You've requested...

Download this next:

Keeping Up with Today’s Top Mobile Spyware Threat Trends | APAC\EMEA

According to Check Point research, 1 out of every 5 organizations has suffered a malicious incident through mobile activity. An emerging threat is Mobile Spyware. It keeps increasing in sophistication with zero-click attacks and nation-state tools being used on public organizations. Join us to learn more about mobile spyware and how to protect your organization. Agenda: Overview of recent trends in mobile threats A mobile spyware case study Best practices in protecting your organization from mobile spyware attacks Harmony Mobile live demo

These are also closely related to: "Products of the Year 2006"

  • Keeping Up with Today’s Top Mobile Spyware Threat Trends | AMER

    According to Check Point research, 1 out of every 5 organizations has suffered a malicious incident through mobile activity. An emerging threat is Mobile Spyware. It keeps increasing in sophistication with zero-click attacks and nation-state tools being used on public organizations. Join us to learn more about mobile spyware and how to protect your organization. Agenda: Overview of recent trends in mobile threats A mobile spyware case study Best practices in protecting your organization from mobile spyware attacks Harmony Mobile live demo

  • Computer Weekly – 10 May 2022: The spies who hack you – the growing threat of spyware

    In this week’s Computer Weekly, after 10 Downing Street was hit by a spyware attack, fears over the growth of targeted mobile phone hacks are increasing. Our annual salary survey highlights the diversity challenge in IT, with men’s support for helping women in IT declining. And we look at how datacentre operators are examining heat reuse to reduce their climate impact. Read the issue now.

Find more content like what you just read:

  • Endpoint and antimalware protection for small to large businesses

    Picking a security platform can be difficult. Inside this e-guide, expert Ed Tittel explores strategies and criteria to ensure you are picking the most successful security platform for your company.

    Download

  • Understand mobile threat defense and improve enterprise security

    Implement AI-powered mobile threat defense to protect remote workers from malware, phishing, and network attacks. Learn how mobile threat defense solutions can secure your device fleet and safeguard enterprise data. Read the full blog post to discover the benefits of this comprehensive endpoint security.

    Download

  • Is malware using steganography on your network?

    As cyber threats become more evasive, technology that protects organisations must have the capability to look deeper into the content flowing in and out of an organisation's network. More and more, attackers are using seemingly innocuous image files to sneak ransomware and spyware into, or sensitive data out of networks. Join Steve Jeffery, Lead Solutions Engineer for Fortra Email Security, as he outlines how malware can leverage steganography and how to recognise your risk even if it can’t be seen. You'll also learn:

    Download

  • Simplify desktop management and reduce costs by up to 40%

    This white paper goes over what organizations have to gain - and lose - from virtual desktop technology.

    Download

  • Living Off The Land Attacks

    Cybercriminals are using legitimate tools to infiltrate systems and steal data. Learn how privileged access management and blocklisting can reduce your attack surface and prevent "living off the land" attacks. Read the full e-book to discover practical ways to enhance your security.

    Download

  • Mobile security moving to a unified approach

    This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.

    Download

  • Security as a service for MSP peace of mind

    Download this portfolio to learn more about WatchGuard's managed security service solutions, which give MSPs peace of mind through better endpoint management and comprehensive protection across your entire service ecosystem.

    Download

  • Complying with CPS 234: Proactive Protective Procedures

    2020 marked the onset of a digitization juggernaut. While businesses were busy restructuring for online operations to brace the pandemic, nearly every organization in Australia observed a sizeable increase in the frequency of spyware and trojan attacks masked under interactive coronavirus maps and websites. what you will learn : The APRA Prudential Standard CPS 234 aims to fill these gaps in the existing cybersecurity framework and elevate the existing security best practices and preparedness. It will make protection levels more stringent as regulated entities will have to demonstrate compliance with the standard rather than just following the guidance.  This also means that sprawling your workloads across multiple clouds is going to get a bit more complex and will come with added responsibility. Enterprises will need the capability to secure their data, ability to thwart potential breaches, and better control over diverse cloud environments

    Download

  • Top 10 cyber security stories of 2021

    Cyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.

    Download

  • CW ASEAN: Trend Watch – Security

    Artificial intelligence tools are becoming a vital part of the security arsenal for organizations and cyber criminals alike. In this handbook, Computer Weekly looks at how ASEAN firms are using AI to combat cyber threats and experts discuss the latest smart cyber security tools.

    Download

  • Using Intelligence To Safeguard Your Supply Chain Against Cyber Risks

    Security teams are undergoing pressure to monitor and respond to indirect threats to their organisation. New thinking about safeguarding your supply chain has expanded beyond just stolen certificates and code injections targeting your software vendors. Phishing, ransomware, and spyware attacks against any of your partners can also disrupt business continuity or disclose sensitive data that affects you. Join Silobreaker and (ISC)² on 13 September 2022 at 1:00 pm BST to learn about some of the most recent supply chain incidents and best practices to build an effective intelligence programme, helping you navigate the threats beyond your control. In this webinar, you will learn: • The impact of recent supply chain incidents • How to monitor compromised vendors across your supply chain • How to identify when specific threats and risks are trending up so you can be ready to respond • Best practices to build an effective intelligence programme that addresses your risks, without overloading your analysts

    Download

  • Threat management: Essential guide

    Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.

    Download

  • MicroScope – February 2023: Opportunities in security

    In this month's issue, we explore the possibilities for the channel to make its mark with security services, and take a closer look at whether the ChatGPT revolution brings more benefits or negatives with it

    Download

  • How do cybercriminals steal credit card information?

    Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.

    Download

  • 2023 Mobile Threat Landscape Overview

    Last year saw many changes in the mobile threat landscape: Google limited the access that malicious application can have on an infected device; at the same time new actors entered the mobile space (drawn in by potential gains from fraud) bringing with them new tactics such as the biometric bypass. Join ThreatFabric's Mobile Threat Intelligence Experts in this 45-minute webinar aimed at providing a comprehensive overview of the trends and most relevant changes in the mobile threat landscape in 2023, with an eye towards what may be in store in 2024. The aim is to provide you with actionable insights that allow you to make informed decisions and adopt a pro-active approach to mitigating mobile security risks. Topics covered will include trends in distribution techniques aimed at defeating security measures introduced with Android 13, new attack techniques, the use of spyware in financial fraud, monetisation schemes, as well as our predictions and insights into future developments around the introduction of instant payment systems and third-party app stores.

    Download

  • 12 essential features of advanced endpoint security tools

    Endpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing security policies. IT administrators can use endpoint security for a number of operation monitoring functions and data backup strategies. Here are 12 key features endpoint security products should include.

    Download

  • GReAT Ideas. Powered by Croissant. Baguette edition.

    GReAT Ideas is back this winter with more cyberthreat research and top-notch expertise, alongside light-hearted talks on the latest developments in the field of cybersecurity, shared in a cozy informal atmosphere. Executed by security researchers from Kaspersky’s Global Research and Analysis Team (GReAT), who specialize in uncovering APTs, cyber-espionage campaigns, major malware and underground cyber-criminal trends across the world, the event is designed to exchange knowledge, support and inspire the community. The event will kick off with a fireside chat about recent cyber-incidents that shook the world. The special Baguette edition (a name suggested by our speakers) of the event will feature presentations by our Paris-based GReAT team – as, we all need a bit of French charm in our lives. Here is what you will learn during this webinar: What’s on: fireside chat with Warren Mercer from Talos and Brian Bartholomew from Kaspersky Mercenaries’ tricks: what did DeathStalker hide between two ferns? by Pierre Delcher A primer on reversing Delphi binaries by Ivan Kwiatkowski TinyCheck: bug smartphone spyware at network level by Felix Aime

    Download

  • A MythBusting Special — 9 Myths about File-based Threats

    Bad actors love to deliver threats in files. Persistent and persuasive messages convince unsuspecting victims to accept and open files from unknown sources, executing the first step in a cyber attack. This continues to happen whether the file is an EXE or a Microsoft Excel document. Far too often, end users have an illusion of security, masked by good faith efforts of other users and (ineffective) security controls. This creates a virality effect for ransomware, malware, spyware, and annoying grayware and adware to be spread easily from user to user and machine to machine. To stop users from saying “I reject your reality and substitute my own!” – it’s time to bust some myths about file-based attacks. Testing in three! Two! One! Join Zscaler’s Vinay Polurouthu, Principal Product Manager, and Amy Heng, Product Marketing Manager, to: *Bust the 9 most common assumptions and myths about file-based threats *Uncover the latest evasion trends and detect stealthy delivery methods *Prevent patient zero infections and zero-day security events from unknown files

    Download

  • A Computer Weekly buyer's guide to SIEM and SOAR

    The question of how to use data has big implications on a company's performance. In this 16-page buyer's guide, Computer Weekly looks at how SIEM and SOAR tools assist IT teams, why security tools require strong internal security processes to work effectively and what role they have in a rapidly changing cyber threat landscape.

    Download

  • Infographic: 5 essential open source cybersecurity tools for 2022

    There are countless open source cybersecurity tools available in the market and some of them have become essential for finding vulnerabilities in 2022. In this infographic, we highlight five tools that have proven to be highly efficient and reliable and can be combined with other tools to help build up your defences.

    Download

  • Making the case for cloud-based security

    Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.

    Download

  • Making the case for cloud-based security

    Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.

    Download

  • Pegasus Ataca de Nuevo

    Sin duda habrás visto en las noticias y en las redes sociales que el avanzado software espía para móviles Pegasus (descubierto por primera vez por Lookout y The Citizen Lab en 2016) ha sido utilizado recientemente contra el Presidente del Gobierno y la Ministra de Defensa entre otros cargos públicos en nuestro país. Únete a nuestro seminario web sobre PEGASUS donde te contaremos: - ¿Qué es el grupo NSO? - ¿Qué es Pegasus y qué capacidades tiene? - Cómo ha evolucionado Pegasus desde 2016 - ¿Cuál es el impacto en los individuos y las empresas? - Cuales son nuestras recomendaciones para protegerte de PEGASUS y otros Spywares Ponentes Daniel Villaseñor, Cybersecurity Sales Engineer, Lookout Justin Albrecht, Security Intelligence Research, Lookout Javier Gomez Berruezo, Account Manager, Lookout

    Download

  • Your expert guide to endpoint security

    Achieving the best endpoint protection, given the rise of mobility and increase in the sophistication of the attacks, is more complicated than ever. Learn from industry experts and get up to speed on achieving the best endpoint protection.

    Download

  • Why zero trust is IT security's best hope

    This guide provides both overarching advice and specific guidance on how to deal with particular issues, including cloud and legacy tools, app development and more. Learn the ideas and approaches that underpin zero trust, and also get solid ideas on where to begin to make it a reality.

    Download

  • Computer Weekly Buyer's Guide to EU General Data Protection Regulation

    In this 12-page buyer's guide, we look at the tools that could be used for compliance, the incentive to create a smarter, leaner business, and the myths surrounding the new rules.

    Download

  • How complacency kills mobile security

    In this expert guide, learn how a lackadaisical attitude towards mobile security can prove to be catastrophic to enterprises as mobile threats continue to exploit known vulnerabilities to gut profits.

    Download

  • BadUSB 2.0: Exploring USB man-in-the-middle attacks

    This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.

    Download

  • A Computer Weekly buyer's guide to artificial intelligence in IT security

    Artificial intelligence is keeping businesses ahead when it comes to fighting cyber crime. In this 14-page buyer's guide, Computer Weekly looks at how IT security is automating its systems, the tools letting firms achieve more with less and the advantages of predictive security.

    Download

  • A Computer Weekly buyer's guide to artificial intelligence in IT security

    Artificial intelligence is keeping businesses ahead when it comes to fighting cyber crime. In this 14-page buyer's guide, Computer Weekly looks at how IT security is automating its systems, the tools letting firms achieve more with less and the advantages of predictive security.

    Download

  • Biometrics in the enterprise: An opportunity or an ethical minefield?

    Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.

    Download

  • Infographic: SIEM vs. SOAR vs. XDR

    IT security teams face an ongoing challenge: how best to collect data and turn it into intelligence to stop cyber threats. To help out, vendors have released generations of products that aggregate and analyse security events. In this infographic, learn the differences between SIEM, SOAR and XDR, and how these tools can help improve cyber security.

    Download

  • The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques

    This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.

    Download

  • Myth vs. reality: Persistent threats hijacking your internet connection

    In this e-guide learn the benefits of basic cyberhygiene in combating persistent attacks and become more effective in protecting your enterprise's data.

    Download

  • Shore up your cybersecurity resilience: A guide for ANZ businesses

    In this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.

    Download

  • Cyber security in the Middle East

    As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.

    Download

  • Trust no one: Why zero trust security is taking the world by storm

    As zero-trust strategies continue to grow, we take a look into the history and evolution of the zero-trust approach, the main challenges involving zero-trust implementation in 2022, and what APAC firms can do to stay ahead of cyber threats.

    Download

  • How to improve your cloud DLP

    This e-guide outlines the risks the cloud exposes modern enterprises to, and explores new options in cloud security like third-party cloud access security brokers (CASBs). Learn about several tools available that can let CIOs gain the visibility to prioritize cloud apps based on their security risk, and more.

    Download

  • 13 steps for enabling secure remote work

    Remote working has become increasingly popular as it provides a way of enabling greater work flexibility and productivity, saving costs, retaining employees, and encouraging a healthy work-life balance. However, enabling it can be risky if not done with security in mind. In this infographic, we outline 13 steps to enable secure remote working.

    Download

  • MicroScope – February 2021: The forecast on channel security

    MicroScope asks experts to share their opinions on what lies ahead for the channel in the security market, along with their predicitions for what upcoming threats to expect. Also read about how the managed service community helped to keep SMEs afloat during Covid-19, and how to arm the business with the best IAM tools for remote working

    Download

  • Containers: Making security and business sense

    In this e-guide we look at why established security suppliers are finally adding containers to their repertoire, and how security pros must decide between trusted platform integration and the latest features from startups.

    Download

  • Infosec culture: A former helicopter pilot's perspective

    In this article in our Royal Holloway security series, former helicopter pilot Ashley Bye explains how the UK Military Aviation Authority's model for an engaged air safety culture could be used to reduce the prevalence and severity of cyber security incidents.

    Download

  • Australia's cybersecurity game plan

    In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.

    Download

  • Computer Weekly - 7 September 2021: Highways England delivers a digital roadmap

    In this week's Computer Weekly, we talk to the CDIO of Highways England about her digital services and asset management plans. We also explore SIEM and SOAR security tools and we find out how McLaren Racing is using data analytics to build its cars more efficiently. Read the issue now.

    Download

  • DevSecOps delivers better business

    Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.

    Download

  • Remote connectivity: Set sail for calmer waters amidst digital disruption

    Download this IDC report for your roadmap on establishing secure remote connectivity for both agile and productive business operations. Inside the data-rich report, learn how to obtain a 360-degree security posture, to get the most from your connectivity platform, and to view essential guidance to get you started.

    Download

  • Ensure the security of your endpoint devices: Expert tips

    Endpoint devices are often the root cause of data breaches but finding the best endpoint security for your enterprise is a complex, ever-changing task. In this e-guide, experts Kevin Tolly and Eric Cole uncover 6 ways to improve endpoint device security and what features to focus on in your search for an endpoint security tool.

    Download