Software  >  

Malware

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
Malware Reports
1 - 25 of 844 Matches Previous Page  |  Next Page
How to Keep Your Organization Safe from Advanced Malware
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Learn how to defend against advanced malware, analyze a wide range of file types, and utilize a flexible architecture to block network threats while optimizing performance. Access now to uncover how to not only know what's happening on your network at all times, but also leverage rich reporting and monitoring.
Posted: 12 Jan 2017 | Published: 12 Jan 2017

WatchGuard Technologies, Inc.

Smart Strategies To Protect Your Email From Phishing and CEO Fraud
sponsored by Mimecast
WEBCAST: Join cybersecurity and info tech pros Howard Cohen and Orlando Scott-Cowley as they reveal how cybercriminals and employees alike increase the efficacy of phishing attacks, as well as strategies to prevent your email from these attacks.
Posted: 11 Jan 2017 | Premiered: Jan 11, 2017

Mimecast

Resetting Your Email Security Strategy
sponsored by Mimecast
WHITE PAPER: Don't join the growing list of companies suffering multi-million dollar financial losses. Learn how the right mix of leadership and technology can help prevent attacks when you focus on ongoing education and training, use technology to detect potential phishing, and 4 more.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

Mimecast

New Email-Borne Malware Campaign Highlights Danger Of Over Reliance On Sandboxes
sponsored by Mimecast
WHITE PAPER: Today, new tools are able to convert potentially harmful read-only attachments into safe versions without being delayed by sandboxing. Learn more about tools that can ensure all original email attachments are sandboxed by an appropriately advanced email security gateway.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

Mimecast

Malware Prevention vs. Detect and Respond
sponsored by Dell, Inc. & Intel®
WHITE PAPER: Access this white paper to examine current attack detection strategies that are rapidly gaining popularity, as well as the pitfalls of pure post-execution strategies. You will also get to the core of the malware detection problem and learn why prevention is the best security approach.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

Dell, Inc. & Intel®

Insights Into How Math Can Defeat Malware
sponsored by Dell, Inc. & Intel®
WHITE PAPER: Malware has always evolved faster than security measures could keep up...until now. Access this white paper to learn about a math and machine-learning approach that enables you to identify potential threats based on mathematical risk factors, so that you can make the right decisions in real time.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

Dell, Inc. & Intel®

Best Practices for Dealing With Phishing and Ransomware
sponsored by SingTel
WHITE PAPER: Learn how to counter the modern threat landscape of phishing, ransomware, and other malware. An enterprise's defense against such malignant activates can mean the difference between success and going out of business.
Posted: 05 Jan 2017 | Published: 30 Sep 2016

SingTel

Exploit Kits: Getting In by Any Means Necessary
sponsored by Palo Alto Networks
WHITE PAPER: This white paper explores the concept of exploit kits and how to defend against them. Uncover tips for reducing your attack surface, blocking known malware and exploits, identifying new threats, and more.
Posted: 19 Dec 2016 | Published: 19 Dec 2016

Palo Alto Networks

Stop Ransomware Before it Starts
sponsored by Carbon Black
EBOOK: There is no single solution to beat ransomware. Learn the history behind ransomware, how it works, and what you can do to protect your valuable assets. Through proper planning and preparations, you can defend your organization and protect your valuable assets.
Posted: 15 Dec 2016 | Published: 30 Nov 2016

Carbon Black

How to Identity Web Threats in Real-Time
sponsored by Blue Coat Systems
WHITE PAPER: Discover how you can achieve real-time web protection and dynamic malware scanning in your existing security infrastructure. Learn how you can quickly enforce network access policies, instantly report on web threats and user activity, and more.
Posted: 15 Dec 2016 | Published: 30 Nov 2016

Blue Coat Systems

Secure and Accelerate User Access to Web Applications
sponsored by Blue Coat Systems
WHITE PAPER: Learn how to secure and accelerate web applications using Web Application Firewall (WAF) deployments in trusted and untrusted web environments. Deliver the fast, latency-free web experience users expect from anywhere and to any device.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Blue Coat Systems

Best Practices for Dealing With Phishing and Ransomware
sponsored by KnowBe4
WHITE PAPER: This Osterman Research white paper focuses on current problems in security with phishing and ransomware, and gives recommendations on how to mitigate these threats. Learn how to implement security awareness training for all users, maintain quality backups and implement detection and elimination systems for your network.
Posted: 14 Dec 2016 | Published: 30 Sep 2016

KnowBe4

Best Practices for Dealing with Phishing and Next-Generation Malware
sponsored by KnowBe4
WHITE PAPER: This Osterman Research study focuses on the current security problems with email and other systems, and offers recommendations about how to improve security. Learn how to combat phishing and next-gen malware threats through a variety of best practices, beginning with user training.
Posted: 14 Dec 2016 | Published: 30 Apr 2015

KnowBe4

Secure Email Against Targeted Phishing Attacks
sponsored by Blue Coat Systems
WHITE PAPER: To protect against targeted phishing attacks and other email-borne malware, you need the ability to identify infected traffic before your users click on it. Discover how you can extract malicious content from all emails before they hit your users' inboxes and neutralize attacks early without impacting user experience.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

Blue Coat Systems

Accelerating Your Incident Response & Improving Your Network Forensics
sponsored by Blue Coat Systems
WHITE PAPER: Network visibility is key to insightful security intelligence. Learn how to protect your workforce, fortify your network and improve overall security processes with complete visibility and streamlined forensics.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

Blue Coat Systems

The History of Ransomware
sponsored by KnowBe4
WHITE PAPER: Learn a brief history of ransomware, its evolution and the different malware families it's been a part of. By understanding where ransomware came from and how it's attacked in the past, you can best predict where it's going in the future and design an effective defense strategy for your organization.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

KnowBe4

The Phishing Breakthrough Point
sponsored by KnowBe4
WHITE PAPER: Habits take time to form and become part of one's daily life – the same applies to being cyber street-smart about phishing prevention. Learn how to create a more effective phishing awareness training program through deeper analysis of the human landscape of your organization.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Employees at the Frontline in the Battle Against Ransomware
sponsored by KnowBe4
WHITE PAPER: In crunch time, it's all up to your employees to defend your critical information. Enable them to protect your organization sufficiently with proper security training and education in place. With well-trained personnel on the frontlines, you can ensure your organization stays safe from the crippling effects of ransomware.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Firewall Sprawl: Four Security Gaps Exposed
sponsored by FireMon
WHITE PAPER: Discover the truth surrounding next-generation firewalls (NGFWs). Learn the four firewall security gaps that could be putting your organization at risk, and the proper management processes to patch those gaps.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

FireMon

Redefining Next-generation Endpoint Security Solutions
sponsored by Intel Security
WHITE PAPER: Discover how to streamline security operations using next-generation endpoint security. Learn about new tools built for centralization, consolidation and integration that can help you prevent advanced malware from infecting your endpoints and crippling your organization.
Posted: 09 Dec 2016 | Published: 01 Oct 2016

Intel Security

Block Zero-Day Threats Before They Hit Endpoints
sponsored by Intel Security
WHITE PAPER: Learn how to block 99.5% of malware from the web and drastically reduce the amount of time and resources needed for clean-up. Create a more effective and efficient IT environment with automated intelligence built to detect zero-day malware and other emerging threats.
Posted: 09 Dec 2016 | Published: 30 Nov 2016

Intel Security

Neutralize Threats with a Collaborative Security Fabric
sponsored by Intel Security
WHITE PAPER: Discover how to get ahead of today's advanced threats and remediate attacks in a timely manner. Manage security operations faster by integrating all defenses across the threat lifecycle into a single collaborative fabric, enabling your organization to make smarter, more efficient security decisions.
Posted: 09 Dec 2016 | Published: 30 Nov 2016

Intel Security

Ransomware: A Hostage Rescue Manual
sponsored by KnowBe4
WHITE PAPER: Learn the different types of ransomware, how to spot them and how to prevent an attack against your files. Should you become infected, learn the steps you must take to best protect your assets and how to avoid future ransomware attacks.
Posted: 09 Dec 2016 | Published: 30 Nov 2016

KnowBe4

5 Ways to Prevent a Ransomware Infection through Network Security
sponsored by Fortinet, Inc.
EGUIDE: What can you do to protect yourself from initial ransomware infection? And if ransomware gets into one system, how can you stop it from spreading to others? This expert e-guide details 5 ways to prevent a ransomware infection through network security.
Posted: 14 Dec 2016 | Published: 12 Dec 2016

Fortinet, Inc.

The Rise of Fileless Malware Attacks
sponsored by Fortinet, Inc.
EGUIDE: This expert e-guide looks at how fileless malware works, how it's becoming more sophisticated, and what you can do to protect yourself from such threats.
Posted: 13 Dec 2016 | Published: 12 Dec 2016

Fortinet, Inc.
1 - 25 of 844 Matches Previous Page    1 2 3 4    Next Page
 
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement