IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Parameter tampering is a form of Web-based attack in which certainparameters in the Uniform Resource Locator (URL)or Web page form field data entered by a user are changed without that user's authorization. Thispoints the browserto a link, page or site other than the one the user intends (although it may look exactly the sameto the casual observer).Parameter tampering can be employed by criminals and  … 
Definition continues below.
Security ThreatsReports
1 - 25 of 1964 Matches Previous Page  | Next Page
e-Guide: Conquering Advanced Persistent Threat Attacks
sponsored by CDW Corporation
EGUIDE: This expert e-Guide clears up common misconceptions about the dangers and characteristics of advanced persistent threats (APTs), and also explains how context-aware security can improve the detection of APTs within enterprises.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

CDW Corporation

App Security: Decompiling Android APK Files
sponsored by CDW Corporation
EGUIDE: In this informative e-guide, expert Andrew Hogg takes you through the steps of reverse-engineering Android applications for the purpose of scoping out security weaknesses.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

CDW Corporation

Six Ways You May Be Losing Mobile Data and Not Even Know It
sponsored by Symantec Corporation
WHITE PAPER: This crucial white paper outlines the 6 ways that your mobile data could be compromised, and why you might not even realize that it's happening until it's too late.
Posted: 29 Aug 2014 | Published: 31 Dec 2013

Symantec Corporation

Countering Cyber Threats with Behavioral Analytics
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper explores how organizations can leverage big data and behavioral analytics in their network to foil the top attacks.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

RSA, The Security Division of EMC

Combatting Digital Fraud: A CIO Report
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this informative white paper, explore a web threat detection solution that leverages big data to enable security teams to better combat digital fraud.
Posted: 29 Aug 2014 | Published: 30 Jun 2014

RSA, The Security Division of EMC

Vendor Landscape: Intrusion Detection and Prevention Systems
sponsored by IBM
WHITE PAPER: This comprehensive resource compares 12 competitors in the IDPS market, providing a number of tools for comparing and evaluating each vendor's solution in order to determine the best fit for your enterprise's needs.
Posted: 28 Aug 2014 | Published: 31 Dec 2013

IBM

Managing Mobile Application Security in the Age of BYOD and the Cloud
sponsored by Bluebox
WHITE PAPER: In this expert guide, get an inside look at how to improve your organization's mobile app security and how to avoid the common pitfalls of cloud-based MAM.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

Bluebox

Online Brand Infringement: Where Do You Start?
sponsored by DomainTools
WHITE PAPER: In this informative white paper, discover a new brand monitoring solution that can quickly identify and notify you of any domain registration that possibly infringes on your brand.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

DomainTools

Boost Advanced Persistent Threat Security Levels in 6 Steps
sponsored by CDW Corporation
EGUIDE: This e-guide contains expert suggestions for mitigating the dangerous threat presented by APTs.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

CDW Corporation

Holistic Risk Management: Professional Perspectives
sponsored by IBM
WHITE PAPER: In this informative white paper, gain critical insights into the top strategies for strengthening enterprise-wide risk management and business resilience frameworks.
Posted: 27 Aug 2014 | Published: 31 Dec 2011

IBM

Why and How You Should Use a VPN
sponsored by Global Knowledge
WHITE PAPER: This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

Staying Secure and Compliant during Windows XP End-of-Life
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this white paper, discover the a new security solution that can enable you to continue using Windows XP to the fullest while keeping your systems compliant and secure.
Posted: 27 Aug 2014 | Published: 31 Dec 2013

Bit9 + Carbon Black

Lumension 2014 Data Protection Maturity Report
sponsored by Lumension
WHITE PAPER: This report focuses on top security trends for 2014 and reveals the best practices for safeguarding sensitive information.
Posted: 26 Aug 2014 | Published: 30 Jan 2014

Lumension

Analyst Report: How 9 Managed Security Service Providers Stack Up
sponsored by IBM
ANALYST REPORT: This Forrester Research, Inc. report identifies 9 managed security services providers (MSSPs) – AT&T, CSC, IBM, and more – that were researched, analyzed, and compared against one another. Explore how each provider stacks up against three categories: current offering, strategy, and market presence.
Posted: 26 Aug 2014 | Published: 26 Mar 2012

IBM

Symantec Managed Security: Integrating the Network and Endpoints
sponsored by Symantec Corporation
WHITE PAPER: In this informative white paper, discover a new threat protection platform that integrates security across the network and endpoint, while also providing critical context to detected attacks.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Symantec Corporation

Security Report 2014: Trends and Developments in the Security Industry
sponsored by IBM
WHITE PAPER: In this informative report, discover the most important security trends of last year, ranging from malware delivery to mobile device risks.
Posted: 26 Aug 2014 | Published: 28 Feb 2014

IBM

Proven Practices for Securing Your Website Against DDoS Attacks
sponsored by Dyn
WEBCAST: This expert webcast discusses how DDoS threats and vulnerabilities are impacting your web environment, ultimately creating dangerous risks for your business.
Posted: 26 Aug 2014 | Premiered: Aug 25, 2014

Dyn

Advanced Endpoint and Server Protection
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this informative white paper, gain critical insights into new strategies for protecting your organization against today's advanced cyber-attacks, including advanced heuristics, application control, and isolation technologies.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Bit9 + Carbon Black

Top Five Alternatives to Endpoint Antivirus Software
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this in-depth Forrester report, discover the top 5 technologies that security professionals are using to replace outdated antivirus software.
Posted: 26 Aug 2014 | Published: 09 Jun 2014

Bit9 + Carbon Black

Reducing the Reputational Impact of Data Breaches and Cyber-Attacks
sponsored by IBM
WHITE PAPER: This informative white paper explores the top strategies and techniques to protect your reputation by increasing business resilience and IT security across the enterprise.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

IBM

Get Tactical on Mobility: Managed Cloud-Based Options Balance Control with Flexibility and Scale
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this informative white paper to discover suggestions for a number of initiatives related to enterprise mobility, including mobility management and application access.
Posted: 25 Aug 2014 | Published: 30 May 2014

Hewlett-Packard Limited

Endpoint Threat Detection, Response, and Prevention for Dummies
sponsored by Bit9 + Carbon Black
EBOOK: In this in-depth eBook, gain critical insights into how organizations are targeted by advanced threats, and how your endpoints, servers, and other devices can function as entrances into your network for cyber criminals.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Bit9 + Carbon Black

Be Ready for Cyber-Attacks with New Endpoint Security and Monitoring Solutions
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this helpful white paper, uncover a new endpoint threat detection platform that can prepare your organization to fight back against inevitable cyber-attacks.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Bit9 + Carbon Black

Keep Your Endpoints Secure with Customizable Advanced Threat Protection
sponsored by Bit9 + Carbon Black
WHITE PAPER: This informative resource outlines a new approach to endpoint security that can provide your organization with real-time visibility and increased protection against modern cyber-attacks, including advanced persistent threats (APTs).
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Bit9 + Carbon Black

Virtualization Security: Choosing the Right Strategy for Your Organization
sponsored by Kaspersky Lab
WHITE PAPER: In this helpful resource, discover new virtualization security solutions that could be the key to keeping your virtual assets protected while preserving performance.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Kaspersky Lab
1 - 25 of 1964 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY THREATS DEFINITION (continued): …  identitythieves to surreptitiously obtain personal or business information about the user.Countermeasures specific to the prevention of parameter tampering involve the validation of allparameters to ensure that they conform to standards concerning minimum and maximum allowablelength, allowable numeric range, allowable character sequences and patterns, whether or not theparameter is actually required to conduct the transaction in question, and whether or not null isallowed.Whitelisting(accepting only allowable input) is more effective than blacklisting(refusing to accept forbidden input). A Web … 
Security Threats definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement