Software  >   Malware  >  

Software Worms

RSS Feed    Add to Google    Add to My Yahoo!
Software WormsReports
 
Five Ways to Improve Your Wireless Security
sponsored by Cisco Systems, Inc.
TECHNICAL ARTICLE: A wireless network can help your employees stay productive as they move around your company, but to take advantage of the benefits of wireless networking, you need to be sure that your network is safe from hackers and unauthorized users.
Posted: 10 Jul 2008 | Published: 01 Feb 2008

Cisco Systems, Inc.

Global Threat Trends - December 2009
sponsored by ESET
WHITE PAPER: Review this report to see what threats had the highest number of detections in the past month according to the results of a sophisticated analysis provided by ESET's ThreatSense.Net.
Posted: 16 Sep 2009 | Published: 02 Sep 2009

ESET

Drive-by Downloads--The Web Under Siege
sponsored by Kaspersky Lab
WHITE PAPER: In this white paper, we will explore what actually happens during a drive-by attack, the lures used to perpetrate attacks, the technology behind the attacks, and the use of drive-by download attacks in personal data theft and computer takeovers.
Posted: 19 Aug 2009 | Published: 19 Aug 2009

Kaspersky Lab

Stuxnet 0.5: The Missing Link
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, gain new insight on Stuxnet, and uncover recent key findings on where and how it may have originated in the hopes is improving a defense tactic to prevent and defend against it.
Posted: 28 Oct 2013 | Published: 28 Oct 2013

Symantec Corporation

Case Study: Panda Security Enables Gloucestershire NHS to Communicate Effectively and Safely
sponsored by Panda Security
CASE STUDY: Learn how Gloucestershire NHS was able to help 1700 client computers send and receive vital information safely and efficiently by installing Panda's Managed Office Protection Antivirus solution.
Posted: 18 Sep 2009 | Published: 25 Jul 2009

Panda Security

Enhance Security with Intel® vPro™ Technology
sponsored by Intel Corporation
VIDEO: Security and compliance are strong values even in a down economy. Hear from a variety of clients that have used Intel® vPro™ Technology to identify problems, disable and enable the network, enhance patch management, and enabled them to isolate threats quickly and efficiently.
Posted: 08 Sep 2009 | Premiered: 08 Sep 2009

Intel Corporation

Understanding and Detecting Malware Threats Based on File Size
sponsored by Fortinet, Inc.
WHITE PAPER: Malware is typically within files that are less than one megabyte(MB) in size. According to Fortine research, 97% of malware discovered since the beginning of 2006 is below one MB in size.
Posted: 18 Feb 2008 | Published: 01 Dec 2006

Fortinet, Inc.

Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

IT Decision Checklist: Antimalware
sponsored by ESET
EGUIDE: Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.
Posted: 14 Jun 2010 | Published: 14 Jun 2010

ESET

Laying the IT Security Foundation
sponsored by Lumension
WHITE PAPER: Learn how in today's evolving threat landscape you need to lay the proper IT security foundation that proactively addresses the root cause of attacks such as Conficker.
Posted: 06 Apr 2009 | Published: 06 Apr 2009

Lumension
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement