scareware

Results 1 - 4 of 4Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Feb 06, 2013
How do rogue programs work - and how do you protect yourself and your business? Three best practices to keep these unwanted programs out of your networks.
Tags : 
fake alerts, fake anti-virus, rogue programs, rogue applications, scareware, endpoint url filtering, web gateway, anti virus, anti spam, anti spyware, application security, internet security, intrusion detection, intrusion prevention, policy based management, security management, security policies, vulnerability management
    
McAfee
Published By: McAfee     Published Date: Nov 12, 2014
This paper discusses key issues organizations should address in the context of cybercrime carried out through email, and practical advice on what organizations should do to protect themselves.
Tags : 
osterman research, cybercriminals, cybercrime, email-based malware, spearphishing, short urls, advanced persistent threats, phishing emails, man-in-the-middle attacks, spam, botnets, ransomware, scareware, mcafee email protection, security, it management, business intelligence
    
McAfee
Published By: Symantec     Published Date: Apr 04, 2013
This white paper discusses the malware threat, the potential impact on your business, and how to protect your company and your customers by using code signing.
Tags : 
malware, anti-virus, spyware, scareware, anti-malware, cyber criminals, code signing, security, anti spam, anti spyware, anti virus, auditing, compliance, email security, encryption, firewalls, high availability, identity management, internet security, intrusion detection
    
Symantec
Published By: Symantec     Published Date: Oct 02, 2012
Protect Your Brand Against Today's Malware Threats with Code Signing
Tags : 
malware, threats, code, signing, scareware, protect your brand
    
Symantec
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.