Internal threats now pose a major problem in terms of IT security. In order to protect corporate systems and data, it’s vital to understand what constitutes an internal threat. This section provides a brief introduction.
Insiders are an internal threat as they play a key role in data leaks. Learn more about the types of people who are involved in data leaks and their motivation, and how to mitigate the threat.
It’s essential to keep business-critical data secure. This section provides easy-to-follow recommendations which will help prevent data leaks and protect your business against insider threats.
Apr 11 2013
The favorite tool of the attackers has been malicious program we called "Winnti". It has evolved since the first use, but we divide all variants into two generations: 1.x and 2.x. Our publication describes 1.0 variant of this tool.
Aug 23 2010
The majority of the biggest malware incidents that took place in the second quarter of 2010 were linked in some way to botnets. New bots were created and existing bots further developed, such as TDSS, an article on which has been published by our virus analysts, and Zbot (ZeuS), which we discuss...
Mar 15 2010
InfoWatch presents the latest analytical study of reported incidents in the field of confidential data leaks. The study is targeted at security experts. This report is based upon the leak database maintained by InfoWatch analytical center since 2004.
Apr 07 2008
The InfoWatch analytical centre presents a summary of the past year’s internal IT-security incidents around the globe
Aug 20 2007
Instant messaging (IM) has its origins in low-level, John-to-Judy communications. John can’t do his assignment. He dashes off a five-word message to Judy who punts him the right answer.
25 Apr, 15:44 GMT
11 Apr, 13:21 GMT
04 Apr, 08:06 GMT
10 Dec, 11:34 GMT
18 Oct, 13:03 GMT
11 Oct, 14:33 GMT
10 Oct, 11:41 GMT