Malware

In the ongoing war against malware threats, you need tools that will baseline your system, detect vulnerabilities, and remove existing malware.

  • Webcasts // Aug 2014

    On-demand Webcast: Anatomy of an Attack: Know What to Defend Against

    Hackers are targeting businesses large and small while botnets spread malware indiscriminately as they propagate via email. But how can you tell whether you’ve caught the attention of international criminals or amateur script kiddies? And is there any difference? The fact is, you can’t secure your IT infrastructure if...

    Sponsored By Alert Logic

  • White Papers // Jul 2014

    How Malware and Targeted Attacks Infiltrate Your Data Center

    Advanced targeted attacks bypass the security perimeter and compromise individuals inside your enterprise to unleash attacks on your entire network. Read this white paper to learn more about: Attack Motivation How to Protect Your Sensitive Data and Critical Business Applications Complementing Traditional Defenses with Data Center Protection Effective Malware...

    Sponsored By Imperva

  • White Papers // Apr 2014

    Strategy Considerations for Building a Security Operations Center

    This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise security operations center (SOC).

    Sponsored By IBM

  • White Papers // Jan 2014

    The 2014 Firewall Buyers Guide

    Make an informed decision on the right firewall for your business with The Firewall Buyers Guide. This guide gives you: The fundamentals of modern firewall technology The ten critical business requirements your next firewall needs to address Information on how to create a vendor request...

    Provided By Palo Alto Networks

  • White Papers // May 2013

    A Model for Identifying Phishing E-Mail Based on Structural Properties

    The widespread use of email caused the number of warnings being made about the dark side the authors' technological revolution to increase and they are becoming uniquely vulnerable to many mysterious and malicious threats. Viruses, worms, and other forms of malicious software started targeting their email inboxes to propagate. Spam...

    Provided By C.V.Raman Group of Institution

  • White Papers // Oct 2014

    Free Webinar - Turn the Tables on Cyber-Attacks

    Every day organisations – just like yours – fall victim to data theft through advanced targeted attacks. The costs of data breaches and remediation are extremely high. What if you could turn the tables on cyber-attacks by allowing your products to operate as one, exchanging and acting on collective threat...

    Provided By Intel Security McAfee

  • White Papers // Jan 2014

    Still Using Proxies for URL Filtering? There's a Better Way.

    Firewalls enforce network access via a positive control model, where only specific traffic defined in policies is granted access to the network while all other traffic is denied. Access Control Lists (ACLs) initially performed this functionality, often in routers, but their rudimentary approach gave way to dedicated packet filtering and...

    Provided By Palo Alto Networks

  • White Papers // Jan 2014

    Establishing a Logical Perimeter: The Evolution of Network Security

    An enterprise's most basic assets (employees, applications and data) are becoming increasingly flexible and independent from traditional notions of location and hardware. Unfortunately, the same is not true of enterprise security, which remains anchored to the physical perimeter of the enterprise. These shifts present a serious challenge for enterprise...

    Provided By Palo Alto Networks

  • White Papers // Nov 2013

    Hot Knives Through Butter: Evading File-based Sandboxes

    Sandboxes provide isolated, virtual environments that monitor the actual behavior of files as they execute. In theory, this setup enables security professionals to spot malicious code that evades traditional signature-based defenses. But sandboxes are only as good as the analysis that surrounds them. By themselves, sandboxes can only monitor...

    Provided By FireEye

  • White Papers // Nov 2013

    Poison Ivy: Assessing Damage and Extracting Intelligence

    This report spotlights Poison Ivy (PIVY), a Remote Access Tool (RAT) that remains popular and effective a full eight years after its release, despite its age and familiarity in IT security circles. Poison Ivy has been used in several high-profile malware campaigns, most notoriously, the 2011 compromise of RSA SecurID...

    Provided By FireEye

  • White Papers // Nov 2013

    The New Breed of Email-based Cyber Attacks - and What it Takes to Defend Against Them

    As security teams look to shore up their organization's vulnerabilities, email represents a critical attack vector to address. Through highly targeted email attacks known as spear phishing, attackers are consistently compromising the security defenses in place, proving the need for a next-generation threat protection platform. FireEye research indicates that,...

    Provided By FireEye

  • White Papers // Nov 2013

    World War C: Combatting Nation-State Cyber Attacks

    Cyberspace is now a full-blown war zone as global governments race to assert their supremacy on a new shadowy frontline. In this new war, battles are fought with bits instead of bullets, malware instead of militias, and botnets instead of bombs. And the list of casualties - which already...

    Provided By FireEye

  • Case Studies // Nov 2013

    SANS WhatWorks in Detecting and Blocking Advanced Threats

    A Real Case Study at a Large Research Organization In an interview with SANS Director of Emerging Technologies John Pescatore, a veteran cybersecurity practitioner discusses how his team address the challenge of balancing high risk activities with effective cybersecurity operations. Read the interview now for insight into how your organization...

    Provided By FireEye

  • White Papers // Nov 2013

    Less Secure Than You Think

    This white paper examines the changing threat landscape, how the nature of security threats has evolved, and the potential financial impact across vertical markets and organizations of all sizes. This paper will explain why advanced targeted attacks have been extremely effective at breaking through traditional network security and enabling the...

    Provided By FireEye

  • White Papers // Nov 2013

    Supply Chain Analysis: From Quartermaster to SunshopFireEye Labs

    Many seemingly unrelated cyber attacks may, in fact, be part of a broader offensive fueled by a shared development and logistics infrastructure - a finding that suggests some targets are facing a more organized menace than they realize. This report examines 11 advanced persistent threat (APT) campaigns targeting a...

    Provided By FireEye

  • White Papers // Dec 2013

    Debunking the Myth of Sandbox Security

    Aware that their backward-facing defenses fall short, several IT security vendors are touting their sandbox products. But rather than adopting a truly fresh approach, most are merely grafting a sandbox onto their legacy strategies, which routinely fail to catch these attacks. While sandboxing advances the signature-based approach of the past,...

    Provided By FireEye

  • White Papers // Dec 2013

    Securing Cloud-Based Email: A Guide for Government Agencies

    Today, email-based threats represent significant and persistent risks for government agencies, and those dangers are only exacerbated by the move to cloud delivery models. This paper shows how government agencies can capitalize on the benefits of the cloud, while addressing their critical security gaps. The paper reveals how by inspecting...

    Provided By FireEye

  • White Papers // Jul 2013

    Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks - A Guide for CIOs, CFOs, and CISOs

    Enterprises and government agencies are under virtually constant attack today. Significant breaches at RSA, Global Payments, ADP, Symantec, International Monetary Fund, and a number of other organizations have made headlines. 95% of organizations are routinely compromised, with the theft of intellectual property, customer records, and other sensitive data increasingly common....

    Provided By FireEye

  • Videos // Aug 2013

    Webinar: Advanced Malware And APT Attacks

    Watch this webinar to learn: * What are the traits of Advanced Persistent Threats (APT)? * What are the infection vectors? * What are the advanced techniques? * Who are the threat actors?

    Provided By FireEye

  • Videos // Aug 2013

    Webinar: How Client-side Attacks Evade Traditional Security Controls

    Hosted by Ben Wilson, Senior Systems Engineer, CISSP, GXPN Bypassing traditional security controls is becoming a commodity. Hear more and watch a demo about how this happens, and what you can do to protect your network.

    Provided By FireEye

  • White Papers // Nov 2013

    The Advanced Cyber Attack Landscape

    Recent reports have pinpointed China as a key driver behind cyber attacks designed to steal intellectual property and other sensitive information. But advanced cyber attacks are not confined to just one nation. Rather, cyber attacks are a widespread global activity. During the course of 2012, FireEye monitored more than...

    Provided By FireEye

  • White Papers // Nov 2013

    Seven Clues To Identifying Who Is Behind Advanced Cyber Attacks

    In today's cyber threat landscape, identifying your enemy is a crucial piece of any defense plan. Finding out who your attackers are, how they work, and what they want is critical to protecting your data and intellectual property. Fortunately, breached computer systems, like any crime scene, contain a trail...

    Provided By FireEye

  • White Papers // Jan 2014

    Cloud-Based Mobile Device Security Streamlines Data Protection

    As smartphones and tablets have become increasingly sophisticated, the amount and types of data stored on them have increased. Confidential data once stored inside the firewall now resides on mobile devices, but many small and medium businesses have not taken sufficient action to address the risks this presents. SMB IT...

    Provided By Webroot Software

  • White Papers // Sep 2013

    The Wild, Wild West of Mobile Apps

    This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile...

    Provided By Webroot Software

  • White Papers // Aug 2013

    Infographic: Malicious Mobile Apps (MMA) - A Growing Threat in 2013 and Beyond

    With the exploding use of mobile devices and BYOD, mobile apps represent a major new threat. This infographic reveals some surprising facts about malicious mobile apps, including where they come from, what they do, and what other IT pros are thinking about MMAs.Download now to discover the interesting facts.

    Provided By Webroot Software

  • White Papers // Aug 2013

    Whitepaper: The Wild, Wild West of Mobile

    This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile...

    Provided By Webroot Software

  • White Papers // Jan 2014

    CryptoLocker - Your Money or Your Life

    CryptoLocker belongs to a family of malware called "ransomware", which is designed to extort money from victims by denying them access to their personal files. It targets all Windows Operating Systems, from Windows XP to Windows 8, and typically remains unnoticed by victims until it's too late and the damage...

    Provided By Webroot Software

  • White Papers // Sep 2013

    Publishing Exchange Server with Barracuda’s Application Delivery Controller

    Making Microsoft Exchange Server available for remote access by web, mobile, and rich clients requires a comprehensive approach to application security. With the right solution, you can implement a powerful alternative to protect critical communications infrastructure, and simultaneously help users be more productive from web clients, remote PCs, and mobile...

    Provided By Barracuda Networks

  • White Papers // Aug 2013

    Combating Small Business Security Threats: How SMBs Can Fight Cybercrime

    When hackers breach the defences of huge organizations like Amazon, Apple, or Citibank, it makes the news. When the same cybercrime exploits hit small and medium businesses (SMBs), it rarely garners a mention, but that that doesn't mean small businesses don't get hacked, or that the impact on SMBs is...

    Provided By McAfee

  • White Papers // Aug 2013

    Modernizing Security for the Small and Mid-Sized Business - Recommendations for 2013

    As small and mid-sized businesses (SMBs) take advantage of the compelling benefits of the transformations in their IT computing infrastructure - and struggle at times with the additional complexities that come along with it - they should also re-think how they deal with the corresponding vulnerabilities, threats and risks. Read...

    Provided By McAfee

  • White Papers // Aug 2013

    SMB is the New Cybercrime Target

    Did you know that as many as 45% of Australian SMBs experienced a targeted electronic attack in the past 12 months? Small businesses are now big targets for worldwide cybercrime. You need a comprehensive yet easy-to-manage security strategy that can protect your business while you focus on growing it.

    Provided By McAfee

  • White Papers // Aug 2013

    Verizon Data Breach Investigations Report - 2013

    Will your organization, or one you work with, suffer a security breach this year? Nobody’s immune, no target is too small, or too large. The methods used by hackers to gain access to data are numerous, wide-reaching and ever-growing. This isn’t a threat you can afford to ignore. This executive...

    Provided By McAfee

  • White Papers // Aug 2013

    How to Protect your business from Hackers

    Gone are the days when hackers were mostly harmless recreational programmers. The malicious intent of today’s cyber criminals is only exceeded by their zeal to profit from their electronic crimes. In this Solution Brief, McAfee discusses why small and mid-sized businesses are especially vulnerable due to lower security defences and...

    Provided By McAfee

  • White Papers // Aug 2013

    McAfee Cloud-Based Security for SMBs

    Cybercriminals are targeting growing businesses like yours. They’re zeroing in, believing that your business is an easier target because you can’t afford a sophisticated security framework. However, there’s an answer to this dilemma-- cloud-based solutions that deliver the most effective, up-to-date security that are both scalable and...

    Provided By McAfee

  • White Papers // Aug 2013

    5 Steps to Protect your Business from being a Cybercrime Statistic (Large Infographic)

    Did you know that last year as many as 75% of recent data breaches targeted small and medium sized businesses? Small businesses are now big targets for worldwide cybercrime. You need a comprehensive yet easy-to-manage security strategy that can protect your business while you focus on growing it. Download this...

    Provided By McAfee

  • White Papers // Nov 2013

    Mitigating DDoS Attacks with F5 Technology

    Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks, session attacks, application attacks, and business logic attacks. Read about an effective anti-attack technology for each layer of taxonomy.

    Provided By F5 Networks

  • White Papers // Nov 2013

    How to Operationalize Web Application Security

    This white paper explains how the Persistent Threat Management model of security eliminates the "man-in-the-middle" bottleneck that prevents the scalability of web application security solutions vital to preventing today's pervasive attacks from succeeding. Find out how PTM can help you automate the process of scanning and mitigating 80 percent of...

    Provided By F5 Networks

  • White Papers // Nov 2013

    F5 Synthesis: Applications without Constraints

    F5 Synthesis is a new model for application services, an architectural vision for delivering device, network, and application services without constraints. Discover how F5 Synthesis can help you deliver the applications businesses securely, rapidly, and reliably by leveraging a high-performance services fabric.

    Provided By F5 Networks

  • White Papers // Nov 2013

    Secure, Optimized Global Access to Corporate Resources

    The mission is to connect any user from any device from any location to wherever the application lives, securing and optimizing the delivery of content. Find out how you can provide the unified, optimized, and secure access that organizations and their users and customers need.

    Provided By F5 Networks

  • White Papers // Jan 2014

    Cyber Security Intelligence Index

    Analysis of cyber security attack and incident data from IBM's worldwide security operations An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a...

    Provided By IBM