Software  >   Malware  >   Spyware  >  

Advertising Software

RSS Feed   
Advertising Software Reports
 
eGuide:Mitigating malicious advertisement malware
sponsored by SearchSecurity.com
EGUIDE: More than one million websites were infected by malicious advertisements, also known as malvertisements, in the last quarter of 2010. This expert guide explains why and how this form of attack is quickly spreading and offers technical advice on how to avoid infection.
Posted: 24 Jun 2011 | Published: 24 Jun 2011

SearchSecurity.com

Threatsaurus: The A-Z of Computer and Data Security Threats
sponsored by Sophos UK
BOOK: Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.
Posted: 25 May 2010 | Published: 01 Dec 2009

Sophos UK

Sophos Computer Security Scan
sponsored by Sophos
TRIAL SOFTWARE: Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found.
Posted: 07 Apr 2010 | Premiered: 07 Apr 2010

Sophos

Top 5 Reasons Why Savvy MSPs Are Adopting Managed Security Services
sponsored by Avast Software
WHITE PAPER: Small and medium-sized businesses (SMBs) are under attack by a variety of cyberthreats, but these organizations either do not realize how vulnerable they are or do not have the necessary time, resources, or skills to address the issues. This white paper introduces managed security services as a key strategy for evolving your business.
Posted: 11 Oct 2019 | Published: 31 May 2019

Avast Software

A Look Inside Financially Motivated Attacks and the Active FIN8 Threat Group
sponsored by Gigamon
ANALYST REPORT: Download this report to explore a detailed view into the inner workings of financially motivated threat actor groups, including their preferred tactics and tools. Gaining an understanding of the anatomy of these attacks can help your team to improve visibility into the threats and expedite rapid detection and response.
Posted: 29 Aug 2019 | Published: 29 Aug 2019

Gigamon

Tricentis Slams the Door on C-level Email Attacks Using Barracuda Sentinel
sponsored by Barracuda
VIDEO: Tune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.
Posted: 08 Oct 2019 | Premiered: 31 May 2019

Barracuda

GreyEnergy: Dissecting the Malware from Maldoc to Backdoor
sponsored by Nozomi Networks
WHITE PAPER: GreyEnergy uses a common infection method, phishing emails with infected documents. However, the malware's code is anything but common – it is well written, smartly put together and designed to defeat detection by cybersecurity products. In this white paper, dive into an analysis of how the malware works.
Posted: 26 Sep 2019 | Published: 28 Feb 2019

Nozomi Networks

CenturyLink 2019 Threat Report
sponsored by CenturyLink
ANALYST REPORT: Organizations will continue to accelerate the deployment of new technologies and capabilities that drive network traffic and security complexity. In the CenturyLink 2019 Threat Report, explore the role of deep network-based threat intelligence and discover the latest risks and attacks including botnets, DNS attacks, and more.
Posted: 19 Sep 2019 | Published: 19 Sep 2019

CenturyLink

Sharpen your Focus on Spear Phishing Attacks in 2019
sponsored by PortSys
RESOURCE: How can you ensure you don’t end up being skewered by a spear phishing attack? Stronger identity management with multiple factors of authentication? Biometrics? How about Context of Access? Find out the facts in this revealing overview from security pundit Michael Oldham, CEO of PortSys.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

PortSys

BlackBerry Cylance Cybersecurity Maturity Evaluation Guide
sponsored by Blackberry Cylance
EGUIDE: In this guide, discover a methodology and roadmap for organizations of all sizes to use in assessing and advancing the maturity of their cyber risk management programs.
Posted: 18 Sep 2019 | Published: 18 Sep 2019

Blackberry Cylance
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement