Software  >  

Malware

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
Malware White Papers (View All Report Types)
1 - 25 of 440 Matches Previous Page  |  Next Page
Detect and Protect against Advanced Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper examines the architecture of a strong, layered security system and suggests ways to partner with security services in order to achieve it.
Posted: 22 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

Special Report: Cyber Security in 2015
sponsored by IBM
WHITE PAPER: This report summarizes essential attack information from recent security breaches to show you what the current threat landscape looks like.
Posted: 22 May 2015 | Published: 31 Mar 2015

IBM

Don’t Let Your DDoS Defense Fall Behind
sponsored by Neustar®
WHITE PAPER: This white paper examines the pros and cons of several different DDoS mitigation approaches. Access now to learn how to evaluate and choose the ideal strategy based on your risk assessment.
Posted: 21 May 2015 | Published: 13 May 2015

Neustar®

Keep Yourself Secure from Growing Cyber-Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this infographic, discover what you can do to stay safe in an increasingly dangerous cyber landscape, including increasing proactivity in your security strategy and partnering with security services.
Posted: 21 May 2015 | Published: 21 May 2015

Hewlett-Packard Limited

Advance the Fight against Cyber Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces the benefits of security services and gives you advice on how to best take advantage of them.
Posted: 21 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

Best Practices for Dealing with Phishing and Next-Generation Malware
sponsored by Threat Track Security
WHITE PAPER: This white paper focuses on the state of phishing and malware attacks and how hackers are evolving. Continue reading to learn mitigation strategies and best practices for educating employees to avoid attacks.
Posted: 21 May 2015 | Published: 29 Apr 2015

Threat Track Security

The Rise in Cybercrime: A Report on the Current Threat Landscape
sponsored by IBM
WHITE PAPER: This white paper examines why and how cybercrime is increasing and suggests practices for maintaining security.
Posted: 21 May 2015 | Published: 30 Jun 2014

IBM

As Enterprise Mobility Usage Escalates, So Does Security Risk
sponsored by HID
WHITE PAPER: In this expert white paper, examine how to tame the mobile security beast through two-factor authentication and single-sign-on approaches. Continue reading to learn how other organizations are bringing harmony to the UX vs. IT security debate and other steps you can take to protect data and apps.
Posted: 18 May 2015 | Published: 08 May 2015

HID

An Overview of DNS-Based DDoS Attacks
sponsored by Nominum, Inc.
WHITE PAPER: This white paper covers the recent changes in DNS DDoS tactics and offers remediation strategies to improve network security for customers. Inside, discover how to stop malicious traffic at ingress to DNS resolvers and the steps to take to mitigate evolving DDoS attacks.
Posted: 15 May 2015 | Published: 06 May 2015

Nominum, Inc.

Security Services: Beyond Malware and Antivirus
sponsored by AVG Technologies
WHITE PAPER: This white paper can help your MSP deliver effective and reliable security services in the modern threat landscape.
Posted: 14 May 2015 | Published: 14 May 2015

AVG Technologies

New Defence Strategy Needed To Combat Cybersecurity Adversaries
sponsored by Hewlett-Packard Company
WHITE PAPER: View this informative white paper to learn why companies need to implement a new defense strategy to keep cybercriminals at bay.
Posted: 13 May 2015 | Published: 13 May 2015

Hewlett-Packard Company

Fighting Today's Advanced Attacks and Defending Your Network
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper demystifies APTs and reveals a three phase strategy to defending your network against determined cybercriminals.
Posted: 13 May 2015 | Published: 22 Apr 2015

Fortinet, Inc.

Network Security 3 Phase Framework
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper outlines a simple three phase framework for detecting and blocking concealed threats and protecting data on your network and beyond.
Posted: 12 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

Secure Code and the Role of Software Assurance
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores why application security has not kept pace with changes in the threat landscape and why companies struggle to create secure code.
Posted: 12 May 2015 | Published: 15 Apr 2015

Hewlett-Packard Company

How to Prevent Security Breaches in Your Retail Network
sponsored by Dell, Inc.
WHITE PAPER: Explore the multi-vector nature common to most high-profile retail security breaches in this white paper and learn about the several common characteristics of recent breaches and how to protect your data against hackers.
Posted: 12 May 2015 | Published: 06 May 2015

Dell, Inc.

Preventing Attackers from Getting What They Want
sponsored by SecureAuth
WHITE PAPER: This white paper explores the anatomy of an attack and why preventative measures inevitably fail. Read on to learn how a two-factor authentication strategy limits the usefulness of any credentials that a hacker may have acquired or created.
Posted: 11 May 2015 | Published: 25 Mar 2015

SecureAuth

Defending Against New Ransomware Threats
sponsored by Trend Micro
WHITE PAPER: In this white paper, discover five ways to make sure you're prepared for a ransomware attack.
Posted: 11 May 2015 | Published: 11 May 2015

Trend Micro

Custom Defense Against Targeted Attacks
sponsored by Trend Micro
WHITE PAPER: Read this white paper to discover how you can build custom-designed security that can withstand even the most advanced targeted attack.
Posted: 08 May 2015 | Published: 31 Dec 2014

Trend Micro

SCB Builds a Defense Against Malware
sponsored by Malwarebytes Corporation
WHITE PAPER: In this case study, learn the story of an architectural firm that dramatically decreased malware attacks while increasing productivity.
Posted: 08 May 2015 | Published: 08 May 2015


Sagicor Takes on Malware and Wins
sponsored by Malwarebytes Corporation
WHITE PAPER: This white paper tells the story of how one financial institution put a stop to their constant stream of malware attacks.
Posted: 08 May 2015 | Published: 08 May 2015


Hypertherm Cuts Malware Out of the Picture
sponsored by Malwarebytes Corporation
WHITE PAPER: In this white paper, discover how a manufacturing company dramatically cut down on the time and effort needed to mitigate malware infections.
Posted: 08 May 2015 | Published: 08 May 2015


Food for the Hungry Stops Malware in its Tracks
sponsored by Malwarebytes Corporation
WHITE PAPER: In this case study, learn how a major non-profit eradicated malware in its network.
Posted: 08 May 2015 | Published: 08 May 2015


Florida Gulf Coast University Teaches Malware a Lesson
sponsored by Malwarebytes Corporation
WHITE PAPER: In this exclusive case study, discover how a major university kept thousands of users safe from malware.
Posted: 08 May 2015 | Published: 08 May 2015


Holistic Protection against Targeted Attacks
sponsored by Trend Micro
WHITE PAPER: This white paper discusses how you can design security customized for your network and for fighting off potential targeted attacks.
Posted: 07 May 2015 | Published: 31 Oct 2014

Trend Micro

Powerful Anti-Malware for Your Mobile Device
sponsored by Malwarebytes Corporation
WHITE PAPER: Those who haven't yet secured their mobile devices are courting serious risk. In this white paper, discover what mobile anti-malware can do to bolster your mobile security.
Posted: 07 May 2015 | Published: 07 May 2015

1 - 25 of 440 Matches Previous Page    1 2 3 4    Next Page
 
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement