Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Spyware

Below you will find reports with the tag of “Spyware”

image from Cybercrime against Businesses, 2005

Cybercrime against Businesses, 2005

This article, edited in 2008, compiles a list of cyber crimes that impacted business in 2005.

Added: October 25, 2018
image from The Impact Of Customer Journey Hijacking Q4 2017

The Impact Of Customer Journey Hijacking Q4 2017

This report provides an overview of online journey hijacking based on an analysis of 500 million page views per day from top e-commerce sites across all product categories.

(more available)
Added: October 24, 2018
image from Threat Advisory: Anato

Threat Advisory: Anato

This is a threat advisory for Anato

Added: October 23, 2018
image from The Current State Of Mobile Malware

The Current State Of Mobile Malware

This report will take you through the most common malware infection vectors, the different types of mobile malware currently plaguing organizations, and how to take the appropriate steps to protect your mobile estate.

(more available)
Added: October 22, 2018
image from Untangling CIPA

Untangling CIPA

This paper takes a look at the Children’s Internet Protection Act.

Added: October 19, 2018
image from GTIC Monthly Threat Report February 2018

GTIC Monthly Threat Report February 2018

This monthly threat report takes a look at the month of February 2018. Specifically, it looks at how Agent Tesla works, cryptocurreny malware, ransomware’s refusal to die, and Turla APT updating their malware after public advisories.

(more available)
Added: October 16, 2018
image from Tracking Trends In Business Email Compromise

Tracking Trends In Business Email Compromise

This report takes a look at Business Email Compromise attacks and examines why the FBI was able to report that it has become a billion dollar industry.

(more available)
Added: October 16, 2018
image from Underground Hacker Markets

Underground Hacker Markets

For our 3rd Annual Underground Hacker Markets Report, Dell SecureWorks engaged two of our top intelligence analysts from our CISO INTEL Team. The team members spend time tracking hackers on the numerous underground hacker forums and marketplaces all over the world. While much of the cybercrime hitting organizations throughout the world is the result of cooperation by hackers working outside the confines of publicly-accessible marketplaces, these underground forums provide a small window into the world cybercriminals occupy. In this report, we concentrated on marketplaces located on the Russian Underground and on English-speaking marketplaces between Q3 2015 and Q1 2016.

(more available)
Added: October 16, 2018
image from 2017 Midyear Cybersecurity Report

2017 Midyear Cybersecurity Report

This midyear report details two dynamics undermining the successes of the cybersecurity landscape. “Our security experts are becoming increasingly concerned about the accelerating pace of change—and yes, sophistication—in the global cyber threat landscape. That is not to say defenders are not improving their ability to detect threats and prevent attacks, or to help users and organizations avoid or recover more quickly from them. But we see two dynamics undermining their hard-won successes, hindering further progress, and helping to usher in a new era of cyber risks and threats…”

(more available)
Added: October 15, 2018
image from Beware Of The 64-Bit Malware

Beware Of The 64-Bit Malware

The 64-bit Windows operating system is increasing its market share and becoming the prevalent system in most business environments. Its growing popularity is also attracting more attackers and slowly reshaping the Windows threat landscape. Cybersecurity teams must gain a deep understanding of 64-bit systems, and the different malware variants that can infiltrate and attack them, especially as the threat expands into additional operating systems, such as Linux and macOS.

(more available)
Added: October 15, 2018
image from White Hat, Black Hat, And The Emergence Of Gray Hat: The True Costs Of Cybercrime

White Hat, Black Hat, And The Emergence Of Gray Hat: The True Costs Of Cybercrime

According to this report, the attractions and profitability of the digital underworld are leading some security practitioners to become ‘gray hats’ and get involved in cybercrime.

(more available)
Added: October 15, 2018
image from The Future of Cybercrime and Security

The Future of Cybercrime and Security

From the report, “This research will present some general trends in cybercrime, as well as indicating the potential global cost of malicious software use. It will discuss specific threats to financial and device-based businesses, as well as providing analyses of the current and future trends in cybercriminal activity, alongside general advice on how to prevent and/or minimise the impact of cybercrime.”

(more available)
Added: October 14, 2018
image from Cyber Threats To The Education Industry

Cyber Threats To The Education Industry

Understand the cyber threats targeting the education industry, including subsectors impacted by advanced threat groups.

Added: October 13, 2018
image from The NTT Security 2018 Global Threat Intelligence Report

The NTT Security 2018 Global Threat Intelligence Report

The NTT Security 2018 Global Threat Intelligence Report highlights notable threats, incidents and trends observed during the previous year.

Added: October 12, 2018
  • ««
  • «
  • 1
  • 2
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 20:08 UTC (build b1d7be4)