Software  >  

Malware

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
MalwareWhite Papers (View All Report Types)
101 - 125 of 377 Matches Previous Page  | Next Page
What's Wrong with Traditional Firewalls?
sponsored by Dell Software
WHITE PAPER: Did you know that your current firewall may be jeopardizing your network security? Traditional firewalls that only focus on stateful packet inspection and access control rules aren't effective in today's world. This e-book explains where traditional firewalls fall short – and what you can do about it.
Posted: 24 Mar 2014 | Published: 20 Dec 2012

Dell Software

Hackers, Hacking, and CEHv8
sponsored by Global Knowledge
WHITE PAPER: This resource addresses hackers, hacking, and what can be done to prevent cyber-attacks. It also highlights the different motives for hacking and common methods hackers use.
Posted: 19 Mar 2014 | Published: 21 Jan 2014

Global Knowledge

The Modern Malware Review: Analysis of New and Evasive Malware in Live Enterprise Networks
sponsored by Palo Alto Networks
WHITE PAPER: This crucial paper discusses the latest malware threats, analyzing more than 1,000 organizations and examining the malware samples that were initially undetected by industry-standard security solutions.
Posted: 18 Mar 2014 | Published: 18 Mar 2013

Palo Alto Networks

Attacks on Point of Sale Systems
sponsored by Symantec Corporation
WHITE PAPER: Identity theft is one of the most common forms of cybercrime, and your Point of Sale (POS) system is especially vulnerable to this attack type. This in-depth guide explores how cybercriminals use malware to steal credit card information at the POS.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Symantec Corporation

Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks
sponsored by IBM
WHITE PAPER: This white paper offers background on today's malware and its 4 predictable steps. Click through to discover a set of integrated solutions that offer improved visibility and defense to block advanced attacks.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

DDoS Mitigation and DNS Availability: Key Components of Your Resiliency Strategy
sponsored by Verisign, Inc.
WHITE PAPER: This white paper provides enterprises with a list of recommendations for ensuring resiliency and minimizing risk in the event of a DDoS or DNS attack.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

Verisign, Inc.

DDoS Malware: Strategies for Mitigation
sponsored by Verisign, Inc.
WHITE PAPER: This technical brief covers DDoS-enabled malware and several DDoS-specific tools, their capabilities, and the network indicators they generate while performing attack methods.
Posted: 28 Feb 2014 | Published: 31 Dec 2013

Verisign, Inc.

DDoS Mitigation: Best Practices for a Rapidly Changing Threat Landscape
sponsored by Verisign, Inc.
WHITE PAPER: This guide explores one company's set of best practices that enables organizations to keep pace with DDoS attacks while minimizing impact on business operations.
Posted: 28 Feb 2014 | Published: 31 Dec 2012

Verisign, Inc.

Combining Cloud-Based DDoS Protection and DNS Services to Thwart the Threat Of DDoS
sponsored by Verisign, Inc.
WHITE PAPER: This guide explores the keys to fighting sophisticated DDoS attacks and why cloud-based protection may be your best option.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

Verisign, Inc.

4 Leading DDoS Protection Strategies
sponsored by Verisign, Inc.
WHITE PAPER: This guide explores various ways you can prevent DDoS attacks from harming your system and helps you decide which is best for your system.
Posted: 27 Feb 2014 | Published: 31 Dec 2013

Verisign, Inc.

Information Risk: Managing Digital Assets in a new Technology Landscape
sponsored by Hewlett-Packard Limited
WHITE PAPER: This in-depth report outlines the current threat landscape, different types of risks, and what you can do to prevent devastating cyber-attacks.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

Hewlett-Packard Limited

The Future of Web Security: 10 Things Every Web Application Firewall Should Provide
sponsored by Imperva
WHITE PAPER: This guide takes a look at 10 things that every web application firewall should provide.
Posted: 19 Feb 2014 | Published: 31 Dec 2012

Imperva

Why It’s Time for Enterprises to Secure Mac Computers
sponsored by Symantec Corporation
WHITE PAPER: This guide explores the importance of protecting your Macs with endpoint security software and outlines how malware and advanced persistent threats look to infiltrate your operating systems.
Posted: 18 Feb 2014 | Published: 31 Dec 2013

Symantec Corporation

State of Security Operations
sponsored by Hewlett-Packard Company
WHITE PAPER: With businesses recognizing the need for further investment in cyber-defense, it is essential to figure out which tools and strategies are best for your organization. Read now and find out more about the current state of security operations in 2014.
Posted: 14 Mar 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

Detecting Sophisticated Online Attacks with Streaming Analytics
sponsored by EMC Corporation
WHITE PAPER: Discover how RSA Web Threat Detection delivers actionable intelligence by leveraging big data to correlate anomalies and detect online threats in real time.
Posted: 13 Mar 2014 | Published: 31 Dec 2013

EMC Corporation

How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER: This white paper explores the widening gap between the offensive capabilities of today's cyber attackers and the weak traditional defenses deployed in most data centers.
Posted: 10 Mar 2014 | Published: 31 Dec 2013

FireEye

EFT Server to Replace USB for SCADA; EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture
sponsored by GlobalScape
WHITE PAPER: This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally.
Posted: 06 Mar 2014 | Published: 31 Dec 2012

GlobalScape

What can you do differently to guard against threats from rapidly evolving mobile malware?
sponsored by IBM
WHITE PAPER: This must-see white paper discusses the emerging and evolving risks associated with mobile computing and applications. Also inside, find insight to help you effectively address mobile vulnerabilities.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

The SIEM Evaluator's Guide
sponsored by AlienVault
WHITE PAPER: This guide takes a look at the current trends in security management and how an effective SIEM strategy can help you ensure security.
Posted: 04 Mar 2014 | Published: 04 Mar 2014

AlienVault

Symantec Intelligence Report - January 2014
sponsored by Symantec Corporation
WHITE PAPER: This in-depth analysis explores the current threat landscape, the most common security threats, and how you can prevent them.
Posted: 03 Mar 2014 | Published: 31 Jan 2014

Symantec Corporation

Internet Security Census 2013
sponsored by Fortinet, Inc.
WHITE PAPER: This guide explores key survey findings regarding increased workplace mobility and how security threats are targeted toward various mobile endpoints.
Posted: 28 Feb 2014 | Published: 31 Dec 2013

Fortinet, Inc.

Advanced Attacks Require Federal Agencies to Reimagine IT Security
sponsored by FireEye
WHITE PAPER: This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FireEye

Supply Chain Analysis: From Quartermaster to Sunshop
sponsored by FireEye
WHITE PAPER: This in-depth guide explores the current threat landscape and the role of APTs. Read now for more information on how APTs are being used for wide-scale cybercrime campaigns.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FireEye

Securing your Midsized Business
sponsored by IBM
WHITE PAPER: This guide explores security management strategies and how to combat the growth of sophisticated threats.
Posted: 26 Feb 2014 | Published: 31 Oct 2013

IBM

Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye
sponsored by FireEye
WHITE PAPER: With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

FireEye
101 - 125 of 377 Matches Previous Page    3 4 5 6 7 8    Next Page
 
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement