• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

spam

Results 151 - 175 of 205Sort Results By: Published Date | Title | Company Name
By: Symantec     Published Date: Aug 09, 2013
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks. Learn more.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
By: Symantec     Published Date: Oct 07, 2014
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks.
Tags : 
intelligence, cyber security, threats, trends, malware, spam, business risks, security
    
Symantec
By: Symantec     Published Date: Nov 21, 2014
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks. Key Findings • The .doc file type was the most common attachment type used in spear-phishing attacks, making up more than 52.9 percent of all attachments in September. • The largest data breach reported in September actually took place in April, and resulted in the exposure of 56 million identities. • There were 600 vulnerabilities disclosed in the month of September, the highest number so far in 2014 and second-highest in the last 12 months.
Tags : 
cyber security threats, harmful business risks, malware, spam, intelligence team, security
    
Symantec
By: Symantec     Published Date: Jan 11, 2013
Threats to online security have grown and evolved considerably in 2012. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors.
Tags : 
symantec, internet security, cyberattacks, cyber attacks, phishing, spam, malware, online theft, online threats, data security, business security, web attacks, network security, backup and recovery, anti spam, anti spyware, anti virus, email security, firewalls, hacker detection
    
Symantec
By: Symantec     Published Date: Jan 15, 2014
This year’s ISTR once again covers the wide-ranging threat landscape, with data collected and analyzed by Symantec’s security experts. In this summary, we call out seven areas that deserve special attention.
Tags : 
symantec, cyberespionage, mobile security, mobile device security, threat report, cyberattacks, cyber attacks, data protection, spear phishing, phishing, spam, virus, malware, hackers, cyber criminals, internet security, network security, anti spam, anti spyware, anti virus
    
Symantec
By: Symantec     Published Date: Jul 28, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security, security
    
Symantec
By: Symantec     Published Date: Jul 29, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security, website protection, website threats, symantec, norton
    
Symantec
By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security, security
    
Symantec
By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security, security
    
Symantec
By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security, security
    
Symantec
By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security, security
    
Symantec
By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security, security
    
Symantec
By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security, security
    
Symantec
By: Symantec.cloud     Published Date: Apr 27, 2010
Spammers reach new heights of inventiveness and professionalism. Understand the latest spam threat.
Tags : 
messagelabs intelligence, symantec hosted services, spam threat, web security services, security safeguard, anti spam, anti spyware, anti virus, security management, web service security
    
Symantec.cloud
By: Symantec.cloud     Published Date: Aug 10, 2010
This paper will discuss how the Internet bandwidth is a finite and expensive resource that needs protection from spammers, criminals, hackers, time-wasters and employee misuse.
Tags : 
messagelabs us, symantec hosted services, internet bandwidth, security, data protection, employee misuse, security safeguard, employee monitoring, bandwidth management, anti spam, anti spyware, anti virus, employee monitoring software
    
Symantec.cloud
By: Symantec.cloud     Published Date: Aug 10, 2010
This industry report covers the email gateway market. Gartner, Inc. positions Gartner in the Leaders quadrant in its 2010 Magic Quadrant for Secure Email Gateways (anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention).
Tags : 
messagelabs, hosted symantec services, gartner magic quadrant, secure email gateway, anti-spam, anti-virus, email encryption, intrusion prevention, phishing detection, security as service, secaas, anti spam, anti spyware, email security, encryption, intrusion detection, phishing
    
Symantec.cloud
By: Symantec.cloud     Published Date: Aug 10, 2010
This paper will discuss the history and progression of the modern Trojan attack. It will explore the methodology used by hackers in selecting a target and developing a compelling attack and will cite several examples of some successful targeted Trojans.
Tags : 
messagelabs, symantec hosted services, malware, trojan attack, email guard, spam, anti spam, anti spyware, anti virus, email security, security management
    
Symantec.cloud
By: Symantec.cloud     Published Date: Sep 01, 2010
This is the second part of a three-part white paper series. Part 2 describes how organizations can develop a security profile for themselves that will show them which of the Stage 1 controls they most need to build up and strengthen.
Tags : 
messagelabs us, it security, smb, security profile, anti virus, anti spam, firewalls, vulnerability, encryption, identity management, vulnerability management
    
Symantec.cloud
By: Symantec.cloud     Published Date: Jan 28, 2011
In this new MessageLabs whitepaper, learn about the latest spammer ploy to get dangerous links past traditional defenses, and how MessageLabs delivers a proven, cost-effective solution.
Tags : 
symantec cloud, search engine link spam, messagelabs, viruses, trojans, spyware, phishing, url, universal resource locator, anti spam, anti spyware, anti virus, cloud computing
    
Symantec.cloud
By: Thawte     Published Date: Oct 06, 2015
The cost of cybercrime in the UK has reached a staggering £27bn – but what’s the actual threat to your business? From data breaches, phishing and spam, to identity theft, malware and vulnerabilities - learn how they can damage your business and the steps you can take to protect yourself.
Tags : 
cybercrime, business threats, phishing and spam, identity theft, security
    
Thawte
By: Thawte     Published Date: Oct 06, 2015
40% der deutschen Unternehmen sind in den vergangenen zwei Jahren Opfer von Internetkriminalität geworden. Doch wie genau wird Ihr Unternehmen bedroht? Von Datenlecks, Phishing und Spam bis hin zu Identitätsdiebstahl, Malware und Schwachstellen: Informieren Sie sich über die möglichen Auswirkungen dieser Bedrohungen auf Ihr Unternehmen und geeignete Schutzmaßnahmen in unserem neuen Leitfaden von Thawte.
Tags : 
cybercrime, business threats, phishing and spam, identity theft, security
    
Thawte
By: Thawte     Published Date: Oct 06, 2015
Au Royaume-Uni, le coût de la cybercriminalité a atteint le chiffre record de 27 milliards de livres. Mais quelle est la menace réelle pour votre entreprise? Violations de données, usurpation d’identité, phishing, spams, malwares, vulnérabilités... découvrez l’ampleur du risque et les mesures à prendre pour vous protéger.
Tags : 
cybercrime, business threats, phishing and spam, identity theft, security
    
Thawte
By: TIBCO Software     Published Date: Aug 14, 2018
Increasing your non-interest revenues without increasing customer fees that ultimately drive customers away can be a challenge. The digital economy is opening up new ways to drive additional revenue from existing customers. The same technical innovations are also opening up new ways to communicate with customers about both digital and traditional offerings. But that results in customers becoming overwhelmed with advertising and marketing messages. They are forced to decide upfront who is providing relevant information and who to completely ignore. Ultimately, it comes down to trust. Customers consider generic messages to be spam and learn to filter them out, even if they come from a known vendor. Over the long run, these types of marketing campaigns not only see diminishing returns, they can even damage your long-term relationship with customers and decrease revenues. Micro-marketing overcomes the noise that traditional spam-marketing creates and establishes news levels of trust betwee
Tags : 
    
TIBCO Software
By: Topica     Published Date: May 12, 2011
This whitepaper will look into the areas of cost, time and reliability to prove in a simple manner that the benefits of outsourcing a company's email marketing outweigh those of starting an in-house solution.
Tags : 
topica, email marketing, email marketing help, email marketing for businesses, choosing an esp, cost analysis for esp, can-spam compliance, in-house marketing solution, email marketing cost reduction
    
Topica
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter