Software  >  


RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
Malware Multimedia (View All Report Types)
1 - 25 of 67 Matches Previous Page  |  Next Page
Move Away from Traditional Cybersecurity
sponsored by BitDefender
VIDEO: This brief video gives you a glimpse at how your cybersecurity can look to the future instead of remaining stuck in the past.
Posted: 08 Oct 2015 | Premiered: 20 May 2015


Control Security for the Whole Enterprise in One Place
sponsored by BitDefender
VIDEO: This video explains how employing a dedicated management portal for your endpoint security – whether physical, virtual or mobile – can help make your enterprise safer.
Posted: 07 Oct 2015 | Premiered: 19 Feb 2013


Transforming Cyber Security at the University of New Brunswick
sponsored by Trend Micro
WEBCAST: In this informative webcast, David Shipley, Director of Strategic Initiatives, takes you through the challenges of university IT security strategies and how his team closed vulnerabilities at UNB.
Posted: 05 Oct 2015 | Premiered: Sep 23, 2015

Trend Micro

Examining the Hacker's Evolution
sponsored by WhiteHat Security
WEBCAST: This webcast examines how hackers are evolving their techniques to achieve their goals faster and undetected and the top 10 attacks they use. Inside, learn how a risk based approach prioritizes vulnerabilities differently than the "high, medium, low" strategy and why it's imperative to make the switch. View now to learn more.
Posted: 01 Oct 2015 | Premiered: May 6, 2015

WhiteHat Security

An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 01 Oct 2015 | Premiered: Jul 1, 2015

WhiteHat Security

Next Generation Threat Defense: Malware Breaks Past Perimeters
sponsored by Trend Micro
WEBCAST: In this thrilling webcast, watch the drama unfold as one organization relies too heavily on fossil network security measures and falls victim to a data breach despite taking all of the necessary remediation steps such as log audits and sandboxing. View now to learn the strategies to bolster network security and how to rethink your architecture.
Posted: 01 Oct 2015 | Premiered: Sep 2, 2015

Trend Micro

Demo: Guarding against Today's Advanced Attacks
sponsored by Trend Micro
VIDEO: In this demo video, discover how you can revamp your security to guard against today's advanced attacks.
Posted: 29 Sep 2015 | Premiered: 29 Sep 2015

Trend Micro

Stealthy Tactics Define a Russian Network Security Threat Militia
sponsored by FireEye
WEBCAST: This special webinar will guide you through an in-depth analysis of HAMMERTOSS, a stealthy malware used by a cyber-threat group. View now to delve into the specific inner workings of HAMMERTOSS and the 5 stages of its attack.
Posted: 28 Sep 2015 | Premiered: Sep 16, 2015


Operation Clandestine Wolf: A Successful Zero-Day Attack Examined
sponsored by FireEye
WEBCAST: This webcast explores the anatomy of the attack and how APT3 achieved success.
Posted: 25 Sep 2015 | Premiered: Jun 24, 2015


A New Way to Think about Security
sponsored by IBM
VIDEO: This brief video describes why managed security services (MSS) may be the answer to the increasingly complex question of modern security.
Posted: 14 Sep 2015 | Premiered: 07 Apr 2015


Ensuring Your Email Strategy Measures Up
sponsored by ControlEmail
WEBCAST: This brief webcast examines how to mitigate the top email threats of today including phishing, malware, spam, and more. View now to learn how to ensure email continuity even when your server is down and the strategies to secure sensitive data.
Posted: 01 Sep 2015 | Premiered: Aug 21, 2015


How Well Does SIEM Actually Secure Your Organization?
sponsored by Splunk
WEBCAST: This brief webcast examines how SIEMs only alert you of security threats when an attack is detected, but not when they sneak past your perimeter security.
Posted: 31 Aug 2015 | Premiered: Jan 17, 2014


Endpoint Security is Changing – How Will You Keep Up?
sponsored by Webroot
WEBCAST: This research report uses statistics gathered from security professionals to examine the state of endpoint security today and where it is going in the future.
Posted: 31 Aug 2015 | Premiered: Dec 31, 2014


Security School: Effective Analyze SIEM Data
sponsored by
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

SSL Decryption for Greater Threat Visibility
sponsored by Gigamon
WEBCAST: This webcast explores a new approach to SSL security and decryption.  View now to learn more and how to enhance your current security solutions.
Posted: 09 Apr 2015 | Premiered: Oct 28, 2014


Insight into Hacker Economics
sponsored by Juniper Networks, Inc.
WEBCAST: This webcasts takes a closer look at the current and historical trneds in crybercrime methods and tools and how the market is maturing.
Posted: 26 Mar 2015 | Premiered: Mar 27, 2014

Juniper Networks, Inc.

Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Limited

10 Ways to Protect Your Company From a Data Breach
sponsored by Bit9 + Carbon Black
WEBCAST: This webcast presents a 10 step strategy to tightening retail security and maintaining PCI compliance.
Posted: 19 Jun 2015 | Premiered: Apr 4, 2014

Bit9 + Carbon Black

Enterprise Security and your Technology
sponsored by Hewlett-Packard Company
WEBCAST: This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett-Packard Company

Tips for Expediting Incident Response
sponsored by Threat Track Security
WEBCAST: This informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014

Threat Track Security

Symantec Endpoint Protection 12 Trialware
sponsored by Symantec Corporation
TRIAL SOFTWARE: Access this trial software by Symantec and discover the benefits of effective endpoint security.
Posted: 21 May 2014 | Premiered: 21 May 2014

Symantec Corporation

How to Limit the Risk of Attack on your XP Assets
sponsored by AlienVault
WEBCAST: This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Posted: 08 May 2014 | Premiered: May 8, 2014


Web Security – Virtual Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Cisco Systems, Inc.

Maximum-Strength Threat Detection for Mid-Size Enterprises
sponsored by EMC Corporation
WEBCAST: This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation

Unified Security Management: Real-time Threat Detection
sponsored by AlienVault
TRIAL SOFTWARE: This free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
Posted: 24 Mar 2014 | Premiered: 24 Mar 2014

1 - 25 of 67 Matches Previous Page    1 2 3    Next Page
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement