ComputerWeekly.com Research Library

Powered by Bitpipe.com

Malware Research

  • How do cybercriminals steal credit card information?

    Sponsored by: TechTarget ComputerWeekly.com

    Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.

  • How to Create a Ransomware Incident Response Plan

    Sponsored by: DigitalXRAID

    Ransomware is rapidly becoming one of today’s most persistent (and potentially devastating) cyberthreats. In fact, according to Forbes, the average amount of reported ransomware transactions per month in 2021 was $102.3 million. Read this e-guide to unlock 9-steps designed to help you build an effective ransomware mitigation strategy.

  • Best Practices Guide: Prepare And Recover From A Ransomware Attack With Rubrik

    Sponsored by: Rubrik

    Access this Rubrik Zero Trust Data Management white paper to learn about deployment best practices that make it even tougher for cyber criminals to attack, go through the recovery process in the event of an attack, and much more.

  • Rubrik For Ransomware Remediation

    Sponsored by: Rubrik

    Access this data sheet to learn how Rubrik handles ransomware, including how it provides fast recovery to the most recent clean state, granular visibility into the scope of the attack, and alerts to unusual behavior leveraging machine learning.

  • Protect, detect, and recover data from ransomware – quickly and fully

    Sponsored by: Commvault

    Access this white paper to discover how you can protect, detect, and recover data successfully to mitigate the risk of ransomware for your business using Commvault.

  • Computer Weekly - 18 May 2021: The real-life consequences of ransomware attacks

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after a ransomware attack shut a major US oil pipeline, we examine the real-life consequences for organisations facing similar threats. We ask the experts for their top tips in reducing datacentre running costs. And we hear how data science skills are helping government make better decisions. Read the issue now.

  • Your Hybrid Infrastructure Is Under Attack

    Sponsored by: Palo Alto Networks

    In a recent survey, 85% of IT pros selected hybrid cloud as their ideal operating model. However, these clouds come with their share of complexity. Namely, they require a high level of interconnectivity, which increases the risk of malware attacks, or worse. Don’t delay – Leverage this white paper to learn how to secure your hybrid environment.

  • Audi fine-tunes its digital performance to boost online car sales

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the digital chief at Audi UK discusses how the car maker is tackling the slump in new car sales. One of the largest global malware botnets has been taken down, but how much of a blow will it be for cyber criminals? And we hear how one county council made huge savings on its SAP installation. Read the issue now.

  • Leading private hospital consolidates email protection to secure VIP guests’ data “Crown Jewels”

    Sponsored by: Barracuda

    Healthcare is one of the most frequently targeted verticals and patient data has grown in value to cybercriminals. This case study follows how Richard Andrews, Head of IT at King Edward VII’s hospital in London, was able to implement email security for his most vulnerable patients – including members of the Royal Family.

  • Ransomware Threat Spotlight

    Sponsored by: Barracuda

    Another unfortunate consequence of 2020 was the apparent rise of ransomware threats, especially those targeting remote workers. This webinar provides a look back at the top ransomware trends of 2020, highlighting key tactics, common vulnerabilities and more – watch now to get started.

  • Spear Phishing vol4: Impersonations are increasingly more common, sophisticated and targeted.

    Sponsored by: Barracuda

    Spear phishing, alongside other impersonation attacks, are on the rise, and new tactics are making it more difficult to differentiate between an impersonation attempt and a genuine message. Read on to discover the top 3 spear phishing impersonation attacks to keep an eye on.

  • The future of storage

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine emerging technologies in storage such as helium disks and DNA. Ransomware is becoming more sophisticated and the attackers more tactical. And as the EU's top court challenges the UK over surveillance, we ask what this means for data privacy after Brexit. Read the issue now.

  • Are your remote workers sitting ducks?

    Sponsored by: Mimecast

    COVID-19 has resulted in working from home becoming common practice– and it could stay that way for the foreseeable future. But are remote workers sitting ducks for cyberattacks? A new Mimecast-iTnews survey of Australian organisations suggests that many are just that. Download this white paper to learn more.

  • Insights into attacker activity in compromised email accounts

    Sponsored by: Barracuda

    Spear phishing and email account takeovers are proving to be a lucrative and accessible opportunity for cybercriminals – and attack methods are only growing more sophisticated. This report provides an overview of today’s top email security threats and offers defensive best practices for protecting your inboxes.

  • Spear Phishing vol3: Top Threats and Trends: Defending against business email compromise attacks

    Sponsored by: Barracuda

    Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.

  • 13 email threat types to know about right now

    Sponsored by: Barracuda

    As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.

  • CASE STUDY: Tricentis slams the door on C-level email attacks using Barracuda Sentinel

    Sponsored by: Barracuda

    Tune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.

  • Agile software testing pioneer slams the door on C-level email attacks

    Sponsored by: Barracuda

    Learn how Tricentis, an automated software testing company, was able to thwart spear-phishing and fraud attacks against senior staff.

  • Best Practices for Protecting Against Phishing, Ransomware and Email Fraud

    Sponsored by: Barracuda

    Download this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.

  • Spear Phishing: Top Threats and Trends Vol. 1

    Sponsored by: Barracuda

    This report takes an in-depth look at the three most prevalent types of spear phishing attacks—brand impersonation, business email compromise, and blackmail—and examines 8 defense strategies for preventing these attacks. Read on to learn how to put these strategies to work to protect your company.

  • Royal Holloway: Man proposes, fraud disposes

    Sponsored by: TechTarget ComputerWeekly.com

    In May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.

  • Computer Weekly – 20 July 2021: Ripe for change – mixing digital innovation with traditional winemaking

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.

  • The future of storage

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine emerging technologies in storage such as helium disks and DNA. Ransomware is becoming more sophisticated and the attackers more tactical. And as the EU's top court challenges the UK over surveillance, we ask what this means for data privacy after Brexit. Read the issue now.

  • 5 IAM Trends Shaping the Future of Security

    Sponsored by: Beta Systems

    Modern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.

  • Incident Response Tools: How, When & Why to Use Them

    Sponsored by: Claranet

    Incident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.

Browse by Report Type: Malware White Papers | Malware Multimedia | Malware IT Downloads

See more topics related to: Malware

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2023 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.