ComputerWeekly.com Research Library

Powered by Bitpipe.com

Trojan Horses White Papers

  • Royal Holloway: The Computer Misuse Act and the characteristics of convicted hackers

    Sponsored by: TechTarget ComputerWeekly.com

    In this Royal Holloway article, the authors go beyond the perpetuated stereotypes often found in media surrounding hackers by analysing the characteristics of real-life convicted hackers in the UK, who were charged under the Computer Misuse Act

  • The Next Generation of Cybercrime

    Sponsored by: Dell SecureWorks

    This white paper will educate you about a range of different security threats, as well as, the hackers that perpetrated these viruses. You will also receive a list of best practices for protecting your organization the right way.

  • Understanding WMI Malware

    Sponsored by: Trend Micro, Inc.

    This research paper will discuss how cybercriminals used Windows Management Instrumentation (WMI) as a venue to conveniently perform malicious activities on affected users' systems. The findings in this paper were based on a client-submitted case that TrendLabs engineers handled this March.

  • Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy

    Sponsored by: Trend Micro, Inc.

    This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.

  • McAfee Total Protection for Secure Business

    Sponsored by: Insight

    Medium-sized businesses have the dual challenges of enforcing acceptable use policies for email and the web, and ensuring compliance with government data privacy regulations. Read this white paper to learn about security solutions for your medium-sized business.

  • IT Decision Checklist: Antimalware

    Sponsored by: ESET

    Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.

  • Threatsaurus: The A-Z of Computer and Data Security Threats

    Sponsored by: Sophos UK

    Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.

  • ZeuS: A Persistent Criminal Enterprise

    Sponsored by: Trend Micro

    This research paper, presented by Trend Micro, examines the ZeuS botnet; a cyber-criminal tool primarily used to steal money. Access this paper now to learn how ZeuS works, who is behind this crimeware, ZeuS variants now emerging and more.

  • Cyber Attacks on the Rise: IBM 2007 Report

    Sponsored by: IBM

    This white paper shows how the IBM Internet Security Systems™ X-Force® research and development team discovered, analyzed and recorded new vulnerabilities and the status of varying threats throughout the first six months of this year.

  • Symantec Internet Security Threat Report

    Sponsored by: Symantec Corporation

    This Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.

  • Ten Ways Hackers Breach Security

    Sponsored by: Global Knowledge

    Hacking, cracking, and cyber crimes can wreak havoc on an organization. This white paper discusses ten common methods hackers use to breach your existing security, and what you can do to protect yourself.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.