Software  >  

Malware

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
Malware Reports
1 - 25 of 909 Matches Previous Page  |  Next Page
Gartner Research Paper Enterprise Firewall
sponsored by Fortinet, Inc.
WHITE PAPER: This Gartner Report shows you how to take on a unified security posture for your entire borderless network. Automate your threat remediation actions and minimize breach intervals. With one universals network operating system, you don't need to choose between security or performance - have both and manage it all from one single pane of glass.
Posted: 23 May 2016 | Published: 01 Apr 2016

Fortinet, Inc.

Complete Data Protection
sponsored by Intel Security
WHITE PAPER: Discover how to stop data loss initiated by sophisticated malware that hijacks sensitive information. Implement and enforce organization-wide security policies that control how data is encrypted, monitored and protected from a central console.
Posted: 23 May 2016 | Published: 01 Apr 2016

Intel Security

When App is the Business, the Business is the App Vol. 2
sponsored by IBM MaaS360
WHITE PAPER: Empower your organization with a mobile application strategy that advances your business while providing scalability, sustainability and security. Learn how to design your business around applications without putting enterprise data at risk.
Posted: 20 May 2016 | Published: 01 Apr 2016

IBM MaaS360

Is data leaking out on your watch?
sponsored by Intel Security
RESOURCE: Learn more about where threats initiate and the tactics cyber criminals use to steal your data. Discover what measures you can take to make sure your organization isn't the next highly publicized breach victim.
Posted: 19 May 2016 | Published: 01 Apr 2016

Intel Security

2015 the Year Data Breaches Got Personal
sponsored by Gemalto
WHITE PAPER: Data breaches continue to be a large and growing threat for organizations in all industries. Many are clinging to conventional ways of looking at cyber security rather than taking a newer approach. With this cybercrime data, you'll be able to formulate a modern security strategy to stay ahead of evolving threats and hackers.
Posted: 18 May 2016 | Published: 31 Dec 2015

Gemalto

Mobile is the New Playground for Thieves
sponsored by IBM MaaS360
WHITE PAPER: You need to modernize your security with a robust way to proactively detect, analyze and remediate new mobile threats. Learn the true cost of a data breach and how to best implement your own BYOD policy.
Posted: 18 May 2016 | Published: 31 Dec 2015

IBM MaaS360

SB Enterprise Firewall
sponsored by Fortinet, Inc.
RESOURCE: Network firewall security must evolve to secure the extended enterprise. You need end-to-end network security that protects the entire attack surface from IoT to cloud. Take a more collaborative approach across your entire network infrastructure to deploy a dynamic, long term defense strategy.
Posted: 18 May 2016 | Published: 01 Apr 2016

Fortinet, Inc.

Security essentials for CIO's enabling mobility - their device, your data
sponsored by IBM MaaS360
WHITE PAPER: Your goal is to make BYOD policies feasible by seamlessly securing corporate data on the device while providing logical separation from personal activities. Learn five key steps you should consider before putting your BYOD program in place.
Posted: 18 May 2016 | Published: 31 Dec 2012

IBM MaaS360

Practical Guide to IT Security Breach Prevention Part II
sponsored by Kaspersky Lab
EBOOK: With users connecting to unsecured public networks and social media platforms on both company-owned and personal devices, sensitive data can now be accessed--and lost--from more endpoints than ever before. Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task.
Posted: 16 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Gartner Magic Quadrant for Enterprise Data Loss Prevention
sponsored by Intel Security
ANALYST BRIEF: This report gives you strengths and weaknesses from some of today's best (and worst) integrated data loss prevention (DLP) vendors to help you choose the right DLP solution aligned with your organization's particular security pain points.
Posted: 13 May 2016 | Published: 28 Jan 2016

Intel Security

Stop Data Exfiltration
sponsored by Intel Security
RESOURCE: Gain insight into hackers' motivations and understand which pieces of information are most valuable for them to steal (chances are they're the same ones most valuable to you). Go in depth into data exfiltration secrets to better understand the complexities of how a network is breached and robbed of personal, corporate, and customer information.
Posted: 13 May 2016 | Published: 01 Apr 2016

Intel Security

Keep Your Data Safe for Office 365
sponsored by Intel Security
RESOURCE: Built in DLP capabilities aren't robust enough to stop advanced persistent threats. Access now to learn how you can enhance your cloud data protection and gain expansive, yet flexible policies that will help address threats to your data and risky employee behavior.
Posted: 13 May 2016 | Published: 01 Apr 2016

Intel Security

IT Guide: Protecting Corporate Data Beyond the Firewall
sponsored by Druva Software
WHITE PAPER: 24/7 data monitoring can ensure your important information stays on devices and on networks that you deem safe. Learn how to be proactive in your compliance requirements and stay on top of how your data is handled.
Posted: 13 May 2016 | Published: 01 Apr 2016

Druva Software

Symantec Data Loss Prevention for Cloud
sponsored by Symantec Corporation
DATA SHEET: Not only can you keep total visibility of your enterprise data, but also gain new capabilities to increase workflow. Access now to discover how data loss prevention can secure your cloud data and automate incident response processes and remediation.
Posted: 13 May 2016 | Published: 31 Dec 2015

Symantec Corporation

Secur ing Productivity in the Border less Enterprise
sponsored by Microsoft
WHITE PAPER: The combination of cloud and mobility can allow for great employee productivity and greater customer responsiveness. However, these new business opportunities mean nothing if you can't protect against the new security challenges they bring.
Posted: 13 May 2016 | Published: 01 Apr 2016

Microsoft

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation

How Ransomware Works
sponsored by LogRhythm, Inc.
RESOURCE: Explore what ransomeware is, and the 5 stages of a ransomware attack so that you can prepare for the reality of this growing threat.
Posted: 13 May 2016 | Published: 13 May 2016

LogRhythm, Inc.

Why a Modern Security Architecture Matters
sponsored by Palo Alto Networks
WHITE PAPER: Discover the benefits of an integrated, unified security architecture over the sequential, additive approaches that have evolved the industry. Understand the ability of security architectures to address modern threats while supporting the use of new applications.
Posted: 13 May 2016 | Published: 01 Apr 2016

Palo Alto Networks

The Ransomware Threat - A Guide to Detecting an Attack Before it's Too Late
sponsored by LogRhythm, Inc.
WHITE PAPER: Learn all about ransomware in this white paper, including the 5 phases of a ransomware attack and the 5 steps of defending against one, including: prepare with various security measures, focus on detection, be ready for containment, and 2 more.
Posted: 13 May 2016 | Published: 13 May 2016

LogRhythm, Inc.

Security and CDW- With Threats Detected, Your Business is Protected
sponsored by CDW
WHITE PAPER: Access this white paper for insights on how small businesses can more efficiently handle their security infrastructure. Even without an extensive IT staff, small businesses can deploy a robust, easy-to-manage security platform protecting your data and your reputation.
Posted: 13 May 2016 | Published: 01 Apr 2016

CDW

Internet Security Threat Report: Healthcare
sponsored by Symantec Corporation
EBOOK: This thorough 108-page threat report examines multiple facets of today's threat landscape including targeted attacks, smartphone threats, social media scams and IoT vulnerabilities to help you secure your healthcare system effectively now and into the future.
Posted: 12 May 2016 | Published: 01 Apr 2016

Symantec Corporation

Eissmann Group Automotive Evaluates NextGen Firewall F-Series
sponsored by Barracuda Networks
WHITE PAPER: Learn what went into Eissmann Group Automotive's decision to replace their firewall when their existing routers were reaching their performance limits.
Posted: 12 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Gartner Magic Quadrant for Endpoint Protection Platforms
sponsored by Intel Security
ANALYST REPORT: This Magic Quadrant report direct from Gartner investigates the quality of endpoint protection platforms, capabilities, the depth of features and the ease of control from current endpoint vendors to help you decide the proper endpoint security platform for your organization (and your budget).
Posted: 12 May 2016 | Published: 01 Feb 2016

Intel Security

Gartner Magic Quadrant for Mobile Data Protection Solutions
sponsored by Intel Security
ANALYST REPORT: Access now to learn the pros and cons of mobile security vendors as Gartner's Magic Quadrant for Mobile Data Protection Solutions dissects the current MDP vendor landscape so you can best understand which company can most effectively help you out if you're looking to bolster your mobile data protection initiatives.
Posted: 12 May 2016 | Published: 01 Oct 2015

Intel Security

Practical Guide to IT Security Breach Prevention Part I
sponsored by Kaspersky Lab
WHITE PAPER: For your security policies to be effective, they need to bring all devices and applications under IT control and regulate user behavior. Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task.
Posted: 12 May 2016 | Published: 01 Apr 2016

Kaspersky Lab
1 - 25 of 909 Matches Previous Page    1 2 3 4    Next Page
 
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement