Software  >   Malware  >  

Variants

RSS Feed    Add to Google    Add to My Yahoo!
VariantsReports
 
SANS Survey on Application Security Programs and Practices
sponsored by Hewlett-Packard Company
WHITE PAPER: This SANS report pinpoints where the vulnerability gaps lie in today's application security programs. Click through for key recommendations on how to address these issues.
Posted: 04 Apr 2014 | Published: 28 Feb 2014

Hewlett-Packard Company

What E-Mail Hackers Know That You Don't
sponsored by CipherTrust, Inc.
WHITE PAPER: E-mail hackers are constantly developing new methods of breaking into your network. Download this whitepaper to learn what they're doing, how they're doing it, and how you can stop them.
Posted: 28 Oct 2005 | Published: 31 Dec 2005

CipherTrust, Inc.

Webroot Enterprise Spy Audit
sponsored by Webroot
TRIAL SOFTWARE: Spyware is a dynamic threat that requires a dedicated solution to defeat it. This free IT download performs a spyware audit throughout your system to provide a clear view of the system's status, helping you manage the threat of harmful intruders.
Posted: 16 Oct 2006 | Premiered: 16 Oct 2006

Webroot

Anti-Spyware: Choosing the Right Solution for Your Business
sponsored by McAfee, Inc.
WHITE PAPER: Spyware is rapidly becoming the number one threat to business systems and can destructively burden them if left undetected. Read this white paper to learn how an anti-spyware solution can meet your business requirements while securing your system.
Posted: 27 Mar 2007 | Published: 01 Oct 2005

McAfee, Inc.

Case Study: WebEx - Securing Web Collaboration
sponsored by Qualys
CASE STUDY: Read this case study to learn about the vulnerability and compliance risk management program WebEx has implemented to ensure security and confidentiality among their customers.
Posted: 18 May 2010 | Published: 18 May 2010

Qualys

Metrics That Matter: Quantifying Software Security Risk
sponsored by Fortify Software
WHITE PAPER: Software security presents new measurement challenges: there are no established formulas for quantifying the security risk present in an application. This paper provides a set of metrics for ensuring an accurate view of software projects.
Posted: 07 May 2007 | Published: 01 Jan 2006

Fortify Software

Securing Embedded Software with Threat Modeling
sponsored by Klocwork
PRESENTATION TRANSCRIPT: This presentation transcript explains threat modeling for embedded software and how it can be used as part of a strategy for creating more secure embedded software.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

Klocwork

Beating Web Application Security Threats
sponsored by Thawte Inc.
EBOOK: The rapid increase in usage, development and complexity of Web applications has created new opportunities for companies that employ them and hackers who attack them. This handbook delivers up-to-date information on security threats to Web 2.0 and rich Internet applications and expert advice on how to avoid those threats.
Posted: 18 Mar 2010 | Published: 18 Mar 2010

Thawte Inc.

Kaspersky Internet Security 7.0
sponsored by Kaspersky Lab
TRIAL SOFTWARE: Try this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.
Posted: 16 Nov 2007 | Premiered: 01 Nov 2007

Kaspersky Lab

Understanding and Detecting Malware Threats Based on File Size
sponsored by Fortinet, Inc.
WHITE PAPER: Malware is typically within files that are less than one megabyte(MB) in size. According to Fortine research, 97% of malware discovered since the beginning of 2006 is below one MB in size.
Posted: 18 Feb 2008 | Published: 01 Dec 2006

Fortinet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement