Home
 > Research and Reports > White Papers > Targeted Trojans: The Silent Danger of Clever Malware

Targeted Trojans: The Silent Danger of Clever Malware

Source: Symantec
IT managers face heavy demands, limited resources, and a highly mobile workforce. These challenges make it difficult to keep employees secure. This paper discusses the modern Trojan attack. It explores the methodology hackers use to select a target and develop an attack, and cites examples of successful Trojans. Learn more about security solutions that can help protect your organization from targeted Trojans.


Featured publications:

Best Practices for Fixed Asset Managers
Source: Sage In the world of accounting, the savings potential of improved fixed asset management is often overlooked. Yet assets like land, buildings, transportation, and manufacturing equipment represent among the largest investments most companies make. Sub-optimal fixed asset practices can threaten the accuracy of financial reports and negatively impact your bottom line. This white paper outlines best practices for fixed asset management and suggests tips for implementation, including establishing an accurate baseline of fixed assets, selecting the right asset management tools, staying up to date with legislative changes, and producing targeted financial reports. Read More...
Infor Fashion PLM Offers Product Lifecycle Management for the Fashion Industry with a Fresh Approach
Written By: Predrag Jakovljevic Published On: April 15 2014 Infor recently announced the availability of Infor Fashion PLM, a brand new application, built from the ground up, that aims to link tricky and vital areas of “softlines” product development to the supply chain—from line planning, design, development and sourcing, to production, inventory management, customers, and distribution. This release means that Infor has become the very first enterprise resource planning (ERP) provider that can offer a PLM solution in all of the following realms: discrete manufacturing, process manufacturing, and fashion/apparel manufacturing and retailing. Read More...


You may also be interested in these related documents:

The Tangled Web: Silent Threats and Invisible Enemies
Source: Symantec When cyber-criminals stage attacks on businesses with covert malware, spam, and scams that drain employee productivity, users aren’t aware they’ve been victimized. Rich media, open-source platforms, and social-networking sites are vulnerable to these threats. Learn how a hosted Web security and content filtering service intercepts all types of Web-borne attacks. Read More...
Combating Malware: Leveraging the Power of the Planet
Source: Panda Security USA The amount of malware that is being released around the world is increasing at an alarming rate. To combat these cyber-crimes, new layers of protection are needed that take advantage of automating the entire malware protection cycle—from sample collection, analysis and classification, to remediation. By combing automation with Panda’s Collective Intelligence, targeted attacks can be detected more quickly and efficiently. Read More...
Trends in Malware: 2007 Security Threat Report
Source: Sophos The first six months of 2007 continued a trend of rapidly mutating virus and spam campaigns. Small targeted attacks were favored over large-scale attacks. The Web in particular continued to be a growing source of threats, being overrun with Trojans, spyware and adware, potentially unwanted applications, and undesirable web sites. Protect yourself: learn about our predictions for the upcoming threat landscape. Read More...

 
comments powered by Disqus



Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others

©2014 Technology Evaluation Centers Inc. All rights reserved.