Spyware Viruses Reports

Computer Weekly – 10 May 2022: The spies who hack you – the growing threat of spyware
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, after 10 Downing Street was hit by a spyware attack, fears about targeted mobile phone hacks are increasing. Our salary survey highlights the diversity challenge in IT, with men's support for women in IT declining. And we look at how datacentre heat reuse can help reduce carbon emissions. Read the issue now.
Posted: 09 May 2022 | Published: 10 May 2022

TechTarget ComputerWeekly.com

How do cybercriminals steal credit card information?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.
Posted: 18 Jan 2023 | Published: 16 Jan 2023

TechTarget ComputerWeekly.com

The Impact of Messaging and Web Threats
sponsored by Trend Micro, Inc.
WHITE PAPER: This Osterman Research white paper discusses how messaging threats are evolving, both as independent threats and as a delivery mechanism for web-based attacks.
Posted: 09 May 2008 | Published: 01 Apr 2008

Trend Micro, Inc.

Five Ways to Improve Your Wireless Security
sponsored by Cisco Systems, Inc.
TECHNICAL ARTICLE: A wireless network can help your employees stay productive as they move around your company, but to take advantage of the benefits of wireless networking, you need to be sure that your network is safe from hackers and unauthorized users.
Posted: 10 Jul 2008 | Published: 01 Feb 2008

Cisco Systems, Inc.

Stopping Inbound and Outbound Threats: Juniper Networks Firewall/IPSec VPN with Unified Threat Management (UTM)
sponsored by Juniper Networks, Inc.
PRODUCT LITERATURE: Juniper Networks firewall/VPN appliances include UTM features that are backed by world class technology partnerships.
Posted: 06 Oct 2008 | Published: 03 Oct 2008

Juniper Networks, Inc.

McAfee Total Protection for Secure Business
sponsored by Insight
WHITE PAPER: Medium-sized businesses have the dual challenges of enforcing acceptable use policies for email and the web, and ensuring compliance with government data privacy regulations. Read this white paper to learn about security solutions for your medium-sized business.
Posted: 31 Aug 2010 | Published: 31 Aug 2010

Insight

What to Look for in Endpoint Antimalware Tools
sponsored by TechTarget Security
EBOOK: Read this buyer's guide to uncover which types of endpoint and anti-malware tools best suit your enterprise by discovering what to look for in the strategies.
Posted: 08 Mar 2016 | Published: 07 Mar 2016

TechTarget Security

2012 - Endpoint Security Best Practices Survey
sponsored by Symantec Corporation
WHITE PAPER: Consult this informative resource to find out more about securing your endpoints. It outlines the best practices to avoid a cyber-attack along with many other helpful recommendations.
Posted: 06 Sep 2012 | Published: 06 Sep 2012

Symantec Corporation

Trend Micro Proven #1: Smart Protection Network powers Trend Micro Corporate endpoint solutions to top rankings
sponsored by Trend Micro, Inc.
WHITE PAPER: 3.5 new security threats emerge every second and most come from the web. That's why current methods of testing anti-malware on offline PCs and endpoints don't provide the best possible defense. Learn about an approach that tests for threats at multiple layers for comprehensive protection.
Posted: 28 Jun 2011 | Published: 28 Jun 2011

Trend Micro, Inc.

Blue Coat WebFilter
sponsored by BlueCoat
DATA SHEET: Review this brief data sheet to learn how WebFilter helps prevent Internet attacks from spyware, phishing, peer-to-peer (P2P) traffic, viral content and more. WebFilter also includes Dynamic Real-Time Rating (DRTR), a patented technology that can instantly categorize Web sites when a user attempts to access them.
Posted: 14 May 2009 | Published: 31 Dec 2008

BlueCoat