Software  >   Malware  >  

Mass Mailing Worms

RSS Feed   
Mass Mailing Worms Reports
 
Memory corruption attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.
Posted: 30 Mar 2007 | Published: 01 Mar 2007

Symantec Corporation

The Bot Threat
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defence-in-depth security system to prevent these attacks from compromising your networks.
Posted: 13 May 2014 | Published: 30 Nov 2012

Hewlett-Packard Enterprise

Cyber Attacks on the Rise: IBM 2007 Report
sponsored by IBM
WHITE PAPER: This white paper shows how the IBM Internet Security Systems™ X-Force® research and development team discovered, analyzed and recorded new vulnerabilities and the status of varying threats throughout the first six months of this year.
Posted: 19 Nov 2007 | Published: 01 Aug 2007

IBM

Laying the IT Security Foundation
sponsored by Lumension
WHITE PAPER: Learn how in today's evolving threat landscape you need to lay the proper IT security foundation that proactively addresses the root cause of attacks such as Conficker.
Posted: 06 Apr 2009 | Published: 06 Apr 2009

Lumension

Securing Your Business with Your Network: Security Made Simple
sponsored by Cisco Systems, Inc.
BROCHURE: Network security is essential for your business because it allows employees and vendors to access company voice and data services over a secure network connection, wherever they may be located. Read this paper to learn how to secure your business network
Posted: 22 Feb 2008 | Published: 01 Dec 2006

Cisco Systems, Inc.

Next Generation Web Application Firewalls (NG-WAF)
sponsored by Imperva
WHITE PAPER: This paper describes Imperva's vision for the next generation of WAFs. It details Web application security problems and solutions today, and gives perspectives on the future.
Posted: 02 Jun 2010 | Published: 02 Jun 2010

Imperva

Stopping Zombies, Botnets and Other Email-Borne Threats
sponsored by Sophos
WHITE PAPER: Hijacked computers, or zombies, hide inside networks where they send spam, steal information, and enable serious crimes. Download this white paper and learn how the threat has evolved, how zombie networks are created and why organizations are vulnerable.
Posted: 20 Oct 2006 | Published: 01 Aug 2006

Sophos

Global Threat Trends- February 2010
sponsored by ESET
WHITE PAPER: Review this report to see what threats had the highest number of detections in the past month according to the results of a sophisticated analysis provided by ESET's ThreatSense.Net®.
Posted: 25 Feb 2010 | Published: 25 Jan 2010

ESET

Case Study: Panda Security Enables Gloucestershire NHS to Communicate Effectively and Safely
sponsored by Panda Security
CASE STUDY: Learn how Gloucestershire NHS was able to help 1700 client computers send and receive vital information safely and efficiently by installing Panda's Managed Office Protection Antivirus solution.
Posted: 18 Sep 2009 | Published: 25 Jul 2009

Panda Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement