ComputerWeekly.com Research Library

Powered by Bitpipe.com

Spyware Research

  • How do cybercriminals steal credit card information?

    Sponsored by: TechTarget ComputerWeekly.com

    Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.

  • Computer Weekly – 10 May 2022: The spies who hack you – the growing threat of spyware

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after 10 Downing Street was hit by a spyware attack, fears about targeted mobile phone hacks are increasing. Our salary survey highlights the diversity challenge in IT, with men's support for women in IT declining. And we look at how datacentre heat reuse can help reduce carbon emissions. Read the issue now.

  • Threat Management: Devising a new strategy to tackle today's cyberattacks

    Sponsored by: TechTarget Security

    This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.

  • Recent Ransomware Attacks Got you? Don't Cry; Fight Back!

    Sponsored by: TechTarget Security

    Recent ransomware attacks may make you WannaCry, but there's no time for that. It's time to learn what you can do to minimize the threat and how to deal if the worst happens. Start here to discover how to fight back against hackers, today.

  • What to Look for in Endpoint Antimalware Tools

    Sponsored by: TechTarget Security

    Read this buyer's guide to uncover which types of endpoint and anti-malware tools best suit your enterprise by discovering what to look for in the strategies.

  • Ballarat Grammar Secures BYOD with HP Sentinel SDN

    Sponsored by: Hewlett Packard Enterprise

    In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.

  • Antivirus Evaluation Guide

    Sponsored by: Threat Track Security

    In this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.

  • 2012 - Endpoint Security Best Practices Survey

    Sponsored by: Symantec Corporation

    Consult this informative resource to find out more about securing your endpoints. It outlines the best practices to avoid a cyber-attack along with many other helpful recommendations.

  • Trend Micro Proven #1: Smart Protection Network powers Trend Micro Corporate endpoint solutions to top rankings

    Sponsored by: Trend Micro, Inc.

    3.5 new security threats emerge every second and most come from the web. That's why current methods of testing anti-malware on offline PCs and endpoints don't provide the best possible defense. Learn about an approach that tests for threats at multiple layers for comprehensive protection.

  • Magic Quadrant for Mobile Data Protection

    Sponsored by: Sophos

    This Magic Quadrant is a snapshot of the overall market that ranks vendors against each other, according to competitive criteria. Vendors in any quadrant, as well as those not ranked on the Magic Quadrant, may be appropriate for your enterprise's needs and budget.

  • Worry-Free Business Security Standard

    Sponsored by: Trend Micro, Inc.

    Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.

  • Threat Containment for Facebook

    Sponsored by: BlueCoat

    This technical brief discusses multiple Blue Coat solutions to address malicious content control, enforce acceptable use policies, prevent sensitive information leakage and enhance user productivity on Facebook.

  • ESET: Threat Center

    Sponsored by: ESET

    IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.

  • McAfee Total Protection for Secure Business

    Sponsored by: Insight

    Medium-sized businesses have the dual challenges of enforcing acceptable use policies for email and the web, and ensuring compliance with government data privacy regulations. Read this white paper to learn about security solutions for your medium-sized business.

  • Threatsaurus: The A-Z of Computer and Data Security Threats

    Sponsored by: Sophos UK

    Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.

  • Case Study: Panda Security Enables Gloucestershire NHS to Communicate Effectively and Safely

    Sponsored by: Panda Security

    Learn how Gloucestershire NHS was able to help 1700 client computers send and receive vital information safely and efficiently by installing Panda's Managed Office Protection Antivirus solution.

  • Blue Coat WebFilter

    Sponsored by: BlueCoat

    Review this brief data sheet to learn how WebFilter helps prevent Internet attacks from spyware, phishing, peer-to-peer (P2P) traffic, viral content and more. WebFilter also includes Dynamic Real-Time Rating (DRTR), a patented technology that can instantly categorize Web sites when a user attempts to access them.

  • TechTalk: Stop Malware at the Web Gateway

    Sponsored by: BlueCoat

    Safeguarding your data from malware and other Web threats takes a layered approach. In this TechTalk webinar Blue Coat Technical Marketing Engineers will lead a discussion on how the Blue Coat ProxyAV works with the ProxySG to create a community-watch based security.

  • IT Download: Symantec Endpoint Protection and Network Access Control 11.0.4 MR4

    Sponsored by: Symantec Corporation

    With this trial software, stop malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits. Prevent security outbreaks, reducing administrative overhead all while lowering total cost of ownership for endpoint security.

  • Stopping Inbound and Outbound Threats: Juniper Networks Firewall/IPSec VPN with Unified Threat Management (UTM)

    Sponsored by: Juniper Networks, Inc.

    Juniper Networks firewall/VPN appliances include UTM features that are backed by world class technology partnerships.

  • Anonymous Proxy: A Growing Trend in Internet Abuse, and How to Defeat It

    Sponsored by: Bloxx, Inc.

    The Internet is a marvelous tool, but it can also be a tremendous drain and a threat to our children. Tru-View Technology maximizes the positives and eliminates the negatives so that organizations can meet the challenges of an 8+ billion-page Internet.

  • Five Ways to Improve Your Wireless Security

    Sponsored by: Cisco Systems, Inc.

    A wireless network can help your employees stay productive as they move around your company, but to take advantage of the benefits of wireless networking, you need to be sure that your network is safe from hackers and unauthorized users.

  • The Impact of Messaging and Web Threats

    Sponsored by: Trend Micro, Inc.

    This Osterman Research white paper discusses how messaging threats are evolving, both as independent threats and as a delivery mechanism for web-based attacks.

  • Key Steps to Securing Your Organization and Evicting a Hacker

    Sponsored by: Foundstone, Inc.

    This podcast will tech you key steps for getting your company back on track after a security breach. It discusses effective measures that can be put into place, and how to take a proactive approach in securing your company against malicious attacks.

  • Methods, Motivations, and Mitigation of Insider Threats

    Sponsored by: VeriSign, Inc

    This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.