Trends in Malware: 2007 Security Threat Report

  • Source: Sophos
  • Written By:
  • Published:
  • (Originally Published On:) )
The first six months of 2007 continued a trend of rapidly mutating virus and spam campaigns. Small targeted attacks were favored over large-scale attacks. The Web in particular continued to be a growing source of threats, being overrun with Trojans, spyware and adware, potentially unwanted applications, and undesirable web sites. Protect yourself: learn about our predictions for the upcoming threat landscape.

Featured Software Research:

The Case for Cloud ERP in Manufacturing: Alleviating Outdated Concerns

Manufacturers have been slow to accept enterprise resource planning (ERP) deployment options other than the traditional on-premise model, but the motivation behind the reticence is unclear. This report illustrates trends in cloud deployment, lays out the reasons for manufacturers to consider cloud ERP, and notes performance advantages for organizations using cloud.  Read More

Operational Risk Management in the World of Big Data

  • Source: IBM
  • Written By:
  • Published:
Today, with operational risk emerging as a primary risk threat in all major economies, market players are looking to the potential of big data as a primary driver of next-generation operational risk management. Drawing on current IBM research in the field of big data, this paper shows how operational risk solutions can harness the potential of big data to inform risk management scenarios and analytics. Read More

You may also be interested in these related documents:

Trends for 2011: Botnets and Dynamic Malware

  • Source: Eset
  • Written By:
  • Published:
Crimeware (malware related to computer crimes committed in order to gain financial profit) has proven its maturity by the increase in the number of malicious programs to which the term can be legitimately applied, as well as the increase in the proportion of this kind of malware to more traditional malicious code. This report reviews the main trends as regards malicious programs and antivirus security. Read More

Malware Security Report: Protecting Your Business, Customers, and the Bottom Line

Be sure to protect your Web site by understanding techniques that can be used to detect when and how attackers compromise Web servers. Also, understand the business models behind malware attacks to better anticipate, and prevent, attacks on your business by reading this white paper. Read More

The Tangled Web: Silent Threats and Invisible Enemies

When cyber-criminals stage attacks on businesses with covert malware, spam, and scams that drain employee productivity, users aren’t aware they’ve been victimized. Rich media, open-source platforms, and social-networking sites are vulnerable to these threats. Learn how a hosted Web security and content filtering service intercepts all types of Web-borne attacks. Read More
 
comments powered by Disqus