• endpoint security

    Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted.

  • IPsec (Internet Protocol Security)

    IPsec (Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing layer of network communication.

  • PDF document security: Inside Google Chrome PDF viewer

    You don't have to rely on Adobe's Acrobat Reader as your only PDF viewer; Google Chrome provides a secure PDF viewer that cuts down on your chances of falling victim to a PDF exploit.

  • SecTor 2010: Malware samples used in targeted attacks

    Security researchers from Trustwave's Spiderlabs research team demonstrated malware,--including a Windows credential stealer--that uses automated processes to avoid detection and dupe forensics inv...

Antivirus, antispyware management

Email Alerts

Register now to receive SearchMidmarketSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • SEO poisoning (search poisoning)

    Search poisoning, also known as search engine poisoning, is an attack involving malicious websites that are designed to show up prominently in search results. The sites associated with the links may infect visitors with malware or fraudulently access... 

  • endpoint security

    Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted. 

  • IPsec (Internet Protocol Security)

    IPsec (Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing layer of network communication. 

  • risk analysis

    Risk analysis is the process of defining and analyzing the dangers to individuals, businesses, and government agencies posed by potential natural and human-caused adverse events... (Continued) 

  • keylogger (keystroke logger, key logger, or system monitor)

    A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a hardware device or small program that monitors each keystroke a user types on a specific computer's keyboard. As a hardware device, a keylogger is a small battery-s... 

  • clean desk policy (CDP)

    A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office. Most CDPs require employees to clear their desks of all papers at the end of the day. 

  • malware (malicious software)

    Malware (for "malicious software") is any program or file that is harmful to a computer user. 

  • rootkit

    A rootkit is a collection of tools (programs) that enables administrator-level access to a computer or computer network... (Continued) 

  • zombie (bot)

    A zombie (also known as a bot) is a computer that a remote attacker has accessed and set up to forward transmissions (including spam and viruses) to other computers on the Internet. (Continued) 

  • script kiddy (or script kiddie)

    Script kiddy (sometimes spelled kiddie) is a derogative term, originated by the more sophisticated crackers of computer security systems, for the more immature, but unfortunately often just as dangerous exploiter of security lapses on the Internet. 

  • See more Definitions on Antivirus, antispyware management
About Antivirus, antispyware management

Get advice and training for midmarket IT organizations on the removal of malware infections, including computer viruses, worms, Trojans, spyware, adware, spam from endpoint devices, desktops, workstations and servers.