Spyware White Papers
-
How do cybercriminals steal credit card information?
Sponsored by: TechTarget ComputerWeekly.comCybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.
-
Computer Weekly – 10 May 2022: The spies who hack you – the growing threat of spyware
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, after 10 Downing Street was hit by a spyware attack, fears about targeted mobile phone hacks are increasing. Our salary survey highlights the diversity challenge in IT, with men's support for women in IT declining. And we look at how datacentre heat reuse can help reduce carbon emissions. Read the issue now.
-
Blue Coat WebFilter
Sponsored by: BlueCoatReview this brief data sheet to learn how WebFilter helps prevent Internet attacks from spyware, phishing, peer-to-peer (P2P) traffic, viral content and more. WebFilter also includes Dynamic Real-Time Rating (DRTR), a patented technology that can instantly categorize Web sites when a user attempts to access them.
-
Stopping Inbound and Outbound Threats: Juniper Networks Firewall/IPSec VPN with Unified Threat Management (UTM)
Sponsored by: Juniper Networks, Inc.Juniper Networks firewall/VPN appliances include UTM features that are backed by world class technology partnerships.
-
Anonymous Proxy: A Growing Trend in Internet Abuse, and How to Defeat It
Sponsored by: Bloxx, Inc.The Internet is a marvelous tool, but it can also be a tremendous drain and a threat to our children. Tru-View Technology maximizes the positives and eliminates the negatives so that organizations can meet the challenges of an 8+ billion-page Internet.
-
Five Ways to Improve Your Wireless Security
Sponsored by: Cisco Systems, Inc.A wireless network can help your employees stay productive as they move around your company, but to take advantage of the benefits of wireless networking, you need to be sure that your network is safe from hackers and unauthorized users.
-
The Impact of Messaging and Web Threats
Sponsored by: Trend Micro, Inc.This Osterman Research white paper discusses how messaging threats are evolving, both as independent threats and as a delivery mechanism for web-based attacks.
-
Methods, Motivations, and Mitigation of Insider Threats
Sponsored by: VeriSign, IncThis white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
-
Cyber Attacks on the Rise: IBM 2007 Report
Sponsored by: IBMThis white paper shows how the IBM Internet Security Systems X-Force® research and development team discovered, analyzed and recorded new vulnerabilities and the status of varying threats throughout the first six months of this year.