IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Parameter tampering is a form of Web-based attack in which certainparameters in the Uniform Resource Locator (URL)or Web page form field data entered by a user are changed without that user's authorization. Thispoints the browserto a link, page or site other than the one the user intends (although it may look exactly the sameto the casual observer).Parameter tampering can be employed by criminals and  … 
Definition continues below.
Security ThreatsReports
76 - 100 of 1959 Matches Previous Page  | Next Page
Security Threat Report 2014
sponsored by Sophos, Inc.
WHITE PAPER: In this security threat report, explore how malware has evolved and botnet and exploit kit innovations have proliferated. Read on to learn how a hacker can profit from your smartphone, tips for protecting your web server and clients, how to protect from targeted threats to your financial accounts, and more.
Posted: 11 Aug 2014 | Published: 31 Dec 2013

Sophos, Inc.

Vulnerability Assessment and Penetration Testing: Can You Afford Not To?
sponsored by Pwine Express
WHITE PAPER: This informative white paper explains why vulnerability assessment and penetration testing are such critical tools in the fight against modern cybercrime, as well as how they can make a difference in your organization's security solution.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

Pwine Express

Magic Quadrant for Mobile Data Protection
sponsored by Sophos, Inc.
ANALYST REPORT: This Gartner Magic Quadrant for mobile data protection highlights 12 different platforms to choose from, including McAfee, Dell, Sophos, and more. View now to learn more about each platform, and what differentiates leaders from challenges, and visionaries from niche players.
Posted: 08 Aug 2014 | Published: 09 Sep 2013

Sophos, Inc.

Magic Quadrant for Endpoint Protection Platforms
sponsored by Sophos, Inc.
ANALYST REPORT: This in-depth Gartner Magic Quadrant compares 18 vendors and their EPPs. Inside, learn about each platform's strengths and cautions, and see how each matches up on the quality of their protection capabilities, the depth and breadth of features, and the ease of administration.
Posted: 08 Aug 2014 | Published: 08 Jan 2014

Sophos, Inc.

Top Three Tactics Advanced Attackers Use to Breach Pharmaceutical Organizations
sponsored by FireEye
WHITE PAPER: This essential white paper breaks down the top three most dangerous methods malicious attackers employ and evaluates strategies that can safeguard your sensitive data against them.
Posted: 08 Aug 2014 | Published: 08 Aug 2014

FireEye

Multifactor Authentication Methods You Can Use Now
sponsored by HID
EGUIDE: While FIDO-ready technology is still developing, there are several multifactor authentication methods that are ready to use now.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

HID

Determining the Right Mobile Security Solution for Your Organization
sponsored by IBM
WHITE PAPER: This helpful white paper presents the steps every organization should take before committing to a mobile security solution, and examines the pros and cons of different potential security strategies.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

IBM

The Essential Elements of Critical Infrastructure Protection against Advanced Threats
sponsored by FireEye
WHITE PAPER: This white paper highlights the current challenges organizations face in terms of cybersecurity. It also mentions 3 essential elements to an effective Critical Infrastructure Protection approach.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

FireEye

Rising security concern for online and mobile banking
sponsored by HID
NEWSLETTER: This resource explains the rising security concern for online and mobile banking, especially apparent in today's evolving threat landscape.
Posted: 07 Aug 2014 | Published: 23 Jul 2014

HID

Use Case: Secure Internet Access for 71,000 Australian Students
sponsored by Websense, Inc.
WHITE PAPER: This white paper describes a use case involving an Australian educational in need of a centralized, scalable solution in order to distribute materials to 45,000 users per day in safe, easily accessible manner.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

Websense, Inc.

Diversionary and Multivector DDoS Attacks
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this essential white paper, you'll learn about the rise of these destructive attacks, why they are so difficult to block, and how an integrated security solution could help keep your organization protected.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

Juniper Networks, Inc.

The New Breed of DDoS Attacks: An Executive Brief
sponsored by Juniper Networks, Inc.
WHITE PAPER: This informative resource breaks down the new breed of DDoS attacks, and provides strategies for keeping your organization protected.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

Juniper Networks, Inc.

Use Case: Scaling a University's Intrusion Detection System to Support 30,000 Users
sponsored by Gigamon
WHITE PAPER: This white paper explores a use case in which a major research university needed to upgrade its intrusion detection system (IDS) to secure 30,000 users and monitor tens of gigabits of internet traffic each second.
Posted: 07 Aug 2014 | Published: 30 Jun 2014

Gigamon

Shadow IT in the Enterprise
sponsored by Nasuni Corporation
WHITE PAPER: In this report, discover survey results from more than 1,000 enterprise users to give you a better sense of who is using Dropbox and for what purposes. Don't be surprised to learn that smartphone and tablet users are much more likely to use Dropbox – read on to find out more.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

Nasuni Corporation

McAfee Next Generation Firewall
sponsored by McAfee, Inc.
WHITE PAPER: This resource provides an inside glance at McAfee's next generation firewall (NGFW) solution that stands apart from the crowd.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

McAfee, Inc.

Cybersecurity’s Maginot Line: A Real-World Assessment Of The Defense-In-Depth Model
sponsored by FireEye
WHITE PAPER: This essential white paper outlines how organizations can update their security solutions for the modern age by reducing waste on redundant, backward-looking technology, and refocusing on defenses designed to stop today's cyber attacks.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

FireEye

The McAfee Next Generation Firewall Revolutionizes Network Security
sponsored by McAfee, Inc.
DATA SHEET: This white paper highlights a next-generation firewall (NGFW) solution that is up to speed with the latest technological advancements, and stands apart from your traditional firewall solutions.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

McAfee, Inc.

The Heartbleed Bug: How To Protect Your Business
sponsored by Symantec Corporation
WHITE PAPER: In this in-depth white paper, learn how new security platforms can protect your data against Heartbleed and any future attacks with advanced tools like two-factor authentication.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

Symantec Corporation

Reducing the Cost and Complexity of Web Vulnerability Management
sponsored by Symantec
WHITE PAPER: This white paper investigates how to reduce the cost and complexity of Web vulnerability management with a managed approach for detection.
Posted: 05 Aug 2014 | Published: 31 Dec 2012

Symantec

The Key to Protecting your Website is Knowledge
sponsored by Symantec
WHITE PAPER: Learn how vulnerabilities can seriously affect your organisation if the proper steps aren't taken towards protection.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

Symantec

Advanced Attacks Demand New Defenses
sponsored by McAfee, Inc.
WHITE PAPER: Find out how your business should fight back against cyber-criminals utilizing APTs.
Posted: 04 Aug 2014 | Published: 28 Feb 2014

McAfee, Inc.

Cisco 2014 Midyear Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: As the Internet of Things accelerates, adversaries will spend even more time finding weak links across the threat landscape and using them to their advantage to compromise systems and data. Download this white paper to learn about these threats as well as industry-specific risks.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

Cisco Systems, Inc.

Privileged Account Security: Protect Your Data without Sacrificing Efficiency
sponsored by BeyondTrust Corporation
WHITE PAPER: Read this white paper to learn how new security solutions can help your business manage privileged account security without sacrificing efficiency.
Posted: 01 Aug 2014 | Published: 28 Feb 2014

BeyondTrust Corporation

Context-Aware Vulnerability Management: The Basics
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper outlines the benefits of context-aware vulnerability management solutions, and if it is the right security solution for your organization.
Posted: 01 Aug 2014 | Published: 31 Jan 2014

BeyondTrust Corporation

Cybercriminals Exploit New Weaknesses in Retailers’ Networks
sponsored by FireEye
WHITE PAPER: In this informative white paper, discover how you can protect your retail business and your customers by implementing smart security strategies, including increased endpoint security and privileged account management.
Posted: 08 Aug 2014 | Published: 08 Aug 2014

FireEye
76 - 100 of 1959 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY THREATS DEFINITION (continued): …  identitythieves to surreptitiously obtain personal or business information about the user.Countermeasures specific to the prevention of parameter tampering involve the validation of allparameters to ensure that they conform to standards concerning minimum and maximum allowablelength, allowable numeric range, allowable character sequences and patterns, whether or not theparameter is actually required to conduct the transaction in question, and whether or not null isallowed.Whitelisting(accepting only allowable input) is more effective than blacklisting(refusing to accept forbidden input). A Web … 
Security Threats definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement