Software  >   Malware  >  

Kernel Rootkits

RSS Feed   
Kernel Rootkits Reports
 
Sophos Computer Security Scan
sponsored by Sophos
TRIAL SOFTWARE: Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found.
Posted: 07 Apr 2010 | Premiered: 07 Apr 2010

Sophos

Worry-Free Business Security Standard
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD: Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.
Posted: 26 Oct 2010 | Premiered: 26 Oct 2010

Trend Micro, Inc.

Sophos Virus Removal Tool: Free virus detection and removal
sponsored by Sophos
TRIAL SOFTWARE: Download your complimentary copy of Sophos Virus Removal Tool, a free antivirus solution that will identify and remove viruses from your computers quickly and easily.
Posted: 09 May 2013 | Premiered: 09 May 2013

Sophos

Kaspersky Internet Security 7.0
sponsored by Kaspersky
TRIAL SOFTWARE: Try this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.
Posted: 16 Nov 2007 | Premiered: 01 Nov 2007

Kaspersky

Small Businesses Deserve Big Protection
sponsored by Cisco Umbrella
EBOOK: 66% of all small businesses have experienced a cyberattack. And now, the rise in SaaS apps and an increase in remote workers has forced these businesses to address their increasingly outdated infrastructure. How can your small business survive evolving threats? Take a look at this e-book to see where you can make a change.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Cisco Umbrella

Inky 2020 End of Year Phishing Report
sponsored by Inky Technology
RESEARCH CONTENT: With most people working remote in 2020, reliance on email for communication grew even higher – leading to a stark rise in phishing attacks. This report reflects on the top threat types and security strategies for phishing in 2020 and offers insight into what to expect in 2021 – read on to unlock the full report.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Inky Technology

The Fidelis Threat Intelligence Toolkit is Here
sponsored by Fidelis
RESOURCE: Organizations are struggling to keep up with threat actors as they engage different vectors and develop their toolkit of attacks. It seems only fair, then, that you have a toolkit of your own. Click here to access your Fidelis Threat Intelligence Toolkit. Leverage the latest cybersecurity news and know what’s on the prowl and how to defend.
Posted: 21 Jan 2021 | Published: 21 Jan 2021

Fidelis

Phishing: Not Just One Kind of Attack
sponsored by Atakama
RESOURCE: Phishing attacks utilize a wide range of ever-evolving techniques to steal data, from impersonating executives to targeting and duping unsuspecting employees. How can you better understand these scams? This article breaks down common schemes, their targets and their indicators, and gives a solution from Atakama for keeping these threats at bay.
Posted: 07 Dec 2020 | Published: 19 Aug 2020

Atakama

Into the Era of Secure Remote Work
sponsored by IT Corporation
EBOOK: The decentralization of the workplace makes endpoint security more critical than ever. And the new tactics used by hackers and cybercriminals require focus on different tools and solutions, not least when it comes to the cloud. What strategies can you employ to remain resilient? Dive into this e-book and grab security by the horns.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

IT Corporation

Software & Cloud Lifecycle Management Transformation
sponsored by Livingstone Tech
EBOOK: What does a software and cloud lifecycle management transition look like? Dive inside this quick blueprint to step through a software and cloud lifecycle management workshop of your own, revealing the lifecycle challenges your own organization might be grappling with — sometimes without even knowing — and pointing towards the answers of best fit.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Livingstone Tech
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences