Software  >  

Malware

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
Malware White Papers (View All Report Types)
1 - 25 of 413 Matches Previous Page  |  Next Page
Holistic Fraud Prevention: Transforming the Customer's Experience
sponsored by IBM
WHITE PAPER: Cybercriminals continue to attack financial institutions, using increasingly sophisticated malware and phishing techniques. Current fraud prevention solutions struggle to keep pace with these advances and, unfortunately, increasingly interfere with customers' online experiences. Find out how to thwart these attacks in the following white paper.
Posted: 04 Mar 2015 | Published: 04 Mar 2015

IBM

Is it Phishing or an APT?
sponsored by Threat Track Security
WHITE PAPER: In this white paper, learn the three mechanisms of a phishing email attack and how one security platform can fill the gaps in your defense strategy.
Posted: 04 Mar 2015 | Published: 11 Feb 2015

Threat Track Security

Endpoint application protection: Malware's worst enemy
sponsored by IBM
WHITE PAPER: The key to eliminating cybercrime is to eliminate malware. And the key to eliminating malware is to fight it head on by using endpoint application protection. Find out how to do so in the following white paper.
Posted: 04 Mar 2015 | Published: 04 Mar 2015

IBM

Realize the Serious Economic Impact of Advanced Persistent Threats
sponsored by IBM
WHITE PAPER: View this informative report to learn how detrimental APTs can be for your organization, particularly pertaining to your finances.
Posted: 03 Mar 2015 | Published: 01 May 2014

IBM

Uncover the Top Ten Database Threats That Could Affect Your Business
sponsored by Imperva
WHITE PAPER: This white paper highlights the top ten threats that affect traditional databases as well as Big Data technologies.
Posted: 03 Mar 2015 | Published: 31 Dec 2014

Imperva

The Four Key Elements of Fraud Prevention
sponsored by IBM
WHITE PAPER: This white paper helps you stop fraud by outlining the four key elements of holistic fraud prevention.
Posted: 02 Mar 2015 | Published: 31 Aug 2014

IBM

Test Results for 5 Security Systems
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This report summarizes tests conducted on five different security programs, revealing which ones caught the most threats, had the best usability, and more.
Posted: 02 Mar 2015 | Published: 18 Nov 2014

Check Point Software Technologies Ltd.

Traps Advanced Endpoint Protection: Technology Overview
sponsored by Palo Alto Networks
WHITE PAPER: This white paper describes a security approach that provides protection before the attacks can penetrate.
Posted: 02 Mar 2015 | Published: 30 Nov 2014

Palo Alto Networks

Top Malware Security Platforms Compared
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: View this white paper for a comparison of the leading malware security platforms to see who comes out on top and who lets attacks slip through the cracks. Read on to learn more.
Posted: 26 Feb 2015 | Published: 21 Aug 2014

Check Point Software Technologies Ltd.

Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This in-depth white paper can help you discover the latest security threats and how to stop them.
Posted: 26 Feb 2015 | Published: 31 Dec 2014

Dimension Data

Financial Malware Explained
sponsored by IBM
WHITE PAPER: This white paper gets you inside the head of a fraudster and gives you insight into how they work.
Posted: 25 Feb 2015 | Published: 31 Dec 2014

IBM

Old Techniques in a New Channel: The Evolving Threats of Mobile Banking
sponsored by IBM
WHITE PAPER: This white paper describes in detail the attacks mobile banking users face.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

IBM

10 Ways Everyone Should Approach Cybersecurity in 2015
sponsored by Global Knowledge
WHITE PAPER: This paper reviews key security issues and focuses attention on 10 responses that we all need to adopt in our approach to security in 2015.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

Global Knowledge

The Next Generation of Fraud Detection
sponsored by IBM
WHITE PAPER: This white paper describes how system provides advanced fraud detection to combat more threats.
Posted: 24 Feb 2015 | Published: 30 Nov 2014

IBM

Get Inside the Thriving Malware Industry
sponsored by IBM
WHITE PAPER: This white paper helps you understand how a malware attack works by getting you inside the mind of a hacker.
Posted: 24 Feb 2015 | Published: 31 Jan 2014

IBM

Win the War on Cybercrime with Four Key Elements
sponsored by IBM
WHITE PAPER: The following white paper helps you stay ahead of cybercriminals by outlining the four key elements of fraud prevention.
Posted: 24 Feb 2015 | Published: 31 Dec 2013

IBM

Behavior-based Protection Strategies from the Network to Remote Endpoints.
sponsored by IBM
WHITE PAPER: This white paper looks at behavior-based protection, a comprehensive security system that fights the latest threats.
Posted: 24 Feb 2015 | Published: 31 Oct 2014

IBM

The Evolving Threat Landscape
sponsored by Threat Track Security
WHITE PAPER: This white paper presents an interview with a leading security expert that discusses what new attacks are out there and how you can stop them.
Posted: 20 Feb 2015 | Published: 31 Dec 2014

Threat Track Security

Mobility on hold: Get back on track with mobile risk mitigation
sponsored by IBM
WHITE PAPER: This white paper introduces one security system that keeps up with the risks of mobile banking.
Posted: 20 Feb 2015 | Published: 31 Dec 2013

IBM

Discover How to Guard Against Healthcare Cybercrime
sponsored by NaviSite
WHITE PAPER: Healthcare data is as valuable as gold on the black market, and thieves are drawn to the profits. Now, with more data stored digitally and more hackers taking advantage of that, the healthcare industry needs better security than ever.
Posted: 19 Feb 2015 | Published: 01 Jan 2015

NaviSite

Predictions from the Front Lines for Cybersecurity in 2015
sponsored by Threat Track Security
WHITE PAPER: This white paper summarizes the results of a survey of security professionals, revealing what IT professionals are thinking and why in 2015.
Posted: 18 Feb 2015 | Published: 18 Feb 2015

Threat Track Security

The Security Value of a Dozen Next Generation Firewalls
sponsored by Cisco Systems, Inc.
WHITE PAPER: A security research group has put together an info-graphic that summarizes the results of independent studies on a dozen different NGFW products.
Posted: 18 Feb 2015 | Published: 30 Sep 2014

Cisco Systems, Inc.

Discover the Capabilities of a Next Generation Firewall
sponsored by Cisco Systems, Inc.
WHITE PAPER: This in-depth white paper provides a close look at a next generation firewall, describing each of its capabilities in detail.
Posted: 18 Feb 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

A Detailed Report on a Strong and Effective Firewall
sponsored by Cisco Systems, Inc.
WHITE PAPER: This detailed white paper gives you all the detail you need on a firewall that's stable, reliable, and able to block over 99% of threats.
Posted: 17 Feb 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Defending Against Rogue Users, Devices, and Applications
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explains how NAC technologies help to ensure that only appropriate users, devices, and applications have access to your network resources, enabling you to support your users in a secure, efficient way.
Posted: 17 Feb 2015 | Published: 29 Aug 2014

ForeScout Technologies, Inc.
1 - 25 of 413 Matches Previous Page    1 2 3 4    Next Page
 
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement