 2016
sponsored by PhishMe
WHITE PAPER: Ransomware's explosive growth in 2016 was evidence of a paradigm shift in criminal business ventures, resulting in estimated losses of well over $1 billion. Discover 4 major malware trends and specific examples of how they worked, and what it may mean for 2017.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

PhishMe

Stopping the Next Ransomware Outbreak
sponsored by Carbon Black
WHITE PAPER: The spike in ransomware outbreaks in the last two years has left security analysts and administrators searching for better protection. Discover 5 simple tips to prevent a ransomware outbreak at your enterprise.
Posted: 10 Aug 2017 | Published: 09 Aug 2017

Carbon Black

Build Strong Security, Starting From The Device-Level
sponsored by Lenovo
EGUIDE: In this eGuide, take a look at physical security threats to which every computer—whether desktop PC, laptop or tablet— is vulnerable, and discover how to guard against them.
Posted: 01 May 2017 | Published: 01 May 2017

Lenovo

SWIFT Banking System Boosts Security Following Cyberattacks
sponsored by BAE Systems Applied Intelligence
EGUIDE: Following a number of attacks on the SWIFT banking system that led to the theft of millions of dollars, SWIFT promised new rules to improve security for bank transfers. In this e-guide, we examine these targeted malware attacks and explore SWIFT's response to them. Find out if their 5-part strategic program was enough to bolster security.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement