ComputerWeekly.com Research Library

Powered by Bitpipe.com

Malware Research

  • Does Your Mobile Anti-Virus App Protect or Infect You? The truth behind DU Antivirus Security

    Sponsored by: Check Point Software Technologies Ltd.

    Instead of protecting user data, DU Antivirus Security, did just the opposite. Instead of encrypting data, they used private information for commercial purposes without permission. Go inside to learn more about how DU Antivirus Security works, and how you can take steps to avoid other malicious apps like it in the future.

  • Marcher Marches On: The Anatomy of a Banker Malware

    Sponsored by: Check Point Software Technologies Ltd.

    Inside, get a breakdown of the mobile banking malware known as Marcher. Learn how Marcher gets into mobile devices using flash phishing, what harm it can cause once inserted into your device, and more.

  • "The Next WannaCry" Vulnerability is Here – Let's Stop it before it's too Late

    Sponsored by: Check Point Software Technologies Ltd.

    Go inside to learn why the WannaCry attack was able to exploit the EternalBlue vulnerability 2 months after a patch was released, where the next big attack might come from, as well as tips you can take to bolster your system now to defend against malware in the future.

  • From HummingBad to Worse: The History of the Yingmob

    Sponsored by: Check Point Software Technologies Ltd.

    Inside, learn about the malware known as HummingBad, the main tool of the Chinese cybercriminal group Yingmob. Find out what damage this malware can do, how it went global, and more.

  • The Mobile Banker Threat - from End to End

    Sponsored by: Check Point Software Technologies Ltd.

    This resource offers an example of one strain of malware which infected Google Play, and shows you how easy it is for it to mutate, grow, and change to beat even advanced AVs. Read on to learn what you should do to protect yourself from these threats.

  • ExpensiveWall: A Dangerous 'Packed' Malware on Google Play that will Hit You in Your Wallet!

    Sponsored by: Check Point Software Technologies Ltd.

    Go inside this resource to learn what makes the new malware found on Google Play, nicknamed "ExpensiveWall" so unique and dangerous, as well as what steps you can take to stay protected.

  • Anti-Virus Comparative

    Sponsored by: Symantec & Blue Coat Systems

    Malicious software poses an ever-increasing threat, not only because the number of malware programs are increasing, but also due to the continuously changing threat-landscape. Uncover results from the Malware Protection Test and the Exploit Test to compare 7 endpoint security vendors.

  • The Real Identity behind a Wave of Cyberattacks on Energy, Mining and Infrastructure Companies

    Sponsored by: Check Point Software Technologies Ltd.

    This case study explores how, using a remote access Trojan known as NetWire and a keylogging program Hawkeye, a Nigerian hacker was able to steal thousands of dollars from companies. Read on to discover the larger trend of business email compromise attacks, and how you can better prepare your company to defend against them in the future.

  • The Evolution of Crypto Attacks: Understanding, Detecting, and Preventing Ransomware

    Sponsored by: Check Point Software Technologies Ltd.

    Watch this webinar to learn how ransomware targets your end users and infiltrates your network and explore the history of ransomware form the 1989 AIDS Trojan to 2016's KeRanger attack.

  • Symantec™ Cloud Generation Malware Analysis

    Sponsored by: Symantec & Blue Coat Systems

    Hackers continue to show endless ingenuity in penetrating corporate networks with malware, which means organizations need to fight back harder than ever. By reading this white paper, you'll learn more about defeating malware.

  • Most Wanted Malware: Banking Trojans and Ransomware That Want Your Money

    Sponsored by: Check Point Software Technologies Ltd.

    Read this rundown of the top 10 malwares that tried to steal your money in the summer of 2017.

  • The Next Generation of Cloud App Security

    Sponsored by: Symantec & Blue Coat Systems

    By 2020, 85% of large enterprises will use a cloud access security broker (CASB) platform for their cloud services which is up from less than 5% today, according to Gartner. This white paper offers benefits of CASB and how to increase efficacy, avoid incidents and more.

  • The Human Factor 2017

    Sponsored by: Proofpoint, Inc.

    90% of clicks on malicious URLs occur within 24 hours after they're delivered. Key into this webcast to get a closer look at when users are most likely to click into malicious URLs, which industry's users click the most, and what types of attacks have the most clicks.

  • Turning the Tide Against Ransomware

    Sponsored by: Proofpoint, Inc.

    WannaCry is officially the largest ransomware outbreak in history, infecting 300,000 total endpoints. But, is it justified to ever pay a ransomware? Watch this webcast to find out.

  • Your Security Sandbox Won't Catch it all: The Phishing Problem

    Sponsored by: Proofpoint, Inc.

    Take a look at this webcast to uncover different types of email threats through various applications and what your organization can do to reduce your vulnerabilities against malware.

  • Stop Malware Cold, Before it can Do Any Damage

    Sponsored by: Dell India

    Click inside this infographic to discover why prevention – not reaction – is the best way to fight back against the growing malware threat.

  • The Fight Against Ransomware

    Sponsored by: Sophos, Inc.

    Endpoint security has reached a tipping point. Ransomware is expected to generate $1B+ in profit this year. Gain insight into a ransomware strategy and how endpoint security has changed overtime by watching this webcast.

  • Sophos Phish Threat

    Sponsored by: Sophos, Inc.

    Look at this white paper to learn how to automate defense education for your users with routine campaigns, training, follow-up and reporting.

  • Firewall Best Practices to Block Ransomware

    Sponsored by: Sophos, Inc.

    Recent ransomware attacks like Wannacry and Petya have spread largely unchecked through corporate networks in recent months, extorting money to restore your data and regain control of your computers. This white paper reveals best practices for configuring your firewall and network to protect against ransomware.

  • 2017 Cyberattack Trends

    Sponsored by: Check Point Software Technologies Ltd.

    This report outlines how the threat landscape has changed in 2017 when it comes to ransomware, banking and mobile threats. Read on to learn from the past, so you might better secure the future.

  • Beginner's Guide to Ransomware Detection and Protection

    Sponsored by: AlienVault

    Within hours of the outbreak of WannaCry, it had infected more than 230,000 computers in over 150 countries. Gain a deeper understanding of ransomware attacks, how they work, who is targeted, and what you can do to stop them.

  • Building the Best Backup Plan for Today's Storage Environment

    Sponsored by: Iron Mountain

    In this expert-guide, learn about how your offline backups could be the key to keeping your data safe from the online threat of ransomware. Then, explore how dangerous over-protecting your information can be, and how a data retention policy can keep that from happening, and more.

  • Ransomware: All Locked Up and No Place to Go

    Sponsored by: Kaspersky Lab

    Ransomware is the digital version of extortion. It uses age-old tactics to carry out a modern day crime, but the elements behind it are as old as human criminal activity itself. Explore this white paper to discover recommendations and expert tips to protect against ransomware.

  • The Dangers of Phishing: Help Employees Avoid the Lure of Cybercrime

    Sponsored by: Kaspersky Lab

    According to Kaspersky Labs, 48% of all phishing attacks were focused on gleaning users' financial data. This white paper reveals how to identify a phishing attack and how to protect your business from being targeted by phishing attacks.

  • A Primer on File-Borne Malware Threats

    Sponsored by: OPSWAT inc

    Verizon's 2017 Data Breach Investigations Report found that 66% of malware was installed via malicious email attachments. In this white paper, examine the ways attackers use files to deliver malware, the reasons these methods are effective, and the steps organizations should take to block these kinds of attacks.

Browse by Report Type: Malware White Papers | Malware Multimedia | Malware IT Downloads

See more topics related to: Malware

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.