Sponsor: Sophos

Malware B-Z: Inside the Threat From Blackhole to ZeroAccess

This paper provides insight into two of the most commonly used and technically capable pieces of crimeware, the Blackhole exploit kit and the ZeroAccess rootkit. We explain why these kits are so useful to the bad guys and show you how you can stop these threats from infecting your network and your users.
Get Whitepaper

Mobile Device Management Buyers Guide

Mobile device management (MDM) solutions allow IT organizations to centrally manage, monitor and support mobile devices from smartphones to tablets. By using an MDM solution to control and protect the data and configuration settings on users' mobile devices, you can reduce support costs and security risks. In this guide, you'll learn what you need to consider to find a MDM solution that best fits your needs.
Get Whitepaper

Security Threat Report 2013

In 2012, we saw attackers extend their reach to more platforms, from social networks and cloud services to Android mobile devices. We saw the most sophisticated malware authors up the stakes with new business models and software paradigms while conventional attackers continued to target thousands of badly-configured websites to deliver malware. What does 2013 hold?
Get Whitepaper