phishing

Results 126 - 150 of 251Sort Results By: Published Date | Title | Company Name
Published By: Lenovo and Intel®     Published Date: Oct 14, 2016
Get the details on the top threats to IT Security. This detailed (and entertaining) eBook provides you with the key stats you need to identify and stay ahead of the top six threats to IT security today—from ransomware to phishing and spyware to DDoS attacks. Download the eBook to get all the details!
Tags : 
security, ransomware, spyware, malware, theft, it threat, anti spyware, ddos, hacker detection, internet security, security management
    
Lenovo and Intel®
Published By: Kaspersky Lab     Published Date: Feb 18, 2014
Download the Kaspersky Lab security experts' Guide to the Threat Landscape to have access to a wealth of IT security intelligence.
Tags : 
kaspersky, kaspersky lab, malware, anti-virus industry, organizational security, mobility, byod, the cloud, virtualization, it administrators, it security, monitoring intrusions, phishing, cybercriminals, system malware, infrastructure, data management, mobile malware, social networks, unpatched application
    
Kaspersky Lab
Published By: WatchGuard Technologies     Published Date: Apr 21, 2010
With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision.
Tags : 
watchguard technologies, anti spam, security, tco, xcs, anti-phishing, data loss prevention, encryption, email security appliances, anti spyware, anti virus, email security, phishing
    
WatchGuard Technologies
Published By: IBM     Published Date: Sep 10, 2009
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and more!
Tags : 
ibm iss x-force threat and risk report, ibm, web-related security threats, spam and phishing, malware, cvss, top vendor list, web application vulnerabilities, sql injection attacks, web browser exploitation, browser and plug-in vulnerabilities, activex, url spam, domains, international distribution of spam, anti spam, anti spyware, application security, firewalls, hacker detection
    
IBM
Published By: GFI     Published Date: Jun 12, 2007
This white paper describes how Bayesian mathematics can be applied to the spam problem, resulting in an adaptive, 'statistical intelligence' technique that achieves very high spam detection rates.
Tags : 
anti spam, anti-spam, filter, block, blocking, email security, phishing, baysian, bayesian, spam detection, gfi
    
GFI
Published By: GFI     Published Date: Jul 20, 2009
GFI MailEssentials for Exchange/SMTP/Lotus is a server based anti-spam, anti-phishing and email management solution, which is used by 80,000 customers worldwide. The latest version uses two anti-spam engines, along with advanced spam filtering techniques, to give administrators a high spam capture rate straight out-of-the-box, with minimal configuration. GFI MailEssentials also minimizes false positives, so you do not need to worry about important emails being marked as spam.
Tags : 
gfi, anti-spam, spam, lotus, gfi mailessentials, e-mail security, anti-phishing, phishing, whitelist, intrusion, hacker, security, anti spam, email security, intrusion prevention
    
GFI
Published By: ESET     Published Date: Jan 30, 2008
As another year draws to a close, few can have failed to notice the plagues of malicious software, floods of fraudulent emails and the generally increased pestilence of our online world, marking out 2007 as one of the most remarkable in the history of malware.  This report covers the top malware threats in 2007 and provides monthly summaries.
Tags : 
malware, global threats, 2007, threats, email, threat summary, threat report, viruses, eset, antivirus, nod32, internet threats, web-borne threats, phishing, trojans, spam, attacks, exploits, computers, malicious software
    
ESET
Published By: ESET     Published Date: Jan 30, 2008
Spam looks like a simple enough issue until you have to try to define it: after all, we all think we know it when we see it. Most people have a working definition along the lines of “email I don’t want.” While that’s perfectly understandable, it is difficult to implement technical solutions based on such a subjective definition. Read this paper to learn why SPAM is more than just unwanted email.
Tags : 
malware, threats, email, threat summary, viruses, eset, antivirus, nod32, internet threats, web-borne threats, phishing, trojans, spam, attacks, exploits, computers, malicious software, spam solution, email spam, anti spam
    
ESET
Published By: ESET     Published Date: Jan 30, 2008
Anti-virus does much more than reactively detect known viruses; it proactively scans for unknown ones too. So, how do scanners really work? The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.
Tags : 
heuristics, threat analysis, how av works, av signatures, traditional antivirus, norton, symantec, trend micro, mc afee, malware, threats, email, threat summary, threat report, viruses, eset, antivirus, nod32, internet threats, web-borne threats
    
ESET
Published By: ESET     Published Date: Jan 30, 2008
Steganography is the science of hiding data inside of items, such as sound and picture files.  Listen to this podcast to learn more about steganography and the potential IT security concerns it poses.
Tags : 
embedded files, steganography, hiding data, secret files, coding, av signatures, traditional antivirus, norton, symantec, trend micro, mcafee, malware, threats, email, viruses, eset, antivirus, nod32, internet threats, web-borne threats
    
ESET
Published By: Proofpoint     Published Date: Apr 22, 2010
This whitepaper explains how Proofpoint MLX technology provides unrivalled defense against spam.
Tags : 
proofpoint mlx, spam detection, email security, phishing attack, saas, messaging security, anti spam, anti spyware, anti virus, phishing, secure instant messaging
    
Proofpoint
Published By: Proofpoint     Published Date: Apr 06, 2012
Download this white paper from Osterman Research and Proofpoint to learn how the protection of corporate data from sophisticated malware and phishing attacks is at top of mind of IT decision makers.
Tags : 
cloud-based security, advanced persistent threat, threat protection, cloud security, phishing, malware, anti-malware, security, spam, osterman research, proofpoint, whitepaper, white paper, email archiving, email security, cloud, report, convergence, distributed computing, governance
    
Proofpoint
Published By: Proofpoint     Published Date: Apr 06, 2012
Download Proofpoint's free email security whitepaper discussing the latest trends in email phishing attacks, how they work, and how to protect your email users against them.
Tags : 
phishing, email security, phish, email, attacks, blended threats, social engineering, outbound spam, anti-phishing, anti-virus, anti-malware, saas, proofpoint, security, virtualization, infrastructure, design and facilities
    
Proofpoint
Published By: Proofpoint     Published Date: Apr 06, 2012
Email Security: Gartner, Inc. positions Proofpoint in the Leaders quadrant in its 2011 Magic Quadrant for the Secure Email Gateway (email security, anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention) market.
Tags : 
secure email, email security, spam, virus, encryption, phishing, anti-spam solution, cloud intelligence, dlp, saas, virus filtering, spam filtering, archiving, antivirus, email encryption, transport layer security, tls, network intrusion prevention system, gartner email security magic quadrant, 2011
    
Proofpoint
Published By: Cisco     Published Date: Jan 28, 2009
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall, VPN, and optional content security capabilities, so you can feel confident your business is protected. This easy-to-use solution lets you control access to network resources to protect business data and maximize network uptime.
Tags : 
cisco, cisco asa 5500, all-in-one security, secure sockets layer, ssl, ip security, ipsec, firewall, vpn, unauthorized access, spam and phishing, real-time protection, threat-protected vpn, safe remote access, antivirus, anti-spyware, anti-spam, anti-phishing, anti spam, anti spyware
    
Cisco
Published By: ESET     Published Date: Jan 21, 2010
The traffic lights are always at amber on the Internet, because there are always risks, so here are some tips for reducing your exposure to attacks from cybercriminals.
Tags : 
eset, security, cybercriminal, internet security, malware, back up and recovery, phishing, anti spyware
    
ESET
Published By: Webroot UK     Published Date: Mar 22, 2010
This paper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing and other forms of remote access that could all potentially increase the attack surface of the organization.
Tags : 
webroot, web security threat, remote access, malware, viruses, spyware, phishing, threat protection, anti spam, anti spyware, anti virus, web service security
    
Webroot UK
Published By: McAfee     Published Date: Apr 25, 2014
You spoke and we listened. Today’s advanced malware threats have you spending a lot of resources fighting an uphill battle. The answer is McAfee Advanced Threat Defense—so you can find, freeze, and fix threats.
Tags : 
advanced malware, maware threats, malware problems, malware attacks - rootkits, phishing, zero-access, trojans, apts, botnets, social engineering, sandboxing, layered defenses, block and contain malware, security
    
McAfee
Published By: Cyveillance     Published Date: Apr 03, 2015
In this white paper, we recap notable trends and events in information security from 2014 and look forward to what information security professionals should expect in 2015. The past year was a landmark one in the information security field, with massive data breaches capturing the public’s attention, powerful bugs causing headaches for IT teams and end users, DDoS attacks breaking records, and phishing remaining a general annoyance – or worse – for all Internet users. In this whitepaper, we discuss these trends as well as key areas of concern for 2015, including: - The impact of the Internet of Things - The growing importance of threat intelligence - The increasing influence of BRICS nations - The evolution of encryption standards - The changing role of the CISO
Tags : 
information security threat, information security, protection, security breach, internet security, networking, security
    
Cyveillance
Published By: ThreatTrack Security     Published Date: May 21, 2015
This white paper focuses on the security problems organizations of all sizes face in regard to email and other threat vectors, and it offers recommendations about to improving security.
Tags : 
phishing, next-generation malware, security, email
    
ThreatTrack Security
Published By: Cyren     Published Date: Oct 17, 2018
Average rates at which enterprise email security systems miss spam, phishing and malware attachments.
Tags : 
email security, phishing, malware, email security systems, appliance security
    
Cyren
Published By: Cyren     Published Date: Oct 17, 2018
An Osterman Research Survey Report
Tags : 
office 365, it security, cybersecurity, web security, phishing, microsoft office
    
Cyren
Published By: CrowdStrike     Published Date: Nov 28, 2018
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShell attacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn: • Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more • The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model • How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent
Tags : 
    
CrowdStrike
Published By: Symantec.cloud     Published Date: Oct 11, 2012
As one of the top cyber crime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years .
Tags : 
symantec, phishing, malware, security, internet security
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Oct 11, 2012
The emergence of mobile applications has fundamentally changed the way that millions of people around the world work, play, and communicate. Meanwhile, cybercriminals want to infect and exploit as many mobile devices as they can to steal information.
Tags : 
symantec, phishing, malware, security, internet security, mobile security, mobile
    
Symantec.cloud
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.