spyware - News, Features, and Slideshows
A group of hackers known for past cyberespionage attacks against the U.S. Defense Industrial Base, as well as companies from the electronics and engineering sectors, has recently started using a backdoor program to target Mac OS X systems.
By Lucian Constantin | 06 September, 2014 01:38
Cybercriminals are increasingly infecting computers with malware that resides only in memory in order to make their attacks harder to detect.
By Lucian Constantin | 03 September, 2014 04:17
Attackers deploy Web-based reconnaissance tool to gather information about potential targets in different industries
By Lucian Constantin | 02 September, 2014 02:39
The cybercriminal gang behind the Kelihos botnet is tricking users into installing malware on their computers by appealing to pro-Russian sentiments stoked by recent international sanctions against the country.
By Lucian Constantin | 27 August, 2014 01:47
Whitepapers about spyware
In 2010, the threat posed by the web is sharper and more extensive than ever before. Almost any website can now host malware, or forward you to one that does. Indeed, an infection is much more likely to result from a visit to a perfectly legitimate website that has been compromised with a virus or spyware – than from one set up specifically to spread malware. Read More.
BIG-IQ Security makes it easy to manage the entire firewall policy life cycle. Read about the key benefits and download the policy auditing and security compliance report today
- FTSenior Media TraderNSW
- FTDigital Account Manager X 3 | Display + Video advertisingNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTCampaign Managers| RTB / Programmatic | Expression of InterestNSW
- FTMedia Planner Buyer - Media Trader OpportunitiesNSW
- FTSearch Account ManagerNSW
The megatrends of consumerisation are forcing organisations to adapt. This whitepaper looks at why enterprise mobility programs must be underpinned by a solid strategy to reap the benefits of this disruptive technology and avoid the pitfalls. • While most global analyst firms report Enterprise Mobility as a critical initiative, the majority of businesses do not have a comprehensive strategy in place • Organisations should take a selective approach to adopting disruptive technologies , aligning their cultural needs, business imperatives and IT requirements • IT departments have to support a constantly evolving, fragmented operating system environment and device landscape
- Google lets Apps users bypass admins and install third-party Marketplace tools
- The kill switch is here: iOS 8 enables it by default
- Reports of another wave of layoffs rekindle bad press for Microsoft
- AT&T to put service setup in enterprise customers' hands
- MIT's Cheetah robot is off its leash, running and jumping
- Scary video highlights danger of damaged Lithium Ion batteries
- Have a spare $9,000? Join Facebook for the rich
- iOS app devs warn customers off iOS 8's iCloud Drive
- Qlik courts the business manager with easier analytics
- iOS 8 is here -- and it's all over your network
- PGP creator, other top cryptographers head 2014 National Cyber Security Hall of Fame class
- Steve Jobs' office at Apple remains exactly as he left it
- Apple releases iOS 8, starts serving upgrade downloads
- What is Metacloud and why did Cisco buy it?
- Dropbox upgrades API for its lightweight app databases