Beginner's Guides: Spyware Protection and Removal
Learn how to protect yourself by removing software that keeps tabs on you.
Trojans and How to Protect your Network against Them
This white paper outlines what trojans are and why they pose a danger to corporate networks. As early as 2001, an eWeek article reported that tens of thousands of machines are infected with trojans. This is still the case today - and the use of more sophisticated technology makes them all the more alarming: trojans can be used to steal credit card information, passwords, and other sensitive information, or to launch an electronic attack against your organization.
The Spying Game: How Spyware Threatens Corporate Security
Learn how spyware threatens network security, the frequency of spyware infections and the ways spyware is downloaded. Methods of protecting computers and networks are also explored.
Whose Computer is This?
This article details common challenges with spyware and popups, and frustrations users may experience in trying to uninstall common spyware programs without assistance.
Spyware Wake-Up Call
Though some may dismiss the threat of spyware, this article details how almost every unprotected internet user has spyware. It details the different possible effects of spyware: compromised privacy, more spam email, and decreased network resources.