The W32.Qakbot Worm - Stealing Online Banking Information
W32.Qakbot is a worm that has been seen spreading through network shares, removable drives, and infected webpages, and infecting computers since mid-2009. Its primary purpose is to steal online banking account information from compromised computers.
Protecting Users From Firesheep and Sidejacking Attacks
The recently released Firesheep Wi-Fi attack tool - which puts devestating identity theft attacks within reach of even casual hackers - means user-mistrust of unprotected HTTP connections is growing fast. Download this paper to learn more about Firesheep and how you can protect your users' online data.
The Changing World of Threats
Online criminals, industrial spies and fraudsters are constantly developing new ways to bypass conventional security defences and make money. In the last year, virtually every company suffered at least one IT security incident. Smaller companies are often targeted for industrial espionage because they are part of a larger company’s supply chain or because attackers can use emails from one company to infect another- on average companies suffered 45 of these very incidents. However, it’s the cost of dealing with these problems that is truly shocking; the average cost of the worst incident was £280-690,000. Download the white paper today to find out more about the changing world of threats.
Remote Workers & Mobility - Managing the Risk
"Remote workers are “always on,” surfing the Net, communicating with colleagues, accessing applications - much of which happens outside the protection of the corporate network. Undoubtedly this brings benefits. But it is also difficult for IT to enforce policies and safeguard electronic interactions. Download this paper to learn about the latest challenges for securing remote workers and how to protect your employees."
Securing the Cloud for the Enterprise
The arrival of cloud computing is changing the landscape for information technology more completely than any trend or innovation since the advent of the Internet fifteen years ago. There are various approaches to cloud computing - public or private, platform or infrastructure - but all of them require new thinking about how the use of the cloud will impact an organization's compliance and security posture. How do IT strategists and decision-makers strike a balance between the tremendous potential of cloud computing and the security required to protect newly exposed information assets?
Ponemon The UK 2010 Cost of a Data Breach Report
Compliance pressures, cyber attacks targeting sensitive data drive leading IT organisations to sometimes pay more than necessary.
Symantec 2010 Critical Infrastructure Protection Study - Global: October 2010
Cyberattacks have been a fact of life for companies for decades. But terrorists or foreign governments with specific there exists a special class of attack: Cyberattacks that are initiated by political goals in mind. For example, the Stuxnet worm that targeted energy companies around the world represents a recent example of a threat designed to spy on and reprogram industrial control systems. Many countries are pursuing Critical Infrastructure Protection (CIP) initiatives aimed at working with industry to address these threats.
Symantec Internet Security Threat Report Volume 16: Trends for 2010
The Symantec Internet Security Threat Report is one of the most comprehensive sources of Internet threat data in the world. Symantec’s analysts have access to unparalleled sources of data with which to identify, analyze, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. The Symantec Internet Security Threat Report gives enterprises and consumers the essential information they need to secure their systems effectively – now, and into the future.
Raporty firmy PassMark