Targeted Trojans: The Silent Danger of Clever Malware

  • Source: Symantec
  • Written By:
  • Published:
  • (Originally Published On:) )
IT managers face heavy demands, limited resources, and a highly mobile workforce. These challenges make it difficult to keep employees secure. This paper discusses the modern Trojan attack. It explores the methodology hackers use to select a target and develop an attack, and cites examples of successful Trojans. Learn more about security solutions that can help protect your organization from targeted Trojans.

Featured Software Research:

11 Criteria for Selecting the Best ERP System Replacement

An enterprise resource planning (ERP) system is your information backbone, reaching into all areas of your business and value chain. That’s why replacing it can open unlimited business opportunities. The cornerstone of this effort is finding the right partner. And since your long-term business strategy will shape your selection, it’s critical that your ERP provider be part of your vision. Read More

You may also be interested in these related documents:

Trends for 2011: Botnets and Dynamic Malware

  • Source: Eset
  • Written By:
  • Published:
Crimeware (malware related to computer crimes committed in order to gain financial profit) has proven its maturity by the increase in the number of malicious programs to which the term can be legitimately applied, as well as the increase in the proportion of this kind of malware to more traditional malicious code. This report reviews the main trends as regards malicious programs and antivirus security. Read More

The Tangled Web: Silent Threats and Invisible Enemies

When cyber-criminals stage attacks on businesses with covert malware, spam, and scams that drain employee productivity, users aren’t aware they’ve been victimized. Rich media, open-source platforms, and social-networking sites are vulnerable to these threats. Learn how a hosted Web security and content filtering service intercepts all types of Web-borne attacks. Read More

Driving the Need for Highly Effective Mail Server Security

Most companies have already invested in e-mail security. However, yesterday’s defenses may not be up to the challenge of tomorrow’s threats. Why? Because Internet security risks are increasingly malicious: Web threats are growing more than 100 percent every six months, and targeted attacks are up 351 percent from two years ago. Re-examine your approach to mail server security and protect yourself from malware attacks. Read More
 
comments powered by Disqus