2008 Internet Security Trends: A Report on Emerging Attack Platforms for Spam, Viruses, and Malware

  • Source: IronPort
  • Written By:
  • Published:
  • (Originally Published On:) )
Just when malware design seemed to have reached a plateau, new and more complex attack techniques have now emerged. For a while, security controls designed to manage spam, viruses, and malware were working, but as a result of this success, the threats they protected against were forced to change. Learn about today’s key security trends and how you can fight against the sophisticated new generation of Internet threats.

Featured Software Research:

TEC 2013 Market Survey Report: What Organizations Want in Business Intelligence (BI) Software

  • Source:
  • Written By:
  • Published: October 1 2013
This report gives an overview of current considerations for organizations seeking to purchase a business intelligence (BI) software solution. Based on aggregate data collected from more than 9,000 BI software comparisons performed using Technology Evaluation Centers’ (TEC’s) TEC Advisor software selection application during 2012, the report details what TEC data reveals about your peers' requirements for BI solutions, including functionalities, delivery models and access, customization and integration, server and database platforms, and budgeting. Read More

2014 Trends in ERP Convergence

In 2013, we were bombarded with what industry observers were calling big trends in enterprise software: software as a service (SaaS), prevalence of mobile devices, and consumerization of IT. Enterprise resource planning (ERP) was not immune to these trends. In this report, anticipated trends are explored in ERP convergence and goals, challenges, and performance of ERP implementations are investigated. Read More

Retail Retold: How the Internet of Things Is Evolving Omnichannel Retail

Most merchants and consumers have adjusted to the multi-device, multichannel environment known as omnichannel retailing. But there are real challenges that the omnichannel environment brings to the retail industry, even before considering how the Internet of Things (IoT) will amplify the complexity. P.J. Jakovljevic and Raluca Druta report on how the IoT is altering the retail world. Read More

You may also be interested in these related documents:

The Tangled Web: Silent Threats and Invisible Enemies

When cyber-criminals stage attacks on businesses with covert malware, spam, and scams that drain employee productivity, users aren’t aware they’ve been victimized. Rich media, open-source platforms, and social-networking sites are vulnerable to these threats. Learn how a hosted Web security and content filtering service intercepts all types of Web-borne attacks. Read More

How to Defend Against New Botnet Attacks

In 2008, botnets were responsible for 90 percent of spam. The ever-changing nature of botnets makes them hard to detect and even harder to defend against—and these compromised “robot” computer networks don’t seem to be going away in the near future. Learn about new and sophisticated botnets, how they can affect your business network, and the steps you can take to protect your company from a botnet attack. Read More

Anti-Spam Software: An Effective Way to Fight Spam.

Spam is unsolicited junk mail sent to you or your mail server. People who indulge in such activities are called spammers. These are sent by commercial advertisers who may offer dubious products, get rich schemes, products that do not suit your life style, promote illegal activities, etc. The intent here is to make you spend money. Almost 60% to 70% of spam is related to porn. There is another type of spammer who sends large number of e-mails that flood your mailbox or mail server. This white paper provides information about spam, losses caused by spam, how spam works and suggests key features that a good anti-spam software should have. Read More
 
comments powered by Disqus