Software  >  

Malware

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
MalwareWhite Papers (View All Report Types)
1 - 25 of 400 Matches Previous Page  | Next Page
A Consolidated Platform for Next-Generation Firewall and Secure Web Gateway Services
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper first defines next-generation firewalls, secure web gateways, and their capabilities, and then specifically discusses the Fortinet FortiGate NGFW and the results of ESG Lab's evaluation and testing of the device.
Posted: 16 Oct 2014 | Published: 30 Sep 2014

Fortinet, Inc.

Bringing DLP Inside the Organization
sponsored by Clearswift
WHITE PAPER: This white paper delves into the subject of data loss prevention (DLP) inside the organization, examining the way that critical information is shared within a business and discussing the pros and cons of implementing DLP solutions at different points.
Posted: 15 Oct 2014 | Published: 31 Dec 2013

Clearswift

5 New Laws of Antimalware Protection: Keep Up with Evolving Threats
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive whitepaper offers up five new laws you must know in order to protect your organization from ever-evolving malware threats.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Cisco Systems, Inc.

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: Learn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
Posted: 08 Oct 2014 | Published: 31 Jan 2013

IBM

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

How to Protect Your Business From Today's Security Threats
sponsored by Optus Business
WHITE PAPER: This white paper highlights the importance of maintaining robust network security within your enterprise, especially with an evolving threat landscape.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

Optus Business

Security in the New Mobile Ecosystem – A Ponemon Institute Study
sponsored by Raytheon Trusted Computer Solutions
WHITE PAPER: This study takes a look at over 600 IT security professionals who are highly involved in their organizations' mobile and enterprise security activities, and explains the current security status of mobile devices in the workplace.
Posted: 01 Oct 2014 | Published: 31 Aug 2014

Raytheon Trusted Computer Solutions

Outsider Threat Protection: Building a Kill Chain Defense
sponsored by Digital Guardian
WHITE PAPER: This white paper reveals the story behind outsider threats and how to defend against these attacks that steal sensitive data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Digital Guardian

Fighting Mobile Fraud: Protecting Businesses and Consumers from Cybercrime
sponsored by iovation, Inc.
WHITE PAPER: This white paper highlights the continuous fight against mobile fraud, and introduces a device-based solution that protects businesses from online threats in real-time.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

iovation, Inc.

Information Governance Risks of Microsoft Lync
sponsored by Actiance
WHITE PAPER: The IG risks of deploying Microsoft Lync are similar to those of other electronic communications such as email: malware, data leakage, inappropriate employee use, regulatory noncompliance, and skyrocketing legal costs.Download THIS WHITEPAPER to find out more!
Posted: 19 Sep 2014 | Published: 19 Sep 2014

Actiance

Anatomy of a Cyber-Attack: How Cyber Criminals Operate, and How You Can Stop Them
sponsored by Icomm Technologies
WHITE PAPER: In this informative resource, get an inside look the basic steps of a cyber-attack, from reconnaissance to intrusion to malware insertion, as well as new integrated security solutions that can help prevent these malicious activities from disrupting your business.
Posted: 17 Sep 2014 | Published: 31 Dec 2012

Icomm Technologies

How Data Breach Investigation Solutions Can Help You Prepare for Future Malware Attacks
sponsored by IBM
WHITE PAPER: This informative white paper introduces a fast, simple, and comprehensive breach investigation solution designed to help organizations defend against advanced persistent and internal threats, including fraud and abuse.
Posted: 16 Sep 2014 | Published: 16 Sep 2014

IBM

Securosis Analyst Report: Is It Time to Replace Your Current SIEM Solution?
sponsored by IBM
WHITE PAPER: In this in-depth white paper, gain critical insights into how to evaluate, select, and deploy the right SIEM solution for your organization's specific needs.
Posted: 15 Sep 2014 | Published: 28 Feb 2014

IBM

Disrupt Advanced Attacks and Prevent Loss with this Integrated Security Solution
sponsored by IBM
WHITE PAPER: Access this informative whitepaper to explore a new integrated, contextually-aware security solution that provides improved threat detection and prevention across the enterprise.
Posted: 12 Sep 2014 | Published: 31 May 2014

IBM

Need for Speed: Streamlining Response and Reaction to Attacks
sponsored by Intel Security
WHITE PAPER: This SANS white paper explores how to weave together and correlate information from disparately managed systems and bring visibility to their behavior with accurate, actionable reporting.
Posted: 10 Sep 2014 | Published: 31 May 2013

Intel Security

Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2
sponsored by Intel Security
WHITE PAPER: SANS Institute's analysis team took a peek into McAfee's latest ESM software with a particular bent towards SIEM applications, and found an "easy-to-use SIEM system that can perform broad and deep event analysis as well as provide a quick assessment."
Posted: 10 Sep 2014 | Published: 31 May 2013

Intel Security

Securosis Report: Replacing Your SIEM Yet?
sponsored by Intel Security
WHITE PAPER: This report offers pragmatic advice and walks you through the entire process of updating your SIEM solution for improved threat management, operational efficiency and compliance.
Posted: 10 Sep 2014 | Published: 01 Feb 2014

Intel Security

HP TippingPoint – A New Approach to Malware Defense
sponsored by Hewlett-Packard Company
WHITE PAPER: HP TippingPoint complements anti-virus defenses with a three-prong approach that detects and disrupts the malware lifecycle.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Hewlett-Packard Company

SIEM: Keeping Pace with Big Security Data
sponsored by Intel Security
WHITE PAPER: This detailed report explores how intelligent and scalable Security Information and Event Management (SIEM) solutions can help you stay on top of an ever-evolving, data-driven environment.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

Intel Security

Leverage Security Event Data to Improve Vulnerability Detection & Remediation
sponsored by Intel Security
WHITE PAPER: Learn how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data for better and more accurate reporting.
Posted: 09 Sep 2014 | Published: 31 Oct 2013

Intel Security

Tackling Web Security Head On
sponsored by Cisco
WHITE PAPER: This white paper reveals a solution to tackle web security—blocking hidden malware and high-risk sites before it affects users.
Posted: 09 Sep 2014 | Published: 30 Sep 2013

Cisco

How to Reverse Engineer Domain Ownership in a Cyber Investigation
sponsored by DomainTools
WHITE PAPER: In this in-depth resource, discover the top security strategies that can help security uncover vital insights into the true identify of cyber attackers.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

DomainTools

Cybercrime Investigation Use Case: Visualizing Data with Investigative Software
sponsored by DomainTools
WHITE PAPER: In this resource, learn how to accelerate your cybercrime investigations with a data visualization tool. Explore a step-by-step use case and discover how simple it is to choose between several visualization options to quickly spot commonalities in large data sets.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

DomainTools

The Wild World of Malware: Keeping Your Company Safe from Advanced Threats
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth resource, gain essential knowledge on today's advanced malware threats, and discover how new next-generation firewalls (NGFW) can prevent them from gaining access to your valuable data.
Posted: 17 Sep 2014 | Published: 31 Jul 2012

Icomm Technologies
1 - 25 of 400 Matches Previous Page    1 2 3 4    Next Page
 
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement