Software  >  

Malware

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
Malware White Papers (View All Report Types)
51 - 75 of 459 Matches Previous Page  |  Next Page
2016 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This in-depth analysis outlines what IT and security professionals learned from 2015's cyberattacks. Discover which industries were most targeted, the role insiders played in exploitation of vulnerabilities and, most importantly, what you can do to avoid catastrophic data loss.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

IBM

Achieving High Fidelity Security: An EMA White Paper
sponsored by RSA
WHITE PAPER: In the security context, "high fidelity" communicates the ability to provide a richer experience to the security analyst to deliver better security outcomes. Discover the benefits of using both network and endpoint data with a strong analysis toolset to create high-fidelity security.
Posted: 26 Aug 2016 | Published: 01 Jul 2016

RSA

Frost & Sullivan Best Practices Research: Network Security Forensics
sponsored by RSA
WHITE PAPER: This white paper shows you a comprehensive set of technologies for incident detection and network security forensics that will greatly improve you security posture. Learn how to achieve depth and real-time visibility into the inbound and outbound communications traversing your network.
Posted: 25 Aug 2016 | Published: 01 Jul 2016

RSA

Manage Risk by Protecting Apps, Data and Usage
sponsored by Citrix
WHITE PAPER: When it comes to securing vulnerabilities, especially in apps, there are 5 best practices you can follow. This white paper provides and overview of how to ensure privacy, protect sensitive information and enable compliance of apps and data without compromising workforce flexibility and productivity.
Posted: 24 Aug 2016 | Published: 31 Dec 2015

Citrix

The Evolution of SIEM: Why it is Critical to Move Beyond Just Logs for Fast Threat Detection
sponsored by RSA
WHITE PAPER: Discover how you can spot advanced threats that bypass preventative controls - ones that SIEM systems simply can't see. Gain greater visibility and security context to reconstruct events and attacker TTPs (Tactics, Techniques and Procedures) to stop the attackers before they compromise your enterprise.
Posted: 24 Aug 2016 | Published: 01 Jul 2016

RSA

Explore a Security Intelligence Model for Combating Cyber Threats
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover how to fully realize your security intelligence objectives. You'll learn how to keep your security architecture flexible to adopt and mature security intelligence capabilities over time and significantly reduce your risk of experiencing costly cyber incidents moving forward.
Posted: 23 Aug 2016 | Published: 31 Dec 2015

LogRhythm, Inc.

Info-Tech Research Group SIEM Vendor Landscape Report
sponsored by LogRhythm, Inc.
WHITE PAPER: In this Info-Tech research report, discover the effectiveness and simplicity SIEM can bring to threat management for your organization. Uncover pros and cons of leading SIEM products, insights on where the SIEM market is going, and more.
Posted: 22 Aug 2016 | Published: 01 Jul 2016

LogRhythm, Inc.

IDC Report: Modern Defense Against Sophisticated Attacks Requires Comprehensive Endpoint Protection
sponsored by RSA
WHITE PAPER: Discover how to bolster your existing security infrastructure with tools designed to detect advanced threats from each of the 3 STAP subcategories: endpoint, boundary, and internal network analysis. Learn how to combine capabilities designed to analyze suspicious files with behavioral analysis to identify suspicious file activity early.
Posted: 19 Aug 2016 | Published: 01 Jul 2016

RSA

How to Detect a Ransomware Attack Before it's too Late
sponsored by LogRhythm, Inc.
WHITE PAPER: Your organization's defense success against ransomware depends largely on your level of preparation and the tools you deploy to monitor your systems. Learn how effectively defend against catastrophic attacks through early detection and elimination of suspicious activity.
Posted: 16 Aug 2016 | Published: 01 Jul 2016

LogRhythm, Inc.

Why Micro-Segmentation Matters Now
sponsored by VMware
WHITE PAPER: Cybercriminals count on the fact that data center security is still based on a penetrable, hardware-centric model. Access this white paper to learn how the advent of network virtualization empowered by micro-segmentation changes the economics, ease and speed of data center security, eliminating long-standing vulnerabilities.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

VMware

Cb Defense
sponsored by Carbon Black
WHITE PAPER: Discover how you can gain next-generation AV to stop more attacks, see more threats, and close more security gaps than ever before. Get unprecedented visibility and actionable intelligence while protecting servers, laptops, and desktops from advanced attackers.
Posted: 27 Jul 2016 | Published: 01 Jun 2016

Carbon Black

6 Easy Ways to Advance Your Cybersecurity Program When You Have a Small Team
sponsored by ThreatConnect
WHITE PAPER: This paper outlines 6 steps you can take to prioritize threat data, automate manual tasks, and streamline your workflow. With the right tools in place, you can turn your small band of brothers into an army suited to take down all of today's sophisticated threats.
Posted: 20 Jul 2016 | Published: 01 Jun 2016

ThreatConnect

Incident Response Team: Transform Your IR Team From Reactive to Proactive
sponsored by ThreatConnect
WHITE PAPER: Discover how your IR team can become faster and more effective at protecting your network. Unite your people, processes, and technologies across your organization to eliminating barriers between the systems that used to slow you down.
Posted: 06 Jul 2016 | Published: 01 Jun 2016

ThreatConnect

Security Operations Center: Unite People, Processes, and Technologies Across Your SOC
sponsored by ThreatConnect
WHITE PAPER: Discover how to deepen your threat intelligence, validate it, prioritize it and act on it. Bring together the people, processes, and technologies that comprise your Security Operations Center (SOC) team, and the other teams you partner with on a daily basis. Automate mundane security tasks that slow you down by leveraging tools you already have.
Posted: 05 Jul 2016 | Published: 01 Jun 2016

ThreatConnect

Is Microsoft Office 365 Secure?
sponsored by Proofpoint, Inc.
WHITE PAPER: More than four in ten organizations are in the process of implementing Office 365 or already use it. This infographic gives you important statistics and insights on the top security, encryption and archiving challenges faced while moving to Office 365, based on a survey conducted by UBM Tech.
Posted: 08 Jun 2016 | Published: 01 May 2016

Proofpoint, Inc.

Trends in SAP Cybersecurity
sponsored by IBM
WHITE PAPER: The purpose of this Ponemon Institute study, which encapsulates the survey results of 607 IT and IT security practitioners, is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.
Posted: 29 Aug 2016 | Published: 01 Feb 2016

IBM

Adopt a Bimodal Approach to Manage PCs and Broaden Support for New Devices
sponsored by Lenovo Software
WHITE PAPER: This Gartner Report teaches you new approaches to endpoint management and security as updates to PC software increase in volume and frequency.
Posted: 26 Aug 2016 | Published: 21 Sep 2015

Lenovo Software

Total Economic Impact (TEI) Study
sponsored by IBM
WHITE PAPER: This Forrester study examines the potential return on investment (ROI) enterprises may realize by identifying web-based and mobile application source code vulnerabilities early in the software development life cycle.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

IBM

The Threat Defense Lifecycle — Why Traditional Security Fails
sponsored by Intel Security
WHITE PAPER: Learn how to navigate the new world of cyber threats and security tools while maintaining an open mind towards new strategies and priorities. Collaborate with business pros and innovate to fortify existing defenses and establish new bulwarks against threats lurking around the corner.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

The Threat Defense Lifecycle — Reducing the Time to Discover and Recover
sponsored by Intel Security
WHITE PAPER: You need a new philosophy that'll reduce manual intervention, cut management complexity and optimize existing resources in order to reduce mitigation times. Discover an automated, analytics driven threat defense lifecycle that will give you the best opportunity for long-term, sustainable success in staying in front of security threats.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

The Threat Defense Lifecycle: Intelligent Endpoint Threat Defense
sponsored by Intel Security
WHITE PAPER: Adopt a threat defense lifecycle that will allow you to discover threats faster, respond quicker and overall outsmart attackers, driving business efficiency forward. Learn how to then apply these insights to an automated policy that can block similar attack attempts up front.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

Seven Steps to Ease the Pain of Managing a SOC
sponsored by Intel Security
WHITE PAPER: Discover seven steps that will help SOC managers improve their ability to spot and eradicate threats at several points in the IT ecosystem, from the data center to the endpoint, both onpremises and in the cloud. Learn new, real-world solutions that simplify management, improve detection, and increase the speed of mitigation.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

Ransomware Response Guide
sponsored by IBM
WHITE PAPER: The document is intended to be a guide for organizations faced with a ransomware infection. If you are currently experiencing a ransomware incident, it is recommended you review this guide immediately.
Posted: 26 Jul 2016 | Published: 01 May 2016

IBM

Neutralize Emerging Threats: Reducing the Time to Discover and Recover Transcript
sponsored by Intel Security
WHITE PAPER: Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.
Posted: 29 Jun 2016 | Published: 01 May 2016

Intel Security

Why Traditional Security Fails
sponsored by Intel Security
WHITE PAPER: Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure and shows you four key areas to focus on when implementing a new, more efficient security solution.
Posted: 27 Jun 2016 | Published: 01 May 2016

Intel Security
51 - 75 of 459 Matches Previous Page    1 2 3 4 5 6    Next Page
 
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement