Malicious Computer Code Reports

Network Security: Spotlight on Australia/New Zealand
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.
Posted: 08 Feb 2021 | Published: 21 Jun 2018

TechTarget ComputerWeekly.com

Publishing Defending Against Evolving Ransomware Attacks Webinar
sponsored by CrowdStrike
WEBCAST: Today, 71% of attacks are malware free and impossible for legacy solutions to detect. Join CrowdStrike for this exclusive event to gain insights into the evolving nature of ransomware and watch a demo of the latest antivirus and modern endpoint security solutions that will keep you ahead of cybercriminals.
Posted: 08 Nov 2024 | Premiered: Nov 8, 2024

TOPICS:  Malware
CrowdStrike

Audi fine-tunes its digital performance to boost online car sales
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the digital chief at Audi UK discusses how the car maker is tackling the slump in new car sales. One of the largest global malware botnets has been taken down, but how much of a blow will it be for cyber criminals? And we hear how one county council made huge savings on its SAP installation. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Feb 2021

TechTarget ComputerWeekly.com

IBM Internet Security Systems X-Force® 2008 Mid-Year Trend Statistics
sponsored by IBM
WHITE PAPER: Read this white paper to discover the implications, so you can enhance information security for the rest of 2008 and beyond.
Posted: 27 Oct 2008 | Published: 27 Oct 2008

IBM

Why You Need an Email Exploit Detection Engine
sponsored by GFI Software
PRODUCT LITERATURE: This white paper explains what email exploits are, provides examples of common email exploits, and discusses why a non signature-based approach (i.e., not a virus engine) is needed to protect against email exploits.
Posted: 02 May 2006 | Published: 01 May 2006

GFI Software

Total E-mail Security
sponsored by Sunbelt Software
WHITE PAPER: Malware is becoming ever more sophisticated every day. Only through effective tools that incorporate fast responses against all categories of malware will organizations be able to maintain the health of their critical business systems.
Posted: 11 Nov 2008 | Published: 11 Nov 2008

Sunbelt Software

Symantec Mail Security for SMTP
sponsored by Symantec Corporation
TRIAL SOFTWARE: Try this download and see how Symantec's Mail Security for SMTP can help your company defend against viruses, spam, and other unwanted content. It also provides high-performance, integrated protection against threats at the Internet email gateway.
Posted: 14 May 2007 | Premiered: 14 May 2007

Symantec Corporation

Productivity, Internet Abuse, and How to Improve One by Eliminating the Other
sponsored by Bloxx, Inc.
WHITE PAPER: This white paper explains the effect of Internet abuse on employee productivity, which is huge and not fully appreciated.
Posted: 05 Sep 2008 | Published: 05 Sep 2008

Bloxx, Inc.

Protecting Web Applications from Attack and Misuse
sponsored by Citrix
WHITE PAPER: Application-layer attacks against business-critical web applications are the most serious IT security threat facing enterprises today. Read this white paper to learn how to improve web application security for your enterprise.
Posted: 27 Jul 2006 | Published: 01 Jul 2006

Citrix

A Closer Look at Windows Vista
sponsored by National Instruments
WHITE PAPER: One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative...
Posted: 19 Feb 2008 | Published: 19 Feb 2008

National Instruments