Malicious Software White Papers

(View All Report Types)
EFT Server to Replace USB for SCADA; EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture
sponsored by Globalscape
WHITE PAPER: This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally.
Posted: 06 Mar 2014 | Published: 31 Dec 2012

Globalscape

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation

A Comprehensive Guide to the Latest Threat Detection Technologies
sponsored by TechTarget Security
WHITE PAPER: This TechGuide will provide analysis of APT and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

TechTarget Security

When Malware Goes Mobile: Causes, Outcomes and Cures
sponsored by Sophos
WHITE PAPER: This whtie paper will review a step-by-step approach you can take in order to strengthen your abaility to ward of malware attacks and keep mobile data secure. Read on to learn about platform specific policies, effective prevention strategies, and more.
Posted: 23 May 2013 | Published: 17 May 2013

Sophos

No Silver Bullet: Eight Ways Malware Defeats Strong Security Controls
sponsored by IBM
WHITE PAPER: This whitepaper explores 8 ways malware can defeat your security strategy and outlines some key techniques for preventing these intrusions.
Posted: 08 Apr 2014 | Published: 31 Dec 2013

IBM

Deep Security as a Service: Cloud Security for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: Access this white paper to unveil a deep security as a service option that offers scalable protection for the cloud's elastic environment. Click now to see how to get maximum value out of your cloud investment.
Posted: 16 Dec 2013 | Published: 16 Dec 2013

Trend Micro

IT Security. Fighting the Silent Threat
sponsored by Kaspersky
WHITE PAPER: Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.
Posted: 09 Oct 2013 | Published: 09 Oct 2013

Kaspersky

A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
sponsored by FireEye
WHITE PAPER: This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

FireEye

Top Three Mobile Application Threats
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This white paper reveals the top three mobile application threats enterprises today are facing and offers advice on how to mitigate the potential risks. View now to learn more!
Posted: 06 Sep 2013 | Published: 30 Nov 2012

Hewlett-Packard Enterprise

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM