Software  >  

Malware

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
Malware White Papers (View All Report Types)
76 - 100 of 514 Matches Previous Page  |  Next Page
What You Need to Know About Vendor Risk Management in Financial Institutions
sponsored by BitSight
WHITE PAPER: This white paper discusses several proactive tips for better vendor risk management (VRM) practices that you can quickly put into place. Learn to overcome challenges faced within the financial industry for taking on VRM and how you can adopt these security secrets and keep pace with today's growing threat landscape as advanced threats persist.
Posted: 08 Mar 2016 | Published: 29 Feb 2016

BitSight

A Guide to 12 CyberSecurity Metrics You/Your Vendors Should be Watching
sponsored by BitSight
WHITE PAPER: This white paper details 12 actionable metrics that can help you specifically assess how your organization is doing with its current cybersecurity.
Posted: 04 Mar 2016 | Published: 29 Feb 2016

BitSight

Cyber Security Intelligence Index for Manufacturing
sponsored by IBM
WHITE PAPER: This research report offers a high-level overview of the major threats trending across businesses worldwide over the past year.
Posted: 04 Mar 2016 | Published: 31 Dec 2015

IBM

IBM Report: Securing the C-suite
sponsored by IBM
WHITE PAPER: This white paper helps you understand the risks and vulnerabilities your network probably has and how to stop them from being exploited.
Posted: 03 Mar 2016 | Published: 29 Feb 2016

IBM

The ABC of Security Strategy
sponsored by IBM
WHITE PAPER: This white paper highlights challenges organizations typically face in implementing effective security strategies. Learn how to manage risk and gain a competitive advantage in your field.
Posted: 03 Mar 2016 | Published: 31 Jan 2016

IBM

The Forrester Wave: Information Security Consulting Services
sponsored by IBM
WHITE PAPER: This Forrester report details and analyzes the 13 most significant security consulting service providers and their offerings. Access now to learn more about how well these consultancies fulfill security standards to best select the right partner for your business.
Posted: 02 Mar 2016 | Published: 29 Feb 2016

IBM

Open Source Security Needed in Development
sponsored by Black Duck Software
WHITE PAPER: With 4,000 new vulnerabilities disclosed in open source projects each year, you can't afford to use open code without knowing the risk and how to prevent them.
Posted: 24 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Know Your Code: Don't Get Blindsided by Open Source Security Risks During Development
sponsored by Black Duck Software
WHITE PAPER: This white paper teaches you the advantages and disadvantages of using open source software and how you can avoid some of the disadvantages. Access this resource now for considerations your organization should know.
Posted: 23 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Secure and Manage Open Source Software
sponsored by Black Duck Software
WHITE PAPER: This resource reviews a process called, "Open Source Hygiene," which keeps software stacks and application portfolios free of known-exploitable versions of open source code.
Posted: 23 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Open source: What developers and security pros need to know
sponsored by Black Duck Software
WHITE PAPER: Whether you're a developer or security professional, get a firm grip on open source software management, compliance and security risks and solutions you need to know to keep your company safeguarded.
Posted: 22 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Today's Top Intrusion Prevention Systems
sponsored by IBM
WHITE PAPER: This Magic Quadrant presents the strengths and weaknesses of today's top next-generation intrusion prevention system (NGIPS) vendors and outlines what capabilities your security strategy needs. View now to learn how to evaluate NGIPS vendors and platforms.
Posted: 18 Feb 2016 | Published: 16 Nov 2015

IBM

Next-Generation Endpoint Security
sponsored by Carbon Black
WHITE PAPER: This white paper provides a description of the requirements needed for Next-Generation Endpoint Security and the information you need to successfully protect your organization.
Posted: 07 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Breach Detection: What you need to know
sponsored by Carbon Black
WHITE PAPER: This e-book outlines the tactics today's advanced attackers use to steal your sensitive data and why you need a defense-in-depth cybersecurity program that incorporates automatic detection with incident response.
Posted: 03 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Advanced Threat Hunting with Carbon Black Enterprise Response
sponsored by Carbon Black
WHITE PAPER: This white paper covers the capabilities necessary to proactively and efficiently hunt for threats across your enterprise. Learn how to expand detection beyond the point of compromise.
Posted: 02 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Every Second Counts: Unravel the entire attack and disrupt attacker behavior
sponsored by Carbon Black
WHITE PAPER: Access this white paper and find out how one solution can unravel an entire attack and disrupt the attacker's behavior to help you stay ahead. Learn how your organization can benefit from complete endpoint visibility, faster detection of advanced threats, more effective remediation, and much more.
Posted: 02 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Data Sheet: Carbon Black Security Solution Overview
sponsored by Carbon Black
WHITE PAPER: This white paper shows you how to enable your organization to disrupt advanced attacks and deploy the best prevention strategies for your business. Learn how to achieve real-time visibility in your network.
Posted: 01 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Carbon Black Enterprise Protection
sponsored by Carbon Black
WHITE PAPER: This white paper shows you a next-generation endpoint threat prevention solution that delivers a portfolio of protection policies, real-time visibility across environmnet and comprehensive compliance rules in a single platform.
Posted: 01 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Carbon Black Threat Intel
sponsored by Carbon Black
WHITE PAPER: This white paper teaches you how to gain real-time threat detection and analysis to help proactively protect against advanced threats. Find out how you can proactively detect, respond and ban attacks before a breach occurs.
Posted: 29 Feb 2016 | Published: 27 Jan 2016

Carbon Black

Compliance 101: Basics for Security Professionals
sponsored by Carbon Black
WHITE PAPER: This white paper helps security professional and non-professionals alike understand their roles when it comes to compliance.
Posted: 26 Feb 2016 | Published: 31 Jan 2016

Carbon Black

Application Control Observations & Strategies for Success
sponsored by Carbon Black
WHITE PAPER: This white paper provides a blueprint you can adopt to ensure successful application control deployment. It greatly simplifies the process of achieving "high enforcement" in your IT environment.
Posted: 25 Feb 2016 | Published: 27 Jan 2016

Carbon Black

Disrupt Your Adversaries: 5 Steps to Stopping Advanced Threats
sponsored by Carbon Black
WHITE PAPER: This white paper shows you how you can easily integrate with third-party products to make advanced threats easier to see and faster to stop.
Posted: 25 Feb 2016 | Published: 31 Jan 2016

Carbon Black

Transcript: Protecting Your Crown Jewels from Devastating Data Breaches
sponsored by Lancope
WHITE PAPER: Gain deeper visibility into your network using anomaly detection alongside compliance/segmentation monitoring. Identify advanced attacks and protect the crown jewels on your network.
Posted: 25 Feb 2016 | Published: 27 Jan 2016

Lancope

Vulnerability Scanning Tips and Tricks
sponsored by Alert Logic
WHITE PAPER: This white paper teaches you the importance of performing regular scans to identify and reduce vulnerabilities. This is you guide to ensure your scans successfully complete and report properly.
Posted: 24 Feb 2016 | Published: 20 Aug 2015

Alert Logic

Vulnerability Response Best Practices
sponsored by Alert Logic
WHITE PAPER: This white paper gives you a step-by-step approach in responding to vulnerabilities with examples of breaches throughout. Learn how to prepare you network for an attack and how to lessen the potential for security flaws in your network.
Posted: 23 Feb 2016 | Published: 31 Dec 2015

Alert Logic

Understanding the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This white paper outlines your responsibilities in managing your data in your cloud and gives you seven best practices to keep it secure.
Posted: 22 Feb 2016 | Published: 30 Dec 2015

Alert Logic
76 - 100 of 514 Matches Previous Page    2 3 4 5 6 7    Next Page
 
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement