July 6, 2005
Preventing Malicious Spyware in the Enterprise
Guest writes "Spyware threats are becoming more sophisticated; hackers are finding ways to lodge key logging, backdoor programs and trojans onto more desktops. However, anti-spyware tools have not kept up with this increased complexity. This white paper reviews the major technology approaches to spyware: signature and rules-based methods and points out the strengths and weaknesses of these approaches. The white paper aims to help admins critically assess the claims of spyware tools when they say they are "enterprise-strength"."