Showing 6 results for: 2013 ×Hackers ×

12 of the biggest things Trustwave did in 2013

This past year was an eventful one for Trustwave – as it was for the entire information security industry. As data breaches rolled on, malware advanced and compliance requirements stiffened, Trustwave responded with updated products and services, stronger-than-ever intelligence and expertise, and unwavering curiosity.

Two million stolen passwords: How to protect yourself

This week Trustwave security researchers uncovered a criminally controlled web server that contains nearly two million stolen account usernames and passwords for many popular sites, including Facebook, Twitter, LinkedIn, Google and Yahoo. Over the past few days, news outlets worldwide have reported on the discovery, and many people, including our customers, have questions about the malware, its impact and how they can protect themselves.

Ebook: Inside A Hacker's Playbook -- 10 Targeted Techniques That Will Break Your Security

As criminal hackers come up with more and more ingenious ways to take over Internet users' devices, break into corporate networks and steal sensitive information, keeping track of their methods becomes harder every day. How do they do research about their victims? What tactics do they use to home in on their targets to steal specific information? How do they keep themselves under the IT security radar?

Now an iBook! 2013 Trustwave Global Security Report

The report reveals eye-opening findings about global data breaches and security trends. Throughout 2012, Trustwave compiled data from 450 global data breach investigations, more than 2,500 penetration tests, as well as extensive research and analysis of zero-day security threats, Web application attacks, network and vulnerability scans, and malicious websites.

Threat Trends Webinars Highlight Latest Security Research

It’s clear from the customer conversations we’ve been having so far in 2013 that IT and security organizations around the world are really getting things into high gear - rolling up their sleeves and getting ready to evaluate or implement the technology solutions that will help them better secure their organizations in 2013.