Software  >  

Mobile Malware

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Malware Reports
Adding Zero-Day Offense to Vulnerability Management
sponsored by Qualys
WHITE PAPER: This white paper describes what steps you can take to keep yourself safe from zero-day attacks.
Posted: 14 Oct 2015 | Published: 31 Dec 2012


New Buyers of SSL Certificates FAQs
sponsored by Symantec Corporation
WHITE PAPER: Industry analyst Chris Kissel presents and answers the top FAQs asked by new SSL certificate buyers to ease the purchasing process.
Posted: 09 Nov 2015 | Published: 14 Oct 2015

Symantec Corporation

Anatomy of A Hack Disrupted
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper takes a close-up look one successfully mitigated malware attack, giving you insight on how to stop a potential cyber-breach.
Posted: 28 Oct 2015 | Published: 28 Oct 2015

LogRhythm, Inc.

Using Threat Intelligence to Improve Enterprise Security
sponsored by BitDefender
EGUIDE: Access this expert guide to discover how threat intelligence can help you detect targeted or zero-day attacks and give your enterprise security the upper hand.
Posted: 02 Nov 2015 | Published: 02 Nov 2015


The Cybercrime Economics of Malicious Macros
sponsored by Proofpoint, Inc.
RESOURCE: Learn more about how cybercriminals are driving today's massive targeted attack campaigns with ease.
Posted: 20 Oct 2015 | Published: 07 Oct 2015

Proofpoint, Inc.

Case Study: Reducing Security Costs without Reducing Security
sponsored by Imperva
WHITE PAPER: This case study tells the story of a technology company that replaced its advanced but costly security system with one that provided the same amount of protection for a much lower price.
Posted: 05 Oct 2015 | Published: 31 Dec 2014


APT Attacks and Ways to Protect Your Network
sponsored by Proofpoint, Inc.
EGUIDE: In this expert e-guide, examine several approaches to protecting your network from APT attacks, including global threat intelligence.
Posted: 06 Nov 2015 | Published: 29 Oct 2015

Proofpoint, Inc.

20 Critical Controls for Effective Cyber Defense
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper explores how you can obtain versatile and comprehensive security by adopting twenty essential security controls.
Posted: 04 Nov 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

Multi-Layered Defense for an Evolving Threat Landscape
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Access this webcast to learn how you can protect against both known and unknown malware and to make today's difficult cybersecurity landscape just a little bit easier.
Posted: 16 Nov 2015 | Premiered: Oct 13, 2015

Check Point Software Technologies Ltd.

October 2015: DDoS Attacks & Protection Report: North America & EMEA
sponsored by Neustar®
WHITE PAPER: This white paper examines DDoS attacks within the last 6 months and reveals key information to learn how to protect your network against determined cybercriminals. View now to learn why you should worry more about low-and-slow attacks rather than a tidal wave DDoS attack.
Posted: 12 Oct 2015 | Published: 29 Sep 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement