347 Results for:spyware

  • Sort by: 

Definitionspyware

Spyware is a type of malicious software -- or malware -- that is installed on a computing device without...Read More

7 questions to ask before you select software testing tools

By Matt Heusser, Michael Larsen 13 Apr 2020

Before you select software testing tools, you need to know how to evaluate them. Explore trial versions, research the vendors and assess your organization's needs and capabilities. Read More

Telegram zero-day exploit is a warning

By Warwick Ashford 14 Feb 2018

The discovery of an exploit of a zero-day vulnerability in the Telegram messaging app demonstrates that not all “secure” apps are automatically safe, security experts have warned Read More

Why nation-state cyberattacks must be top of mind for CISOs

By Johna Till Johnson 01 May 2020

Even though organizations face threats coming from many sources, one type of cyberattack should be top of mind for CISOs: those backed by nation-states. Here's why. Read More

How can you deal with all the new macOS security controls?

By Jon Towles 08 Nov 2018

How to deal with KEXT whitelisting and TCC controls, and how to stay up to date on the latest developments. Read More

Four Windows 10 built-in security features to know

By John Powers 12 Apr 2018

IT needs an effective plan to maximize security for Windows 10 and get the most out of its built-in features. Read More

How do source code reviews of security products work?

By Michael Cobb 29 Nov 2017

Tensions between the U.S. and Russia have led to source code reviews on security products, but the process isn't new. Expert Michael Cobb explains what to know about these reviews. Read More

The various offers of Microsoft System Center Endpoint Protection

By Ed Tittel 31 Jul 2017

Expert Ed Tittel examines System Center Endpoint Protection, Microsoft's native Windows antivirus and antimalware security product. Read More

Contact tracing: The privacy vs protection debate

By Peter Ray Allison 05 May 2020

The Covid-19 pandemic has necessitated extreme measures not seen in peacetime for over 100 years. Contact-tracing apps are being developed as a tool for managing the pandemic, but are they a step too far? Read More

Fortnite will require Android users to allow unknown sources. Time to rethink MTD and EMM policies?

By Jack Madden 14 Aug 2018

If consumers get in the habit of installing Android apps from unknown sources, some of our assumptions around Android BYOD, management, and security will have to change. Read More

10 endpoint security products to protect your business

By Linda Rosencrance 23 Apr 2019

Check out this product roundup and discover all the features endpoint security protection offers, such as patch management, email protection and reporting. Read More