Malware White Papers
-
How do cybercriminals steal credit card information?
Sponsored by: TechTarget ComputerWeekly.comCybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.
-
How to Create a Ransomware Incident Response Plan
Sponsored by: DigitalXRAIDRansomware is rapidly becoming one of today’s most persistent (and potentially devastating) cyberthreats. In fact, according to Forbes, the average amount of reported ransomware transactions per month in 2021 was $102.3 million. Read this e-guide to unlock 9-steps designed to help you build an effective ransomware mitigation strategy.
-
Computer Weekly - 18 May 2021: The real-life consequences of ransomware attacks
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, after a ransomware attack shut a major US oil pipeline, we examine the real-life consequences for organisations facing similar threats. We ask the experts for their top tips in reducing datacentre running costs. And we hear how data science skills are helping government make better decisions. Read the issue now.
-
Why are Acronis Cyber Protection Solutions Threatagnostic?
Sponsored by: AcronisSecurity professionals must both account for the many types of cyberattacks and apply security controls to different vectors through which these attacks can make their way in. In this white paper, read up on threat vectors, cyberattack techniques, types of malware and fileless attacks, and see how Acronis can help you fight them all.
-
Your Hybrid Infrastructure Is Under Attack
Sponsored by: Palo Alto NetworksIn a recent survey, 85% of IT pros selected hybrid cloud as their ideal operating model. However, these clouds come with their share of complexity. Namely, they require a high level of interconnectivity, which increases the risk of malware attacks, or worse. Don’t delay – Leverage this white paper to learn how to secure your hybrid environment.
-
Audi fine-tunes its digital performance to boost online car sales
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the digital chief at Audi UK discusses how the car maker is tackling the slump in new car sales. One of the largest global malware botnets has been taken down, but how much of a blow will it be for cyber criminals? And we hear how one county council made huge savings on its SAP installation. Read the issue now.
-
Leading private hospital consolidates email protection to secure VIP guests’ data “Crown Jewels”
Sponsored by: BarracudaHealthcare is one of the most frequently targeted verticals and patient data has grown in value to cybercriminals. This case study follows how Richard Andrews, Head of IT at King Edward VII’s hospital in London, was able to implement email security for his most vulnerable patients – including members of the Royal Family.
-
Spear Phishing vol4: Impersonations are increasingly more common, sophisticated and targeted.
Sponsored by: BarracudaSpear phishing, alongside other impersonation attacks, are on the rise, and new tactics are making it more difficult to differentiate between an impersonation attempt and a genuine message. Read on to discover the top 3 spear phishing impersonation attacks to keep an eye on.
-
The future of storage
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine emerging technologies in storage such as helium disks and DNA. Ransomware is becoming more sophisticated and the attackers more tactical. And as the EU's top court challenges the UK over surveillance, we ask what this means for data privacy after Brexit. Read the issue now.
-
Insights into attacker activity in compromised email accounts
Sponsored by: BarracudaSpear phishing and email account takeovers are proving to be a lucrative and accessible opportunity for cybercriminals – and attack methods are only growing more sophisticated. This report provides an overview of today’s top email security threats and offers defensive best practices for protecting your inboxes.
-
Spear Phishing vol3: Top Threats and Trends: Defending against business email compromise attacks
Sponsored by: BarracudaBusiness email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
-
13 email threat types to know about right now
Sponsored by: BarracudaAs email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
-
Agile software testing pioneer slams the door on C-level email attacks
Sponsored by: BarracudaLearn how Tricentis, an automated software testing company, was able to thwart spear-phishing and fraud attacks against senior staff.
-
Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
Sponsored by: BarracudaDownload this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.
-
Spear Phishing: Top Threats and Trends Vol. 1
Sponsored by: BarracudaThis report takes an in-depth look at the three most prevalent types of spear phishing attacks—brand impersonation, business email compromise, and blackmail—and examines 8 defense strategies for preventing these attacks. Read on to learn how to put these strategies to work to protect your company.
-
Royal Holloway: Man proposes, fraud disposes
Sponsored by: TechTarget ComputerWeekly.comIn May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.
-
Royal Holloway: A novel approach to clustering malware behaviour to improve malware detection
Sponsored by: TechTarget ComputerWeekly.comClustering malware behaviour can be very useful, but it is unknown how accurate clustering algorithms are when dealing with malware
-
Computer Weekly – 20 July 2021: Ripe for change – mixing digital innovation with traditional winemaking
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.
-
The future of storage
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine emerging technologies in storage such as helium disks and DNA. Ransomware is becoming more sophisticated and the attackers more tactical. And as the EU's top court challenges the UK over surveillance, we ask what this means for data privacy after Brexit. Read the issue now.
-
5 IAM Trends Shaping the Future of Security
Sponsored by: Beta SystemsModern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.
-
Incident Response Tools: How, When & Why to Use Them
Sponsored by: ClaranetIncident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.
-
SMB Cybersecurity: The Need for Better Protection
Sponsored by: KasperskySmall and medium-sized businesses (SMBs) are failing to keep their remote working employees adequately protected against the vast range of cyber threats they face, according to a study by Kaspersky. Access this e-guide to learn why many SMBs are turning to managed detection and response today.
-
Navigating Ransomware Recovery
Sponsored by: Cisco UmbrellaThe decisions and road to recovery will involve several stakeholders and real costs. So, when organizations must make the tough decision of whether to pay a ransom, rebuild the system, or file a report, there are many factors to consider. Use this e-guide to help you plan and map out steps to avoid rushing into bad choices that can’t be reversed.
-
Rise in Ransomware Attacks Prompts New Prevention Priorities
Sponsored by: Cisco UmbrellaOfficials predict that already widespread ransomware attacks will only grow in scale and influence, while urging organizations to act now to guard against them. In this e-guide, learn what officials are saying about the upcoming storm of ransomware attacks and what your company can do in terms of prevention.
-
Assess Secure Web Gateways to Suit Your Network Security Needs
Sponsored by: TechTarget SecuritySecure web gateways are complex security controls that sit between the user and the internet to protect the organization from advanced web security threats. This buyer’s guide can help simplify the buying process by addressing the key considerations for evaluating a secure web gateway and the features and functionality these products offer.