Software  >   Malware  >  

Mytob

RSS Feed    Add to Google    Add to My Yahoo!
Mytob Reports
 
The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
sponsored by ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
Posted: 29 Jul 2016 | Published: 29 Jul 2016

ComputerWeekly.com

Securing Office 365 Is Easier Than You Think
sponsored by Palo Alto Networks
WHITE PAPER: SaaS security concerns can no longer be ignored: Discover how to safely enable Office 365. Read on to address O365-specific security concerns, including details on how to secure O365 from malware insertion and data loss, gain visibility into SaaS usage, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

Kaspersky Internet Security 7.0
sponsored by Kaspersky Lab
TRIAL SOFTWARE: Try this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.
Posted: 16 Nov 2007 | Premiered: 01 Nov 2007

Kaspersky Lab

HP Security Cyber Risk Report
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014

Hewlett Packard Enterprise

Stuxnet 0.5: The Missing Link
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, gain new insight on Stuxnet, and uncover recent key findings on where and how it may have originated in the hopes is improving a defense tactic to prevent and defend against it.
Posted: 28 Oct 2013 | Published: 28 Oct 2013

Symantec Corporation

Case Study: WebEx - Securing Web Collaboration
sponsored by Qualys
CASE STUDY: Read this case study to learn about the vulnerability and compliance risk management program WebEx has implemented to ensure security and confidentiality among their customers.
Posted: 18 May 2010 | Published: 18 May 2010

Qualys

Anti-Spyware: Choosing the Right Solution for Your Business
sponsored by Intel Security
WHITE PAPER: Spyware is rapidly becoming the number one threat to business systems and can destructively burden them if left undetected. Read this white paper to learn how an anti-spyware solution can meet your business requirements while securing your system.
Posted: 27 Mar 2007 | Published: 01 Oct 2005

Intel Security

Software Security for Web Developers: Providing a Helping Hand
sponsored by Imperva
EGUIDE: This expert e-guide from SearchSecurity.com sheds light on how fostering harmony between security and software development teams can ensure application protection early on.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Imperva

Metrics That Matter: Quantifying Software Security Risk
sponsored by Fortify Software
WHITE PAPER: Software security presents new measurement challenges: there are no established formulas for quantifying the security risk present in an application. This paper provides a set of metrics for ensuring an accurate view of software projects.
Posted: 07 May 2007 | Published: 01 Jan 2006

Fortify Software

More Complex = Less Secure: Miss a Test Path and You Could Get Hacked
sponsored by McCabe Software, Inc.
WHITE PAPER: The same improvements that increase software performance create new security risks that IT pros must contend with. This white paper takes a closer look at the nature of software complexity and describes tactics you can implement to minimize it.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement