dcsimg
Page navigation 1 2 3 4 [»]

Kaspersky Lab: Anti-Virus 2010 and Internet Security 2010

The 2010 versions of Kaspersky Anti-Virus and Kaspersky Internet Security, reflect an evolutionary rather than a revolutionary change in Kaspersky Lab's product line. They incorporate technologies that were present in the 2009 versions and have since undergone further improvement and integration. This has allowed the development of the progressive IT security concepts introduced in the previous versions to be continued, and gives users of the company's products an even higher level of security.
Log in or register to download white paper (free registration)
Middle East: Thursday, February 25 - 2010 at 11:36

MessageLabs Intelligence: 2009 annual security report

2009 was a tough year for businesses around the globe with no respite from cyber criminals who generated an influx and variation of spam and malware that many traditional security technologies were ill-equipped to handle. In this report we take a closer look at the major factors and key developments over the course of the year and their impact on the security landscape, looking ahead to 2010 to provide insight into key threats and areas of concern.
Log in or register to download white paper (free registration)
Global: Saturday, December 19 - 2009 at 10:06

Kaspersky Lab: Virtual keyboard - stopping keyloggers from stealing data

Every year the problem of spyware on the internet becomes more acute. This type of malware is capable of intercepting data such as logins and passwords that users enter via the keyboard, which can then be used to gain unauthorised access to various accounts, including online banking systems. Spyware is capable of stealing virtually any type of confidential data from users. The damage caused by the illegal use of data intercepted by spyware is estimated at hundreds of millions of dollars. The vast majority of data is intercepted by keyloggers.
Log in or register to download white paper (free registration)
Middle East: Thursday, October 01 - 2009 at 12:03

Kaspersky Lab: How 'Whitelisting' secures corporate data

The Whitelisting technology implemented in Kaspersky Lab's security products controls applications using so-called whitelists, or lists of trusted applications. This technology helps control the activity of potentially hostile programs while allowing complete freedom to safe software that exhibits behavior similar to that of malware. Moreover, this technology significantly accelerates antivirus scanning. This ensures a high level of protection and convenience when using Kaspersky Lab products.
Log in or register to download white paper (free registration)
Middle East: Thursday, October 01 - 2009 at 10:20

Kaspersky Lab: Host-based Intrusion Prevention System

Today's computer users are faced with an ever-increasing number of malicious programs. Trojans, worms and viruses damage computer systems and communication channels, steal confidential data and spy on users. Users need effective protection from hacker and malware attacks. Network Intrusion Detection Systems (NIDS) that analyse internet traffic and internal networks are available, though their usefulness is limited due to the frequent use of data encryption on the Web. They also fail to protect against threats emanating from removable storage media.
Log in or register to download white paper (free registration)
Middle East: Wednesday, September 23 - 2009 at 16:47

UM Labs: Limitations of IDS and IPS to secure VoIP applications

Intrusion Prevention Systems (IPS) and Intrusion Prevention Systems (IDS) technology was first developed to supplement general purpose firewalls and to provide additional security for standard IP applications such as web and email. Some vendors have taken a step further and developed advanced heuristics that claim to be able to detect new threats without relying on a pattern update. This technology has undoubtedly been successful, but its success has been in a supporting role, supplementing the security offered by a general purpose firewall.
Log in or register to download white paper (free registration)
Middle East: Wednesday, September 23 - 2009 at 11:49

Kaspersky Lab: Launch of applications in secure mode (Sandbox)

The modern virus industry has become so sophisticated that even the most advanced antivirus protection systems occasionally fail to detect malicious programs that have penetrated and launched on an operating system. The ultimate solution is the virtual launch of all applications downloaded to a computer. All program activity is then completely controlled and any changes made by the application will be unable to damage other applications or the operating system.
Log in or register to download white paper (free registration)
Middle East: Sunday, September 20 - 2009 at 12:10

Blue Coat: Protecting against the wave of web threats

Web-based threats are increasing in number and severity. The consequences of becoming infected can be extensive and cause significant damage to an organization's revenue, employee productivity, reputation and long-term survival. Organizations should adopt a multi-layered Web defense strategy that can protect their users and networks from increasingly sophisticated threats. Key elements of this strategy include community-watch monitoring of Web traffic using a cloud-based service, protection of remote clients, and real-time inputs from Web gateways and clients for background analysis to detect malware, rate reputations and analyze Web content.
Log in or register to download white paper (free registration)
Middle East: Monday, September 14 - 2009 at 16:50

Secure 1st: Google hacking

Google hacking is the term used when a hacker tries to find vulnerable targets or sensitive data by using the Google search engine. In Google hacking hackers use search engine commands or complex search queries to locate sensitive data and vulnerable devices on the internet.
Log in or register to download white paper (free registration)
Middle East: Monday, September 14 - 2009 at 10:30

Secure 1st: Cyberspace, cyberterrorism and information warfare - a perfect recipe for confusion

The terms "cyberspace," "cyberterrorism" and "information warfare" are becoming common in the dialogue of information security and media professionals. However, it is hard to find solid definitions of these terms. This Secure 1st white paper discusses these terms from different viewpoints by giving examples and different definitions from diverse sources, both academic and professional.
Log in or register to download white paper (free registration)
Middle East: Thursday, September 10 - 2009 at 16:23

Symantec: Your computer is now stoned (...again!) - the Rise of MBR rootkits

The war against invisible malware has been taken down to a new battleground, the lowest level seen so far in the wild: the Master Boot Record. The Mebroot rootkit uses techniques never before seen in modern threats and so it can be considered the next generation of stealth rootkit and kernel infector, written by professional malware developers and clearly not for fun.
Log in or register to download white paper (free registration)
Middle East: Tuesday, September 08 - 2009 at 13:58

Blue Coat: The alarming shift in cybercrime

It's now a popular marketing tactic to claim that 'brand name' websites with well-known reputations are completely safe. However, it is exactly because of this perception that these sites are being targeted to become the unwitting hosts for invisible malware that can infect a computer just by the user checking the latest news or sports scores. This paper will examine the shift in the nature of cybercrimes, how the thieves target their victims, and what can be done to prevent them.
Log in or register to download white paper (free registration)
Middle East: Tuesday, September 08 - 2009 at 13:48

Symantec: The Downadup codex

The Downadup worm has become one of the most wide-spread threats to hit the Internet for a number of years. A complex piece of malicious code, this threat was able to jump certain network hurdles, hide in the shadows of network traffic, and defend itself against attack with a deftness not often seen in today's threat landscape. Yet it contained few previously unseen features. What set it apart was the sheer number of tricks it held up its sleeve.
Log in or register to download white paper (free registration)
Middle East: Monday, September 07 - 2009 at 12:54

Symantec: Web based attacks

The Web has become an important part of home and work life. Malware authors are leveraging this fact to deliver attacks via the Web for financial gain rather than personal fame. This Symantec white paper examines some of the more popular attack techniques and outlines some best practices for being safe online.
Log in or register to download white paper (free registration)
Middle East: Wednesday, September 02 - 2009 at 14:59

Sophos: Protecting Mac and Linux computers - genuine need or nice to have?

The current risk to Macs and Linux computers is small but growing. This Sophos white paper investigates the threat businesses face from non-Windows platforms, examines the implications of their growing popularity, and highlights regulatory pressure to protect them.
Log in or register to download white paper (free registration)
Middle East: Tuesday, September 01 - 2009 at 16:30
Page navigation 1 2 3 4 [»]