Trojan Horses White Papers
-
Royal Holloway: The Computer Misuse Act and the characteristics of convicted hackers
Sponsored by: TechTarget ComputerWeekly.comIn this Royal Holloway article, the authors go beyond the perpetuated stereotypes often found in media surrounding hackers by analysing the characteristics of real-life convicted hackers in the UK, who were charged under the Computer Misuse Act
-
The Next Generation of Cybercrime
Sponsored by: Dell SecureWorksThis white paper will educate you about a range of different security threats, as well as, the hackers that perpetrated these viruses. You will also receive a list of best practices for protecting your organization the right way.
-
Understanding WMI Malware
Sponsored by: Trend Micro, Inc.This research paper will discuss how cybercriminals used Windows Management Instrumentation (WMI) as a venue to conveniently perform malicious activities on affected users' systems. The findings in this paper were based on a client-submitted case that TrendLabs engineers handled this March.
-
Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy
Sponsored by: Trend Micro, Inc.This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.
-
McAfee Total Protection for Secure Business
Sponsored by: InsightMedium-sized businesses have the dual challenges of enforcing acceptable use policies for email and the web, and ensuring compliance with government data privacy regulations. Read this white paper to learn about security solutions for your medium-sized business.
-
IT Decision Checklist: Antimalware
Sponsored by: ESETCompanies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.
-
Threatsaurus: The A-Z of Computer and Data Security Threats
Sponsored by: Sophos UKWhether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.
-
ZeuS: A Persistent Criminal Enterprise
Sponsored by: Trend MicroThis research paper, presented by Trend Micro, examines the ZeuS botnet; a cyber-criminal tool primarily used to steal money. Access this paper now to learn how ZeuS works, who is behind this crimeware, ZeuS variants now emerging and more.
-
Cyber Attacks on the Rise: IBM 2007 Report
Sponsored by: IBMThis white paper shows how the IBM Internet Security Systems X-Force® research and development team discovered, analyzed and recorded new vulnerabilities and the status of varying threats throughout the first six months of this year.
-
Symantec Internet Security Threat Report
Sponsored by: Symantec CorporationThis Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.
-
Ten Ways Hackers Breach Security
Sponsored by: Global KnowledgeHacking, cracking, and cyber crimes can wreak havoc on an organization. This white paper discusses ten common methods hackers use to breach your existing security, and what you can do to protect yourself.