2008 Internet Security Trends: A Report on Emerging Attack Platforms for Spam, Viruses, and Malware

  • Source: IronPort
  • Written By:
  • Published:
  • (Originally Published On:) )
Just when malware design seemed to have reached a plateau, new and more complex attack techniques have now emerged. For a while, security controls designed to manage spam, viruses, and malware were working, but as a result of this success, the threats they protected against were forced to change. Learn about today’s key security trends and how you can fight against the sophisticated new generation of Internet threats.

Featured Software Research:

Retail Retold: How the Internet of Things Is Evolving Omnichannel Retail

Most merchants and consumers have adjusted to the multi-device, multichannel environment known as omnichannel retailing. But there are real challenges that the omnichannel environment brings to the retail industry, even before considering how the Internet of Things (IoT) will amplify the complexity. P.J. Jakovljevic and Raluca Druta report on how the IoT is altering the retail world. Read More

Your Best Workers May Not Be Your Employees

  • Source: IBM
  • Written By:
  • Published:
The workforce is changing. Cradle-to-grave employment is a relic. Technological advances have allowed workers to become more mobile and global. But the financial crisis of 2008 has had a lasting impact on employment around the world and across industries. Since then, multiple studies have documented the rise of independent workers, also known as contractors, freelancers, or consultants.

In this report, researchers look at a sample of more than 33,000 workers across 26 countries and compare... Read More

Top 10 SIEM Implementer’s Checklist: Operationalizing Information Security

This e-book lists 10 best practices for successful security information and event management (SIEM) implementation. These best practices are intended to help enterprises optimize their resources and accelerate their return on investment (ROI).

An organization may need to streamline incident response, automate audit and compliance processes, better manage security and business risks, or build out a deployed SIEM. This document presents process, metrics, and technology considerations relative... Read More

You may also be interested in these related documents:

The Tangled Web: Silent Threats and Invisible Enemies

When cyber-criminals stage attacks on businesses with covert malware, spam, and scams that drain employee productivity, users aren’t aware they’ve been victimized. Rich media, open-source platforms, and social-networking sites are vulnerable to these threats. Learn how a hosted Web security and content filtering service intercepts all types of Web-borne attacks. Read More

How to Defend Against New Botnet Attacks

In 2008, botnets were responsible for 90 percent of spam. The ever-changing nature of botnets makes them hard to detect and even harder to defend against—and these compromised “robot” computer networks don’t seem to be going away in the near future. Learn about new and sophisticated botnets, how they can affect your business network, and the steps you can take to protect your company from a botnet attack. Read More

Anti-Spam Software: An Effective Way to Fight Spam.

Spam is unsolicited junk mail sent to you or your mail server. People who indulge in such activities are called spammers. These are sent by commercial advertisers who may offer dubious products, get rich schemes, products that do not suit your life style, promote illegal activities, etc. The intent here is to make you spend money. Almost 60% to 70% of spam is related to porn. There is another type of spammer who sends large number of e-mails that flood your mailbox or mail server. This white paper... Read More
 
comments powered by Disqus