phishing

Results 201 - 225 of 251Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Mar 04, 2014
This paper explores how companies can more safely introduce employee- or corporate-owned mobile devices into the work-place, identify the risks inherent in their broader access to corpo-rate data, and derive enhanced business value.
Tags : ibm, mobile, mobile device, mobile security, security, mobility, enterprise, mobile enterprise, mobile device platform, it management, malware, spam, phishing, bluetooth, wi-fi, theft
     IBM
By: Kaspersky     Published Date: May 20, 2014
Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.
Tags : virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention, malware, cyberattack
     Kaspersky
By: Symantec     Published Date: Jan 10, 2013
The fear of fraud, spoofing, phishing, identity theft, and lax website security have a sizable percentage of consumers wary of using credit cards online. This paper examines how recent trends in Internet trust marks can restore confidence.
Tags : internet trust, building confidence, profit online, business profits, business growth, business confidence, consumer confidence, symantec report, security
     Symantec
By: Rapid7     Published Date: Apr 04, 2013
This whitepaper examines the many different methods employed in phishing attacks and social engineering campaigns, and offers a solution-based approach to mitigating risk from these attack vectors.
Tags : rapid7, protect organization, attacks via phishing, solution based approach, mitigating risks
     Rapid7
By: Symantec     Published Date: Nov 21, 2014
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks. Key Findings • The .doc file type was the most common attachment type used in spear-phishing attacks, making up more than 52.9 percent of all attachments in September. • The largest data breach reported in September actually took place in April, and resulted in the exposure of 56 million identities. • There were 600 vulnerabilities disclosed in the month of September, the highest number so far in 2014 and second-highest in the last 12 months.
Tags : cyber security threats, harmful business risks, malware, spam, intelligence team, security
     Symantec
By: Cisco     Published Date: Aug 18, 2014
Mitigating Email Threats White Paper: Protect your content with these security measures for inbound and outbound email. Mitigating Web Threats White Paper: Learn about web security options for on-premises, cloud, hybrid, and virtual deployments.
Tags : email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway, mitigate, cloud, hybrid, on-premises
     Cisco
By: Cisco     Published Date: Aug 18, 2014
Cisco offers an approach to network security that protects against new and emerging threats while enhancing network visibility and control. Cisco’s proven email and web security products protect 50 percent of Fortune 1000 companies, more than 20 percent of the world's largest enterprises, and eight of the 10 largest Internet service providers.
Tags : email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway, security
     Cisco
By: Cisco     Published Date: Sep 15, 2014
Mitigating Email Threats White Paper: Protect your content with these security measures for inbound and outbound email. Mitigating Web Threats White Paper: Learn about web security options for on-premises, cloud, hybrid, and virtual deployments.
Tags : email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway, mitigate, cloud, hybrid, on-premises
     Cisco
By: MessageLabs     Published Date: Jul 16, 2009
What you don't know can destroy your business. It's hard to imagine modern business without the internet but in the last few years it has become fraught with danger. Internet crooks are the dotcom entrepreneurs of crime, using the power of computers and the interconnections of the network against innocent businesses to make money. Learn more today!
Tags : messagelabs, email security, web security, virus, spam, spyware, phishing
     MessageLabs
By: Thawte     Published Date: Oct 06, 2015
The cost of cybercrime in the UK has reached a staggering £27bn – but what’s the actual threat to your business? From data breaches, phishing and spam, to identity theft, malware and vulnerabilities - learn how they can damage your business and the steps you can take to protect yourself.
Tags : cybercrime, business threats, phishing and spam, identity theft, security
     Thawte
By: Thawte     Published Date: Oct 06, 2015
40% der deutschen Unternehmen sind in den vergangenen zwei Jahren Opfer von Internetkriminalität geworden. Doch wie genau wird Ihr Unternehmen bedroht? Von Datenlecks, Phishing und Spam bis hin zu Identitätsdiebstahl, Malware und Schwachstellen: Informieren Sie sich über die möglichen Auswirkungen dieser Bedrohungen auf Ihr Unternehmen und geeignete Schutzmaßnahmen in unserem neuen Leitfaden von Thawte.
Tags : cybercrime, business threats, phishing and spam, identity theft, security
     Thawte
By: Thawte     Published Date: Oct 06, 2015
Au Royaume-Uni, le coût de la cybercriminalité a atteint le chiffre record de 27 milliards de livres. Mais quelle est la menace réelle pour votre entreprise? Violations de données, usurpation d’identité, phishing, spams, malwares, vulnérabilités... découvrez l’ampleur du risque et les mesures à prendre pour vous protéger.
Tags : cybercrime, business threats, phishing and spam, identity theft, security
     Thawte
By: Thawte     Published Date: Nov 12, 2011
In this guide, you'll learn more about Phishing and how SSL and EV SSL technology can help protect your site, your business and ultimately, your bottom line.
Tags : phishing scams, anti-phishing, social engineering, certificate authority, ssl certificates, ssl security, extended validation, geotrust
     Thawte
By: GeoTrust     Published Date: Aug 09, 2013
Do you know if you or your customers are being sent phishing emails? Others may be trying to acquire information and by taking the first step to reading this white paper may just help stop any kind of phishing.
Tags : nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution, phishing, website protection, phishing scams, sensitive information, extended validation, validation, ssl technology, spam, scam, ev ssl, safety threats, ecommerce
     GeoTrust
By: GeoTrust     Published Date: Aug 09, 2013
As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution, website protection, sensitive information, extended validation, validation, ssl technology, ev ssl, safety threats, ecommerce, online threats, online security, certificates, network connection
     GeoTrust
By: GeoTrust     Published Date: Oct 06, 2014
As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : ssl, website security, scammers, identity theifs, cybercriminals, secure sockets layer, credibility, security
     GeoTrust
By: GeoTrust     Published Date: Oct 06, 2014
Phishing scams are a serious problem around the world. The number of attacks – and their level of sophistication – has skyrocketed in recent years. If you have a website and do business online, you are probably at risk. Fortunately, there is an effective way to protect your customers, your company and your brand from phishing: SSL and Extended Validation (EV) SSL. In this guide, you’ll learn more about Phishing and how SSL and EV SSL technology can help protect your site, your business and ultimately, your bottom line.
Tags : phishing scams, web protection, customer protection, attacks, ssl, ev ssl, security
     GeoTrust
By: Thawte     Published Date: Oct 06, 2014
In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.
Tags : 
     Thawte
By: Symantec     Published Date: Dec 04, 2014
As one of the top cyber crime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years.
Tags : phishing, cyber crime, internet fraud, phishing schemes, hacker, fraud alert, phishing kits, security
     Symantec
By: Symantec     Published Date: Dec 04, 2014
The fear of fraud, spoofing, phishing, identity theft, and lax website security have a sizeable percentage of consumers wary of using credit cards online.
Tags : spoofing, phishing, identity theft, lax website, cybercrime, norton, security
     Symantec
By: Aladdin     Published Date: Aug 21, 2009
The Spyware Neutralizer is a clientless add-on tool for the eSafe content security solution from Aladdin Knowledge Systems. Client-side software installation and without the need to implement, manage, or update any client-side software or agents.
Tags : phishing, security management, anti spyware, malware, security software, network management, remote access, remote network management, aladdin
     Aladdin
By: Secure Computing     Published Date: Nov 20, 2006
Spammers have now fired a new barrage of image spam using randomized images that appear identical to the human eye, yet appear to be entirely unique to most anti-spam software. Many of the changes to the images contained within spam messages are so subtle that they require a pixel-by-pixel examination of the image in order to detect the differences.  Read how Secure Computing effectively addresses this problem.
Tags : security, anti spam, email security, image spam, malware, spyware, crimeware, intrusion prevention, it management, phishing, secure computing, securecomputing
     Secure Computing
By: Perimeter     Published Date: Jul 17, 2007
Download this free paper about read about identity protection services and how it can help fortify the trust that customers place on their Financial Institutions.
Tags : financial institution, privacy, consumer, consumer privacy, data protection, cardholder data, pci, compliance, security, personal data, perimeter, phishing, pharming, perimeter esecurity
     Perimeter
By: COMDOM Software     Published Date: Aug 09, 2007
This paper provides an overview of costs of spam facing large organizations, such as multinational enterprises, universities, and governments, as well as small and medium sized businesses that own or operate networks used by employees and other end users.
Tags : spam, bayesian, filter, filtering, block, blocking, spamming, phishing, total cost of ownership, tco, messaging, email, email security, mail server, mail servers, comdom, comdom software
     COMDOM Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com