Software  >  

Malware

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
Malware Reports
1 - 25 of 647 Matches Previous Page  |  Next Page
Enhance Your Malware Protection
sponsored by IBM
WHITE PAPER: This white paper describes a malware protection that can accurately identify even the most advanced malware.
Posted: 06 Mar 2015 | Published: 31 Aug 2014

IBM

Case Study: How a Global 1000 Company Adapted Their Security
sponsored by IBM
WHITE PAPER: Read this exclusive report to discover how a global 1000 company successfully adapted their security for the BYOD era.
Posted: 06 Mar 2015 | Published: 31 Aug 2014

IBM

How to Fight Advanced Threats
sponsored by IBM
WHITE PAPER: This white paper examines how and why enterprises have failed to protect themselves against advanced threats and gives suggestions for better security.
Posted: 06 Mar 2015 | Published: 31 Jan 2015

IBM

Cyber Risk Report 2015 - Executive Summary
sponsored by Hewlett-Packard Company
WHITE PAPER: The HP Cyber Risk Report 2015 provides a broad overview of the threat landscape and how hackers operate.
Posted: 05 Mar 2015 | Published: 28 Feb 2015

Hewlett-Packard Company

2015 Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: The HP Cyber Risk Report 2015 provides a broad view of the 2014 threat landscape and gives you the information you need to protect your business.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

Hewlett-Packard Company

Recognizing a Zero-Day Attack Before It's Too Late
sponsored by Check Point Software Technologies Ltd.
RESOURCE: In this infographic, learn how one cloud-based malware emulation platform can help protect your sensitive data and files from cyberattacks. View now to learn more.
Posted: 04 Mar 2015 | Published: 07 Jan 2015

Check Point Software Technologies Ltd.

Holistic Fraud Prevention: Transforming the Customer's Experience
sponsored by IBM
WHITE PAPER: Cybercriminals continue to attack financial institutions, using increasingly sophisticated malware and phishing techniques. Current fraud prevention solutions struggle to keep pace with these advances and, unfortunately, increasingly interfere with customers' online experiences. Find out how to thwart these attacks in the following white paper.
Posted: 04 Mar 2015 | Published: 04 Mar 2015

IBM

Is it Phishing or an APT?
sponsored by Threat Track Security
WHITE PAPER: In this white paper, learn the three mechanisms of a phishing email attack and how one security platform can fill the gaps in your defense strategy.
Posted: 04 Mar 2015 | Published: 11 Feb 2015

Threat Track Security

Endpoint application protection: Malware's worst enemy
sponsored by IBM
WHITE PAPER: The key to eliminating cybercrime is to eliminate malware. And the key to eliminating malware is to fight it head on by using endpoint application protection. Find out how to do so in the following white paper.
Posted: 04 Mar 2015 | Published: 04 Mar 2015

IBM

Realize the Serious Economic Impact of Advanced Persistent Threats
sponsored by IBM
WHITE PAPER: View this informative report to learn how detrimental APTs can be for your organization, particularly pertaining to your finances.
Posted: 03 Mar 2015 | Published: 01 May 2014

IBM

Uncover the Top Ten Database Threats That Could Affect Your Business
sponsored by Imperva
WHITE PAPER: This white paper highlights the top ten threats that affect traditional databases as well as Big Data technologies.
Posted: 03 Mar 2015 | Published: 31 Dec 2014

Imperva

The Best and Worst Antivirus Platforms Compared
sponsored by Check Point Software Technologies Ltd.
WEBCAST: In this webcast, watch as top anti-malware platforms go head to head and see who has the best catch rates of known and unknown attacks and who lets the most slip through the cracks. View now to learn more.
Posted: 03 Mar 2015 | Premiered: Aug 25, 2014

Check Point Software Technologies Ltd.

Find Out What Malware is in that File
sponsored by Check Point Software Technologies Ltd.
PRODUCT DEMO: Access this resource to test a threat emulation platform to uncover malicious attacks hiding in what appear to be routine files.
Posted: 03 Mar 2015 | Premiered: 04 Feb 2015

Check Point Software Technologies Ltd.

Preventing Malware: Every Second Counts
sponsored by Check Point Software Technologies Ltd.
WEBCAST: View this brief webcast to examine a comparison of several leading anti-malware platforms. Watch now to learn how one solution kept malware off of the network and emulated it within four minutes.
Posted: 02 Mar 2015 | Premiered: Nov 11, 2014

Check Point Software Technologies Ltd.

The Four Key Elements of Fraud Prevention
sponsored by IBM
WHITE PAPER: This white paper helps you stop fraud by outlining the four key elements of holistic fraud prevention.
Posted: 02 Mar 2015 | Published: 31 Aug 2014

IBM

Test Results for 5 Security Systems
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This report summarizes tests conducted on five different security programs, revealing which ones caught the most threats, had the best usability, and more.
Posted: 02 Mar 2015 | Published: 18 Nov 2014

Check Point Software Technologies Ltd.

Traps Advanced Endpoint Protection: Technology Overview
sponsored by Palo Alto Networks
WHITE PAPER: This white paper describes a security approach that provides protection before the attacks can penetrate.
Posted: 02 Mar 2015 | Published: 30 Nov 2014

Palo Alto Networks

Insider Strategies for Application Layer Security
sponsored by Veracode, Inc.
WEBCAST: Join in this webcast to learn how a testing strategy can secure all of your apps and how one cloud-based service can help.
Posted: 27 Feb 2015 | Premiered: Feb 25, 2015

Veracode, Inc.

Top Malware Security Platforms Compared
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: View this white paper for a comparison of the leading malware security platforms to see who comes out on top and who lets attacks slip through the cracks. Read on to learn more.
Posted: 26 Feb 2015 | Published: 21 Aug 2014

Check Point Software Technologies Ltd.

Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This in-depth white paper can help you discover the latest security threats and how to stop them.
Posted: 26 Feb 2015 | Published: 31 Dec 2014

Dimension Data

Financial Malware Explained
sponsored by IBM
WHITE PAPER: This white paper gets you inside the head of a fraudster and gives you insight into how they work.
Posted: 25 Feb 2015 | Published: 31 Dec 2014

IBM

Old Techniques in a New Channel: The Evolving Threats of Mobile Banking
sponsored by IBM
WHITE PAPER: This white paper describes in detail the attacks mobile banking users face.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

IBM

10 Ways Everyone Should Approach Cybersecurity in 2015
sponsored by Global Knowledge
WHITE PAPER: This paper reviews key security issues and focuses attention on 10 responses that we all need to adopt in our approach to security in 2015.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

Global Knowledge

The Next Generation of Fraud Detection
sponsored by IBM
WHITE PAPER: This white paper describes how system provides advanced fraud detection to combat more threats.
Posted: 24 Feb 2015 | Published: 30 Nov 2014

IBM

Get Inside the Thriving Malware Industry
sponsored by IBM
WHITE PAPER: This white paper helps you understand how a malware attack works by getting you inside the mind of a hacker.
Posted: 24 Feb 2015 | Published: 31 Jan 2014

IBM
1 - 25 of 647 Matches Previous Page    1 2 3 4    Next Page
 
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement