Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

Home > Perimeter E-Security > Guide to Malware and Attack Methods

Guide to Malware and Attack Methods

White Paper Published By: Perimeter E-Security
Perimeter E-Security
Published:  Oct 21, 2010
Type:  White Paper
Length:  3 pages

Malware has been used to execute the largest and most well known data security breaches including Heartland Payment Systems, Hannaford, TJX, and many others. Malware costs organizations hundreds of millions of dollars every year. Malware is the biggest problem in information security. With firewalls, intrusion detection and prevention systems and a host of other network or edge based security solutions, hackers have for the last several years moved to more subversive attacks that attempt to compromise the end user system directly. Read the guide to learn more about the popular methods these criminals are using to compromise internal systems.

Tags : 
malware, malicious website, firewalls, ids/ips, web content filtering, gateway av, network security solutions, host-based ips