Spyware

Beginner's Guides: Spyware Protection and Removal

View Whitepaper

Learn how to protect yourself by removing software that keeps tabs on you.

Back to Top

Trojans and How to Protect your Network against Them

View Whitepaper

This white paper outlines what trojans are and why they pose a danger to corporate networks. As early as 2001, an eWeek article reported that tens of thousands of machines are infected with trojans. This is still the case today - and the use of more sophisticated technology makes them all the more alarming: trojans can be used to steal credit card information, passwords, and other sensitive information, or to launch an electronic attack against your organization.

Back to Top

The Spying Game: How Spyware Threatens Corporate Security

View Whitepaper

Learn how spyware threatens network security, the frequency of spyware infections and the ways spyware is downloaded. Methods of protecting computers and networks are also explored.

Back to Top

Whose Computer is This?

View Whitepaper

This article details common challenges with spyware and popups, and frustrations users may experience in trying to uninstall common spyware programs without assistance.

Back to Top

Spyware Wake-Up Call

View Whitepaper

Though some may dismiss the threat of spyware, this article details how almost every unprotected internet user has spyware. It details the different possible effects of spyware: compromised privacy, more spam email, and decreased network resources.

Back to Top