Software  >  

Malware

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
Malware White Papers (View All Report Types)
51 - 75 of 404 Matches Previous Page  |  Next Page
Mitigating User-Based Risks When Infrastructure Monitoring Falls Short
sponsored by ObserveIT
WHITE PAPER: This white paper discusses the roles of trusted insiders versus outsiders in data breaches; identifying activities and intent when it comes to user-based threats; why user-based monitoring is a promising solution; and more.
Posted: 14 Nov 2014 | Published: 31 Oct 2014

ObserveIT

All you need to know about Bash bug and how to protect your data with IBM Endpoint Manager
sponsored by IBM
WHITE PAPER: This white paper examines how the "Bash bug" allows attackers to execute malicious code within a bash shell, allowing them to gain access to confidential information by taking control of the operating system. It also highlights how you can better identify which systems are vulnerable and protect your endpoints and data from this bug.
Posted: 11 Nov 2014 | Published: 26 Sep 2014

IBM

Know Your Endpoints to Prevent Security Breaches
sponsored by IBM
WHITE PAPER: This exclusive whitepaper covers how an IBM assessment can show you how secure your endpoints really are.
Posted: 11 Nov 2014 | Published: 13 Sep 2012

IBM

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

A Consolidated Platform for Next-Generation Firewall and Secure Web Gateway Services
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper first defines next-generation firewalls, secure web gateways, and their capabilities, and then specifically discusses the Fortinet FortiGate NGFW and the results of ESG Lab's evaluation and testing of the device.
Posted: 16 Oct 2014 | Published: 30 Sep 2014

Fortinet, Inc.

Win the Race Against Time to Stay Ahead of Cybercriminals
sponsored by IBM
WHITE PAPER: Discover how IBM Security QRadar Incident Forensics can help enterprises investigate and gather evidence on breaches.
Posted: 09 Oct 2014 | Published: 08 Jul 2014

IBM

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: Learn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
Posted: 08 Oct 2014 | Published: 31 Jan 2013

IBM

How to Protect Your Business From Today's Security Threats
sponsored by Optus Business
WHITE PAPER: This white paper highlights the importance of maintaining robust network security within your enterprise, especially with an evolving threat landscape.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

Optus Business

Information Governance Risks of Microsoft Lync
sponsored by Actiance
WHITE PAPER: The IG risks of deploying Microsoft Lync are similar to those of other electronic communications such as email: malware, data leakage, inappropriate employee use, regulatory noncompliance, and skyrocketing legal costs.Download THIS WHITEPAPER to find out more!
Posted: 19 Sep 2014 | Published: 19 Sep 2014

Actiance

Securosis Analyst Report: Is It Time to Replace Your Current SIEM Solution?
sponsored by IBM
WHITE PAPER: In this in-depth white paper, gain critical insights into how to evaluate, select, and deploy the right SIEM solution for your organization's specific needs.
Posted: 15 Sep 2014 | Published: 28 Feb 2014

IBM

Disrupt Advanced Attacks and Prevent Loss with this Integrated Security Solution
sponsored by IBM
WHITE PAPER: Access this informative whitepaper to explore a new integrated, contextually-aware security solution that provides improved threat detection and prevention across the enterprise.
Posted: 12 Sep 2014 | Published: 31 May 2014

IBM

Reducing the Cost and Complexity of Web Vulnerability Management
sponsored by Symantec
WHITE PAPER: This white paper investigates how to reduce the cost and complexity of Web vulnerability management with a managed approach for detection.
Posted: 05 Aug 2014 | Published: 31 Dec 2012

Symantec

The Power to Destroy: How Malware Works
sponsored by Symantec
WHITE PAPER: Do you know how secure website is? This a dangerous question for the answer to be no to, but nearly a quarter of IT managers simply don't know. And, with the number of attacks on the rise, protection is more imperative than ever.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

Symantec

What's Behind a Cyber Attack?
sponsored by IBM
WHITE PAPER: This white paper analyzes the shortcomings of many current approaches to breach investigation, and also introduces one solution to help organizations to defend against advanced persistent and internal threats.
Posted: 29 Jul 2014 | Published: 30 Apr 2014

IBM

Protecting your Customers’ Online Banking Transactions Using the ActivID® Threat Detection Service
sponsored by HID
WHITE PAPER: Protecting anytime, anywhere access is increasingly difficult using traditional security measures. Discover how organizations are protecting themselves.
Posted: 25 Jul 2014 | Published: 24 Mar 2014

HID

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets with Strong Authentication
sponsored by HID
WHITE PAPER: Learn how organizations protect and manage access to their enterprise and cloud applications during the BYOD phenomenon.
Posted: 11 Jul 2014 | Published: 28 Mar 2014

HID

How Resellers Can Become the Trusted Advisors on Security Issues
sponsored by Webroot
WHITE PAPER: This white paper introduces an innovative endpoint security solution with a completely cloud-based architecture rather than the outdated, signature-based methods of the past.
Posted: 11 Jul 2014 | Published: 31 May 2014

Webroot

IT Executive Guide to Security Intelligence
sponsored by IBM
WHITE PAPER: This helpful guide discusses one company's approach to security intelligence, and how this innovation could entirely change the way that businesses approach threat management.
Posted: 03 Jul 2014 | Published: 31 Jan 2013

IBM

HP Security Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

The Wild World of Malware: Keeping Your Company Safe from Advanced Threats
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth resource, gain essential knowledge on today's advanced malware threats, and discover how new next-generation firewalls (NGFW) can prevent them from gaining access to your valuable data.
Posted: 17 Sep 2014 | Published: 31 Jul 2012

Icomm Technologies

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos, Inc.
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 06 Jul 2014 | Published: 02 Jul 2014

Sophos, Inc.

Five critical steps to achieving an effective application security program
sponsored by IBM
WHITE PAPER: This white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

IBM
51 - 75 of 404 Matches Previous Page    1 2 3 4 5 6    Next Page
 
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement