ransomware

Results 151 - 158 of 158Sort Results By: Published Date | Title | Company Name
By: Druva     Published Date: Aug 03, 2016
Ransomware has quadrupled since last year and it is estimated to be reach $1B this year. Gartner Research has outlined best practices to better prepare you for an attack and uncovers how modern backup technologies can help.
Tags : druva, gartner, best practices, technology, backup
     Druva
By: Kaspersky     Published Date: May 11, 2016
You don't have to be a victim of ransomware. Get the facts you need to protect your company.
Tags : kaspersky, ransomware, encyyption, data access, email security, company security
     Kaspersky
By: Blue Coat     Published Date: Nov 23, 2015
When it comes to mobile malware threats, 2015 was a vicious year. While the threats are familiar suspects, their complexity and frequency are at an all-time high, including instances of ransomware and stealthy insertions via spyware on devices. Learn how infections start; simple ways to strengthen corporate defenses; and what the future of mobile threats looks like.
Tags : 
     Blue Coat
By: Kaspersky     Published Date: Jun 15, 2015
Download Kaspersky Labís Unlock the Key to Repel Ransomware to learn common ransomware scenarios and delivery mechanisms.
Tags : kaspersky, ransomware, cybercrime, cyberattack, hackers, data leakage, spam, malware, ransom
     Kaspersky
By: McAfee     Published Date: Nov 12, 2014
This paper discusses key issues organizations should address in the context of cybercrime carried out through email, and practical advice on what organizations should do to protect themselves.
Tags : osterman research, cybercriminals, cybercrime, email-based malware, spearphishing, short urls, advanced persistent threats, phishing emails, man-in-the-middle attacks, spam, botnets, ransomware, scareware, mcafee email protection, security
     McAfee
By: AlienVault     Published Date: Oct 21, 2014
When dealing with ransomware threats like CryptoWall, which encrypt your data and demand payment to unlock it, spotting infections quickly is critical in order to limit the damage. AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the command and control server. Watch this demo on-demand to see how AlienVault USM detects these threats quickly, saving you valuable clean-up time and limiting the damage from the attack.
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
     AlienVault
By: Sophos     Published Date: Mar 26, 2013
Our experts at SophosLabs look in depth at ransomware variants and delivery mechanisms, and show how you can protect your data with a complete security strategy.
Tags : ransomware, sophos, data, protect, security, strategy
     Sophos
By: MX Logic     Published Date: May 21, 2008
Rootkits, Trojans, ransomware, Denial-of-Service and much more – this newly released white paper from MX Logic covers the everchanging security threat landscape. Learn what malicious intrusions are out there, how to identify them and how to keep your network safe.
Tags : botnets, dha, dos, denial of service, queen bot, malware, drive by, storm worm, blended threats, rootkits, trojans, spyware, viruses, virus, worm, worms, polymorphism, push propagation, pull propagation, zero day
     MX Logic
Start   Previous    1 2 3 4 5 6 7     Next   End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com