Software  >  

Malware

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
Malware White Papers (View All Report Types)
1 - 25 of 458 Matches Previous Page  |  Next Page
Anti-Virus Comparative
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Malicious software poses an ever-increasing threat, not only because the number of malware programs are increasing, but also due to the continuously changing threat-landscape. Key into this white paper to uncover results from the Malware Protection Test and the Exploit Test.
Posted: 16 Oct 2017 | Published: 31 Oct 2016

Symantec & Blue Coat Systems

Symantec™ Cloud Generation Malware Analysis
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Hackers continue to show endless ingenuity in penetrating corporate networks, which means organizations need to fight back harder than ever. By reading this white paper, you'll learn more about malware.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Symantec & Blue Coat Systems

Mobile Malware in the UK
sponsored by Lookout
WHITE PAPER: The average malware infection on a mobile device costs £6,400. With the rise of employees using mobile devices for work, companies need to be aware of the high cost and vulnerability of malware attacks. This white paper offers a malware case study to help organizations fight back against mobile threats.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Lookout

The Next Generation of Cloud App Security
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: By 2020, 85% of large enterprises will use a cloud access security broker (CASB) platform for their cloud services which is up from less than 5% today, according to Gartner. This white paper offers benefits of CASB and how to increase efficacy, avoid incidents and more.
Posted: 06 Oct 2017 | Published: 06 Oct 2017

Symantec & Blue Coat Systems

Sophos Phish Threat
sponsored by Sophos, Inc.
WHITE PAPER: Look at this white paper to learn how to automate defense education for your users with routine campaigns, training, follow-up and reporting.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Sophos, Inc.

Firewall Best Practices to Block Ransomware
sponsored by Sophos, Inc.
WHITE PAPER: Recent ransomware attacks like Wannacry and Petya have spread largely unchecked through corporate networks in recent months, extorting money to restore your data and regain control of your computers. This white paper reveals best practices for configuring your firewall and network to protect against ransomware.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Sophos, Inc.

2017 Cyberattack Trends
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This report outlines how the threat landscape has changed in 2017 when it comes to ransomware, banking and mobile threats. Read on to learn from the past, so you might better secure the future.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Check Point Software Technologies Ltd.

Beginner's Guide to Ransomware Detection and Protection
sponsored by AlienVault
WHITE PAPER: Within hours of the outbreak of WannaCry, it had infected more than 230,000 computers in over 150 countries. Gain a deeper understanding of ransomware attacks, how they work, who is targeted, and what you can do to stop them.
Posted: 27 Sep 2017 | Published: 27 Sep 2017

AlienVault

Ransomware: All Locked Up and No Place to Go
sponsored by Kaspersky Lab
WHITE PAPER: Ransomware is the digital version of extortion. It uses age-old tactics to carry out a modern day crime, but the elements behind it are as old as human criminal activity itself. Explore this white paper to discover recommendations and expert tips to protect against ransomware.
Posted: 25 Sep 2017 | Published: 31 Dec 2016

Kaspersky Lab

The Dangers of Phishing: Help Employees Avoid the Lure of Cybercrime
sponsored by Kaspersky Lab
WHITE PAPER: According to Kaspersky Labs, 48% of all phishing attacks were focused on gleaning users' financial data. This white paper reveals how to identify a phishing attack and how to protect your business from being targeted by phishing attacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Kaspersky Lab

When Cryptors Attack: Timeline of a Ransomware Infection
sponsored by Kaspersky Lab
WHITE PAPER: The average amount of damage to SMBs caused by one cryptomalware attack is $99,000, according to a survey from Kaspersky Lab and B2B International. Take a closer look at this white paper to learn about cryptomalware attacks and how to prevent your company from being targeted with cryptomalware.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Kaspersky Lab

TOP 10 Considerations for Bot Management
sponsored by Akamai Technologies
WHITE PAPER: There are countless vendors claiming to provide you with bot management solutions and comprehensive protection, but what do you really need to keep your own environment safe? Read this list of the top 10 things to consider when selecting a bot management system.
Posted: 22 Sep 2017 | Published: 31 Jul 2017

Akamai Technologies

Business Perception of IT Security: In the Face of an Inevitable Compromise
sponsored by Kaspersky Lab
WHITE PAPER: Companies unanimously state that cyber threats are highly damaging and that cybersecurity is one of the top requirements for business to stay afloat. Take an in-depth look at this security risk report to reveal where enterprises are seeing the most security attacks.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

Kaspersky Lab

The Key to Advancing from Bot Management to Bot Security
sponsored by Akamai Technologies
WHITE PAPER: Learn about how you can better secure your IT environment by putting a common hacker tool, bots, to your own use, and how you can advance from simple bot management to bot security.
Posted: 21 Sep 2017 | Published: 03 Mar 2017

Akamai Technologies

10 Simple Tips to Protect Yourself from Ransomware
sponsored by Acronis
WHITE PAPER: Inside, learn 10 tips as to how you can optimize your backup system to help defend against the ransomware threat
Posted: 12 Sep 2017 | Published: 12 Sep 2017

Acronis

Study on the Cyber Resilient Organization: United Arab Emirates
sponsored by IBM Resilient
WHITE PAPER: Take an in-depth look at this Ponemon study to reveal factors effecting cyber resilience. Learn more about activities to improve it, barriers, and threats.
Posted: 12 Sep 2017 | Published: 30 Jun 2017

IBM Resilient

Protect Data Against Loss to Ransomware
sponsored by Acronis
WHITE PAPER: Inside, learn about a backup program that's designed to fight back against the growing ransomware threat with heuristic detection, the ability to restore from local caches or backups and the cloud, and more.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Acronis

Anatomy of a Cyberattack
sponsored by Infocyte
WHITE PAPER: According to Ponemon, the cost of a data breach is significantly less if you contain it within 30 days. Check out this white paper to uncover the anatomy of cyberattacks to see where different "hunt tools" can be used for your protection to detect data breaches early.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Infocyte

Protecting the Enterprise Against Unknown Malware
sponsored by Infocyte
WHITE PAPER: The annual economic cost of global cybercrime is pinpointed to a figure of $450 billion USD last year. This white paper introduces threat hunting as an essential component of your security strategy to combat the rise of unknown malware and cybercrime.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Infocyte

Reducing Attacker Dwell Time
sponsored by Infocyte
WHITE PAPER: Discover how to reduce attacker dwell time with a threat hunting strategy that enables you to detect and resolve breaches to your network faster.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Infocyte

Hospital Network Security: Recursive DNS Lookups Yield Threat Insight
sponsored by Cisco Umbrella
WHITE PAPER: Uncover how the University of Kansas Health System adopted a security strategy leveraging DNS to block threats and reduce ransomware attacks.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Cisco Umbrella

A Guide to Avoiding Financial Losses in Cybersecurity
sponsored by Kaspersky Lab
WHITE PAPER: 77% of U.S. businesses have suffered between 1 and 5 separate incidents of data loss, leakage or exposure in the past 12 months, according to Kaspersky Lab. This white paper reveals the financial woes across the threat landscape.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Kaspersky Lab

What Healthcare Professionals Need to Know about Bitcoin
sponsored by Commvault
WHITE PAPER: It's important for healthcare organizations to do their preliminary research into bitcoin, so that if a ransomware breach occurs they are able to get back to work. Learn more about bitcoin in this resource and about trends in ransomware.
Posted: 24 Aug 2017 | Published: 24 Aug 2017

Commvault

A Primer on File-Borne Malware Threats
sponsored by OPSWAT inc
WHITE PAPER: Verizon's 2017 Data Breach Investigations Report found that 66% of malware was installed via malicious email attachments. In this white paper, examine the ways attackers use files to deliver malware, the reasons these methods are effective, and the steps organizations should take to block these kinds of attacks.
Posted: 02 Oct 2017 | Published: 02 Oct 2017


Advanced Persistent Threats and Other Advanced Attacks: Threat Analysis and Defense Strategies for SMB, Mid-size, and Enterprise Organizations
sponsored by Websense, Inc.
WHITE PAPER: Understanding exactly what an Advanced Persistent Threat (APT) is can be difficult, as the hype surrounding this dangerous threat has clouded its definition. View this paper to discover the nature of APT risks and gain key recommendations on how to defend against them.
Posted: 28 Aug 2017 | Published: 15 Sep 2011

Websense, Inc.
1 - 25 of 458 Matches Previous Page    1 2 3 4    Next Page
 
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement