Home
 > Research and Reports > White Papers > Trends for 2011: Botnets and Dynamic Malware

Trends for 2011: Botnets and Dynamic Malware

Source: Eset
Crimeware (malware related to computer crimes committed in order to gain financial profit) has proven its maturity by the increase in the number of malicious programs to which the term can be legitimately applied, as well as the increase in the proportion of this kind of malware to more traditional malicious code. This report reviews the main trends as regards malicious programs and antivirus security.


Featured publications:

Selecting Field Service Management Software
Source: IFS What is a dynamic scheduling engine, and why does your field service management operation need one? Learn the ins and outs of this technology, which can help you adapt to rapidly changing priorities, schedule in real time, meet demanding service level agreements, and more, all while reducing cost. Read More...
The Importance and Benefits of Automatic Technician Scheduling in Field Service Operations
Source: IFS Deciding which technicians to assign to service orders, and when to schedule and dispatch them can be a tricky if not complicated process. And that’s not all! Service demands and schedules are incredibly dynamic and constantly changing throughout the day. Most service companies today require an automated and real-time approach to scheduling field service staff. Know the benefits of implementing a dynamic scheduling engine. Read More...


You may also be interested in these related documents:

How to Defend Against New Botnet Attacks
Source: Symantec In 2008, botnets were responsible for 90 percent of spam. The ever-changing nature of botnets makes them hard to detect and even harder to defend against—and these compromised “robot” computer networks don’t seem to be going away in the near future. Learn about new and sophisticated botnets, how they can affect your business network, and the steps you can take to protect your company from a botnet attack. Read More...
2008 Internet Security Trends: A Report on Emerging Attack Platforms for Spam, Viruses, and Malware
Source: IronPort Just when malware design seemed to have reached a plateau, new and more complex attack techniques have now emerged. For a while, security controls designed to manage spam, viruses, and malware were working, but as a result of this success, the threats they protected against were forced to change. Learn about today’s key security trends and how you can fight against the sophisticated new generation of Internet threats. Read More...
Beyond Spam – Email Security in the Age of Blended Threats
Source: EdgeWave Not all email security solutions are built to defend against emerging email threats. Regardless of whether someone is using a desktop, laptop, netbook, tablet or smartphone, an organization’s umbrella of security needs to protect any device connected to their networks and deliver real-time protection from the variety of threats to email infrastructures. Read this white paper to learn about the types of threats to email security in existence today, including botnets, phishing, malware, and smartphone attacks, and what to do about them. Read More...

 
comments powered by Disqus



Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others

©2014 Technology Evaluation Centers Inc. All rights reserved.