Software  >   Malware  >  

Viruses

RSS Feed    Add to Google    Add to My Yahoo!
VirusesReports
 
Update Your Application Security Policy After Heartbleed
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Cobb explains why relying solely on other parties to correctly implement and deliver software security can put enterprise and customer data at risk.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Hewlett-Packard Company

Take Inventory of your Open Source Software Security
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Cobb explains why enterprise development teams should create in-house repositories to mitigate the risks of applications built on open source code.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Hewlett-Packard Company

Improving Software Security by Identifying and Securing Path Linking Attack Surfaces to Attack Targets
sponsored by McCabe Software, Inc.
WHITE PAPER: Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

Software Security for Web Developers: Providing a Helping Hand
sponsored by Imperva
EGUIDE: This expert e-guide from SearchSecurity.com sheds light on how fostering harmony between security and software development teams can ensure application protection early on.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Imperva

Understanding and Detecting Malware Threats Based on File Size
sponsored by Fortinet, Inc.
WHITE PAPER: Malware is typically within files that are less than one megabyte(MB) in size. According to Fortine research, 97% of malware discovered since the beginning of 2006 is below one MB in size.
Posted: 18 Feb 2008 | Published: 01 Dec 2006

Fortinet, Inc.

Kaspersky Internet Security 7.0
sponsored by Kaspersky Lab
TRIAL SOFTWARE: Try this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.
Posted: 16 Nov 2007 | Premiered: 01 Nov 2007

Kaspersky Lab

HP Security Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

Securing Embedded Software with Threat Modeling
sponsored by Klocwork
PRESENTATION TRANSCRIPT: This presentation transcript explains threat modeling for embedded software and how it can be used as part of a strategy for creating more secure embedded software.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

Klocwork

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.
Posted: 30 Mar 2007 | Published: 01 Mar 2007

Symantec Corporation

Webroot Enterprise Spy Audit
sponsored by Webroot
TRIAL SOFTWARE: Spyware is a dynamic threat that requires a dedicated solution to defeat it. This free IT download performs a spyware audit throughout your system to provide a clear view of the system's status, helping you manage the threat of harmful intruders.
Posted: 16 Oct 2006 | Premiered: 16 Oct 2006

Webroot
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement