Superguide: the death of 'trusted' Web sites?

Summary:The explosion in drive-by download attacks continues to grow. How has the situation got so dangerous? Are there any "trusted" Web sites left?

Features

  • 2007: How was it for security?

    Security researchers worked overtime in 2007, which turned out to be a nightmare for software vendors from day one. In January alone, Apple, Google, Microsoft and Adobe were just some of the household names embarrassed for leaving gaping holes in their products.

  • Developers must take personal responsibility: Gartner

    We sat down with security analyst Andrew Walls at Gartner ITExpo and asked him how Web 2.0 affects application security.

Whitepapers

  • BitDefender: Proactive security – IT body armour against

    Defending against today's diverse array of security risks can be an enormous drain on corporate resources; especially for emerging and growing businesses which need to protect themselves against exactly the same threats as large scale enterprises, but with only a fraction of the IT resources.

  • BitDefender: Emerging Threats to Business Security

    Now more than ever, businesses need to be concerned about the security of their networks. The number, variety and strength of the threats to computer and network security have dramatically increased and businesses need to be prepared against an ever-changing landscape of malware attacks.

  • Sophos: Security Threat Report 2008

    A recent survey showed that only 30 percent of computer users thought that 2008 would be a better year for internet security. Despite vast improvements in technology, hackers have responded by upping their game. Their main focus remains financial gain, and new methods to steal from users and companies continue to emerge. The Sophos security threat report talks about recent attacks and gives predictions and advice for 2008.

  • Sophos: Unauthorised applications: Taking back control

    Employees installing and using unauthorised applications like Instant Messaging, VoIP, games and peer-to-peer file-sharing applications cause many businesses serious concern. This paper looks at why it is important to control such applications, discusses the various approaches, and highlights how integrating this functionality into malware protection is the simplest and most cost-effective solution.

  • McAfee: Patching: Is It Always With the Best Intentions?

    Over the years malicious software has attempted every trick in the book when it comes to hooking into an operating system not only to remain persistent at the time of execution but also beyond system reboots. This paper will describe how hooking into the operating system has changed over the years, including some examples of the most 'Interesting' methods from MS DOS, early Windows versions and present-day contemporary methods.

  • CA: Protect Your Family Against Today's Internet Threats

    Internet crime is big business. A decade ago, writing harmful software was largely driven by individual hackers' desire for recognition. Today, profit is the clear motive. Organised groups of criminals create the tools and the distribution mechanisms for a wide variety of harmful software that can be used in criminal enterprises. Their software perpetrates harm well beyond offensive photos or annoying pop-up ads. They can steal one's passwords, draining the bank account or running up one's kid's online gaming bill.

  • MessageLabs: Solving Business Threats Caused by Improper Use of the Internet by Employees

    Employees spend many hours on the Internet, and much of the time isn't used for their work. A recent study by Salary.com and America Online found that US employees squander an average of two hours of company time online every day, time that costs their companies $759 billion annually. Employers face serious problems with employees' improper use of the Internet, including viruses from downloads of software and other materials found online.

  • IBM: Cyber Attacks On The Rise: IBM 2007 Midyear Report

    So far 2007 has been a very interesting and unexpected year on many security fronts. The IBM Internet Security Systems X-Force research and development team discovered, analysed and recorded new vulnerabilities and the status of varying threats throughout the first six months of this year. That data is compiled in this report.

Topics: Google, Browser, Malware, Security

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Related Stories

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.