Software  >  

Malware

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
MalwareReports
1 - 25 of 622 Matches Previous Page  | Next Page
What's Behind a Cyber Attack?
sponsored by IBM
WHITE PAPER: This white paper analyzes the shortcomings of many current approaches to breach investigation, and also introduces one solution to help organizations to defend against advanced persistent and internal threats.
Posted: 29 Jul 2014 | Published: 30 Apr 2014

IBM

A Multilayered Defense Approach to Protect Your Organization's Data
sponsored by Symantec Corporation
WHITE PAPER: This white paper details the types of attacks that enterprises commonly face, and it introduces a multilayered solution that could be a valuable investment for your organization in the face of these threats.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

Symantec Corporation

The Top 8 Mobile Security Risks: How to Protect Your Organization
sponsored by BlackBerry
WHITE PAPER: This white paper outlines the key issues CIOs need to be on top of right now to protect their organization, employees, and customers. Read on to find out the top 8 mobile security risks and how to maintain protection.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

BlackBerry

Protecting your Customers’ Online Banking Transactions Using the ActivID® Threat Detection Service
sponsored by HID
WHITE PAPER: This white paper introduces a solution that helps financial institutions mitigate the risks of even the most sophisticated malware.
Posted: 25 Jul 2014 | Published: 24 Mar 2014

HID

Free Trial: Real-Time Threat Detection and Security Visibility from Day 1
sponsored by AlienVault
SOFTWARE DOWNLOAD: This resource contains a free 30-day trial of an innovative new Unified Security Management platform, designed and priced to aid mid-market organizations in obtaining complete security visibility and advanced threat intelligence.
Posted: 24 Jul 2014 | Premiered: 24 Jul 2014

AlienVault

ActivID® Threat Detection Service
sponsored by HID
WHITE PAPER: Discover a threat detection service that uses revolutionary identification technology to protect against fraud and data breaches.  Read on to find out how it works in combating threats and the benefits of implementing a detection service.
Posted: 24 Jul 2014 | Published: 03 May 2013

HID

IBM X-Force Threat Intelligence Quarterly, 6/14: The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

Live Demo: How to Detect a Cryptolocker Infection
sponsored by AlienVault
WEBCAST: This informative webcast explains how CryptoLocker, a type of ransomware, gains access to your computer, and how to use a Unified Security Management platform to monitor and detect these dangerous threats.
Posted: 23 Jul 2014 | Premiered: Jul 23, 2014

AlienVault

Memory corruption attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Sharing knowledge to tackle online banking fraud
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that an information sharing service between national banking systems and law enforcement agencies could counteract online fraud.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Combatting APTs with a Defense-in-Depth Security Approach
sponsored by CDW Corporation
WHITE PAPER: This informative white paper contains critical information on why a defense-in-depth security approach has proven effective in protecting organizations' sensitive data from APTs.
Posted: 22 Jul 2014 | Published: 05 Mar 2014

CDW Corporation

IPS/IDS: Innovations, Changes and How to Solve Your Problems
sponsored by IBM
EGUIDE: This expert e-guide explores recent innovations to IDS/IPS technologies and outlines strategies for solving breach detection issues.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

IBM

Easy-to-Manage Security Solutions for Today's Threats and Technologies
sponsored by CDW Corporation
WHITE PAPER: This informative white paper describes one company's easy-to-manage security solutions, which are prepared to confront today's evolving threats and emerging technologies.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

CDW Corporation

Webcast: Security Threat Intelligence
sponsored by CDW Corporation
WEBCAST: This web seminar provides an overview of the current malware landscape, including a discussion of the impact that data breaches have on businesses today.
Posted: 18 Jul 2014 | Premiered: Apr 30, 2014

CDW Corporation

Protecting Your Data and Network from Advanced Security Threats
sponsored by CDW Corporation
WHITE PAPER: This white paper discusses one company's approaches to mobile security, cloud security, and malware protection and detection, and also provides a number of recommendations for improving your business's productivity, security, and peace of mind.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

CDW Corporation

Next-Generation Security: Intrusion Prevention Systems
sponsored by CDW Corporation
WHITE PAPER: This white paper describes how an intrusion prevention system (IPS) works and why it's more effective than traditional firewalls in analyzing your network activity to detect and prevent problems.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

CDW Corporation

Top 5 Malware Trends for 2014 and How to Combat Them
sponsored by Webroot
WHITE PAPER: This white paper describes the top five malware trends that are expected to grow throughout this year and the ways that your enterprise can protect its sensitive data.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

Webroot

After Malware: The Next Mobile Security Battle
sponsored by Sophos, Inc.
WEBCAST: In this webcast, you will find that malware is here to stay, yet it's not the only threat that we need to be aware of. Watch now to understand the battle beyond malware, considering vulnerable applications, advanced adversaries, and the enemy within.
Posted: 17 Jul 2014 | Premiered: Jul 7, 2014

Sophos, Inc.

Security Solutions for Every Layer of Your IT Environment
sponsored by CDW Corporation
RESOURCE: View this infographic now to learn about critical security concerns within every layer of your IT environment and the steps that you can take to prevent these dangerous threats.
Posted: 16 Jul 2014 | Published: 16 Jul 2014

CDW Corporation

Top Tips for Managing a Mobile Workforce
sponsored by GFI Cloud
WHITE PAPER: This white paper introduces several tips for managing and protecting a mobile workforce, including solutions compatible with cloud computing.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

GFI Cloud

Automated Removal of Advanced Threats: Defending Your Enterprise with Bob Gourley
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This report from CTOvision introduces automated threat removal, an economical defense method that enables businesses to have an "invisible workforce" working around the clock to ward off attackers.
Posted: 14 Jul 2014 | Premiered: Jun 16, 2014

Hexis Cyber Solutions Inc

Multi-Layered Security
sponsored by GFI Cloud
WHITE PAPER: Discover several key controls for robust SMB malware defenses and learn about several popular attacks that cybercriminals have been known to use.
Posted: 14 Jul 2014 | Published: 31 Dec 2013

GFI Cloud

The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report
sponsored by Neustar®
WHITE PAPER: This white paper reveals valuable insights into the impact of DDoS smokescreening based on a survey of 440 North American companies.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Neustar®

It's Time for a Serious Talk: 3 Questions to Ask Your DNS Host about Lowering DDoS Risks
sponsored by Neustar®
WHITE PAPER: This white paper provides answers to three questions about DDoS attacks that you need to ask your DNS host before, not after, your company becomes a target.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Neustar®

Imperva Security Solutions
sponsored by Imperva
WHITE PAPER: This whitepaper describes a comprehensive security suite that protects digital assets in their repositories and detects abnormal behaviors from compromised users to protect sensitive company data from intruders.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Imperva
1 - 25 of 622 Matches Previous Page    1 2 3 4    Next Page
 
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement