IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Parameter tampering is a form of Web-based attack in which certainparameters in the Uniform Resource Locator (URL)or Web page form field data entered by a user are changed without that user's authorization. Thispoints the browserto a link, page or site other than the one the user intends (although it may look exactly the sameto the casual observer).Parameter tampering can be employed by criminals and  … 
Definition continues below.
Security ThreatsReports
51 - 75 of 1900 Matches Previous Page  | Next Page
Top 5 Malware Trends for 2014 and How to Combat Them
sponsored by Webroot
WHITE PAPER: This white paper describes the top five malware trends that are expected to grow throughout this year and the ways that your enterprise can protect its sensitive data.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

Webroot

The Promises and Pitfalls of BYOD
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Find out how to let employees use personal smartphones, tablets and laptops for work purposes while protecting your network from malware, data theft and unauthorized access.
Posted: 18 Jul 2014 | Published: 07 Feb 2014

Dell, Inc. and Intel®

Keeping Advanced Persistent Threats in Check
sponsored by CDW Corporation
WHITE PAPER: This white paper provides valuable information on APTs and proposes one company's comprehensive next-generation security solution.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

CDW Corporation

Securing virtual desktop infrastructure with Citrix NetScaler
sponsored by Citrix
WHITE PAPER: This paper explains how, by integrating an extensive set of network and application-layer protection mechanisms, Citrix® NetScaler® can provide advanced access and action control capabilities, deep visibility for rapid trouble shooting and a wealth of additional service delivery features.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

Citrix

Why Your Company Should Consider Professional Security Services
sponsored by CDW Corporation
WHITE PAPER: This white paper details the professional security services offered by CDW, which include the people, partners, and planning capabilities to assist your organization in devising a comprehensive security strategy.
Posted: 17 Jul 2014 | Published: 17 Jul 2014

CDW Corporation

After Malware: The Next Mobile Security Battle
sponsored by Sophos, Inc.
WEBCAST: In this webcast, you will find that malware is here to stay, yet it's not the only threat that we need to be aware of. Watch now to understand the battle beyond malware, considering vulnerable applications, advanced adversaries, and the enemy within.
Posted: 17 Jul 2014 | Premiered: Jul 7, 2014

Sophos, Inc.

Your Guide to the Biggest Security Trends of 2014
sponsored by CDW Corporation
EGUIDE: This guide discusses the security-related trends that you need to know about in 2014.
Posted: 17 Jul 2014 | Published: 28 Feb 2014

CDW Corporation

Security Solutions for Every Layer of Your IT Environment
sponsored by CDW Corporation
RESOURCE: View this infographic now to learn about critical security concerns within every layer of your IT environment and the steps that you can take to prevent these dangerous threats.
Posted: 16 Jul 2014 | Published: 16 Jul 2014

CDW Corporation

The Devices Are Coming! How the "Internet of Things" Will Affect IT
sponsored by Cox Communications, Inc.
WHITE PAPER: This informative report provides insight into what others are (or aren't) doing to prepare for the invasion of internet-connected devices in the workplace, as well as the changes that your enterprise should anticipate in the coming years.
Posted: 16 Jul 2014 | Published: 31 May 2014

Cox Communications, Inc.

Automated Removal of Advanced Threats: Defending Your Enterprise with Bob Gourley
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This report from CTOvision introduces automated threat removal, an economical defense method that enables businesses to have an "invisible workforce" working around the clock to ward off attackers.
Posted: 14 Jul 2014 | Premiered: Jun 16, 2014

Hexis Cyber Solutions Inc

The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report
sponsored by Neustar®
WHITE PAPER: This white paper reveals valuable insights into the impact of DDoS smokescreening based on a survey of 440 North American companies.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Neustar®

It's Time for a Serious Talk: 3 Questions to Ask Your DNS Host about Lowering DDoS Risks
sponsored by Neustar®
WHITE PAPER: This white paper provides answers to three questions about DDoS attacks that you need to ask your DNS host before, not after, your company becomes a target.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Neustar®

eGuide: Patching Vulnerabilities with Web Application Firewalls
sponsored by Alert Logic
EGUIDE: This eGuide explains how web application firewalls can help to patch vulnerabilities in web applications and protect your enterprise from current and future threats.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Alert Logic

An Inside Track on Insider Threats
sponsored by Imperva
WHITE PAPER: Read this informative report for details on the impact of insider threats, as well as recommended strategies for businesses to apply in preventing and remediating these critical issues.
Posted: 11 Jul 2014 | Published: 31 Dec 2012

Imperva

Imperva Security Solutions
sponsored by Imperva
WHITE PAPER: This whitepaper describes a comprehensive security suite that protects digital assets in their repositories and detects abnormal behaviors from compromised users to protect sensitive company data from intruders.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Imperva

Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets with Strong Authentication
sponsored by HID
WHITE PAPER: In this white paper, explore how one authentication solution allows organizations to establish trust in their user identities when utilizing mobile device access.
Posted: 11 Jul 2014 | Published: 28 Mar 2014

HID

How Web Application and Next Generation Firewalls Stack Up Against OWASP Threats
sponsored by Imperva
RESOURCE: This infographic depicts how two types of firewalls--web application firewalls and next generation firewalls--measure up against the threats considered to be the "top 10" by the Open Web Application Security Project (OWASP) threats.
Posted: 11 Jul 2014 | Published: 31 Dec 2013

Imperva

The Anatomy of an Anonymous Attack
sponsored by Imperva
RESOURCE: This infographic depicts the timeline of attacks perpetrated by hacktivist group Anonymous, notorious for its DDoS attacks on controversial organisations around the world.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Imperva

How Resellers Can Become the Trusted Advisors on Security Issues
sponsored by Webroot
WHITE PAPER: This white paper introduces an innovative endpoint security solution with a completely cloud-based architecture rather than the outdated, signature-based methods of the past.
Posted: 11 Jul 2014 | Published: 31 May 2014

Webroot

2014 Gartner Magic Quadrant for Web Application Firewalls
sponsored by Imperva
ANALYST REPORT: Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Imperva

Fundamentals of the PKI Infrastructure
sponsored by Global Knowledge
WHITE PAPER: This article reviews the basics of PKI, which increases data security through the use of advanced access methods and ensures that the authenticity of the data flow is preserved.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Global Knowledge

HID Global’s Identity Assurance SMB Solution
sponsored by HID
WHITE PAPER: In this resource, explore how a strong authentication method is possible without tokens or any complexity.
Posted: 10 Jul 2014 | Published: 03 May 2013

HID

Dragonfly: Cyberespionage Attacks Against Energy Suppliers
sponsored by Symantec Corporation
WHITE PAPER: The following security response provides an overview of the tools and tactics used by the attackers and a timeline of their attacks. Read on to inform your company of possible malware threats.
Posted: 09 Jul 2014 | Published: 30 Jun 2014

Symantec Corporation

Establishing Trust in Online Identities
sponsored by HID
WHITE PAPER: Access this white paper to discover strong authentication and credential management solutions and services.
Posted: 09 Jul 2014 | Published: 04 Dec 2012

HID

Mitigating the OWASP Top 10 2013 with Imperva SecureSphere
sponsored by Imperva
WHITE PAPER: This informative guide outlines an effective tool designed to help mitigate the OWASP top 10 and how it can greatly enhance your enterprise security.
Posted: 08 Jul 2014 | Published: 31 Dec 2013

Imperva
51 - 75 of 1900 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY THREATS DEFINITION (continued): …  identitythieves to surreptitiously obtain personal or business information about the user.Countermeasures specific to the prevention of parameter tampering involve the validation of allparameters to ensure that they conform to standards concerning minimum and maximum allowablelength, allowable numeric range, allowable character sequences and patterns, whether or not theparameter is actually required to conduct the transaction in question, and whether or not null isallowed.Whitelisting(accepting only allowable input) is more effective than blacklisting(refusing to accept forbidden input). A Web … 
Security Threats definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement