Targeted Trojans: The Silent Danger of Clever Malware

  • Source: Symantec
  • Written By:
  • Published:
  • (Originally Published On:) )
IT managers face heavy demands, limited resources, and a highly mobile workforce. These challenges make it difficult to keep employees secure. This paper discusses the modern Trojan attack. It explores the methodology hackers use to select a target and develop an attack, and cites examples of successful Trojans. Learn more about security solutions that can help protect your organization from targeted Trojans.

Featured Software Research:

Nine Common A/B Testing Pitfalls and How to Avoid Them

  • Source: Adobe
  • Written By:
  • Published:
Marketers use A/B testing to deliver the most optimized and targeted experiences for their customers. Sometimes marketers encounter pitfalls that produce misleading findings, which lead to less efficient offers and lower conversion rates.

Read "Nine Common A/B Testing Pitfalls and How to Avoid Them" to:

  • Recognize the nine most significant A/B testing pitfalls

  • Discover the five steps to gain better testing results

  • Gain a deeper understanding... Read More

You may also be interested in these related documents:

Trends for 2011: Botnets and Dynamic Malware

  • Source: Eset
  • Written By:
  • Published:
Crimeware (malware related to computer crimes committed in order to gain financial profit) has proven its maturity by the increase in the number of malicious programs to which the term can be legitimately applied, as well as the increase in the proportion of this kind of malware to more traditional malicious code. This report reviews the main trends as regards malicious programs and antivirus security. Read More

The Tangled Web: Silent Threats and Invisible Enemies

When cyber-criminals stage attacks on businesses with covert malware, spam, and scams that drain employee productivity, users aren’t aware they’ve been victimized. Rich media, open-source platforms, and social-networking sites are vulnerable to these threats. Learn how a hosted Web security and content filtering service intercepts all types of Web-borne attacks. Read More

2008 Internet Security Trends: A Report on Emerging Attack Platforms for Spam, Viruses, and Malware

Just when malware design seemed to have reached a plateau, new and more complex attack techniques have now emerged. For a while, security controls designed to manage spam, viruses, and malware were working, but as a result of this success, the threats they protected against were forced to change. Learn about today’s key security trends and how you can fight against the sophisticated new generation of Internet threats. Read More
comments powered by Disqus