Software  >  

Malware

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
Malware Reports
1 - 25 of 959 Matches Previous Page  |  Next Page
Ransomware: Mitigating the Threat
sponsored by Zerto
WHITE PAPER: Discover more about recent advancements in ransomware, where it's going and what you can do you protect your files. Learn steps you must take before a ransomware attack hits to ensure its crippling affects don't threaten your business.
Posted: 07 Dec 2016 | Published: 30 Nov 2016

Zerto

A Powerful Next-Gen Antivirus Solution
sponsored by Carbon Black
WEBCAST: Traditional AV simply doesn't cut it anymore. Discover how to stop new and emerging malware threats, including zero-day ransomware attacks, from owning your database and holding your data hostage. Empower your security team to stop the most attacks, see more threats and close more security gaps.
Posted: 05 Dec 2016 | Premiered: Nov 30, 2016

Carbon Black

The Cyber Threat Guide
sponsored by LogicNow
EBOOK: This e-book describes the 9 types of attacks a typical network faces and offers some of the successful mitigation strategies IT professionals have used against them.
Posted: 02 Dec 2016 | Published: 30 Nov 2016

LogicNow

Incident Response
sponsored by Arctic Wolf Networks, Inc.
WEBCAST: This webcast looks at the steps you should take to respond to a security incident and to develop your own incident response plan.
Posted: 22 Nov 2016 | Premiered: Jul 11, 2016

Arctic Wolf Networks, Inc.

Market Analysis for 18 Featured Endpoint Protection Platforms
sponsored by Trend Micro
WHITE PAPER: Endpoint protection platforms (EPPs) provide a collection of security capabilities to protect PCs, smartphones and tablets. Learn from analysts about 18 featured EPPs with capabilities such as anti-malware, personal firewall, and more.
Posted: 22 Nov 2016 | Published: 01 Feb 2016

Trend Micro

Ransomware: 3 Seconds to Encryption
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Discover eye-opening ransomware statistics and figures in this short infographic. You'll learn just how rampant the ransomware problem has become among small businesses, but also discover how you can protect your organization to combat ransomware effectively.
Posted: 21 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

Resource Center: Stop Threats and Prevent Data Loss
sponsored by Intel Security
RESOURCE: Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.
Posted: 21 Nov 2016 | Published: 30 Sep 2016

Intel Security

State of the Internet Report Q3 2016
sponsored by Akamai
WHITE PAPER: This reports leverages cybersecurity data from around the world to show you how organizations fared against cyberattacks in Q3 2016. You'll learn statistics and see figures illustrating which industries were hit hardest and in what areas. Uncover what you should do in the year ahead to protect your enterprise.
Posted: 21 Nov 2016 | Published: 31 Oct 2016

Akamai

State of the Internet Executive Summary
sponsored by Akamai
WHITE PAPER: This report shows you up-to-date statistics on cybersecurity. Better enable your business to make intelligent, strategic decisions based on the information you'll learn.
Posted: 21 Nov 2016 | Published: 31 Oct 2016

Akamai

Resource Center: How to Safeguard Data
sponsored by Intel Security
RESOURCE: This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

Intel Security

Mitigate Security Risks with Hyperconverged Infrastructure
sponsored by SimpliVity
WHITE PAPER: Improve your security posture and best mitigate risks by implementing comprehensive security measures across your entire enterprise - from the network perimeter to the application layer. Discover how a hyperconverged infrastructure limits potential points of attack and consolidates security controls.
Posted: 18 Nov 2016 | Published: 31 Dec 2015

SimpliVity

From Reactive to Proactive: How to Avoid Alert Fatigue
sponsored by ThreatConnect
WHITE PAPER: Learn how to prioritize security alerts and reduce alert fatigue. Discover how to achieve active response, allowing you to respond to attacks as quickly as they are detected.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

ThreatConnect

IoT Guardian for the Healthcare Industry
sponsored by Zingbox
WHITE PAPER: Last year, healthcare was the most attacked industry, and 17% of documented attacks were facilitated through IoT medical devices. Download this white paper and discover how to fully protect your network from vulnerable or compromised medical devices – a healthcare organization's weakest link.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

Zingbox

Four Countermeasures to Protect Against Ransomware
sponsored by Trend Micro
WHITE PAPER: Organizations must treat mitigating the risks associated with ransomware as strategic imperative. Learn about a prescriptive approach to do so based on 4 countermeasures curated by ESG, that align with the kill chain to effectively thwart these attacks.
Posted: 18 Nov 2016 | Published: 31 Aug 2016

Trend Micro

Best Practices for Ransomware Detection and Remediation
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Ransomware is a booming business for cybercriminals, and right now it's bigger than ever. Learn how ransomware attacks work and discover best practices to keep your files secure and your organization protected.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

Dynamic Security Management for a Productive Mobile Workforce
sponsored by RES Software
WHITE PAPER: This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.
Posted: 17 Nov 2016 | Published: 24 May 2016

RES Software

Remove the Security Blind Spots Created by Encrypted Traffic
sponsored by Blue Coat Systems
WHITE PAPER: Discover how to get the visibility and control you need over encrypted traffic to ensure compliance with privacy and regulatory policies. Enable your organization to cost-effectively eliminate blind spots within your environment and maximize the effectiveness of your security infrastructure investments overall.
Posted: 17 Nov 2016 | Published: 31 Oct 2016

Blue Coat Systems

Conquer Threats with Collaborative, Scalable Security Intelligence
sponsored by IBM
WHITE PAPER: Meet new and sophisticated security threats head-on with adaptable SIEM tools that can scale as your organization does. Discover the power to act at scale with a fast and easy, cost-effective method to meet changing security needs.
Posted: 17 Nov 2016 | Published: 31 Oct 2016

IBM

The business of Ransomware: What every CXO should know
sponsored by Code42
WHITE PAPER: Learn the hard numbers of how bad ransomware has gotten in recent years, why criminals are launching these attacks in ever-increasing numbers, and how to develop an effective strategy to combat this threat.
Posted: 16 Nov 2016 | Published: 16 Nov 2016

Code42

2016 Global Cyber Threat Defense Report
sponsored by Blue Coat Systems
RESOURCE: This cyber threat defense report aims to inform the IT security community about how their global peers are defending against threats and changes they expect to make moving forward.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Blue Coat Systems

Barbarians at the Gate - Shoring Up Web Application Defenses with Client Reputation
sponsored by Akamai
WHITE PAPER: Web application firewalls (WAFs) have become increasingly useful in mitigating cyberthreat risk to online assets for many companies. Learn how this and other cloud security approaches should be used in combination as part of your comprehensive defense strategy.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Akamai

Modern Cybercrime - What's Happening, Why it's Happening and How You Can Respond
sponsored by Trustwave
WHITE PAPER: Learn about recent instances of cyberattacks to better understand how they operate and what damage they cause. Stay ahead of cybercriminals and out of tomorrow's headlines by ensuring you're operating securely and your incident response plan is ready for prime time.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Trustwave

Managed Security Services Provider (MSSP) Decision Guide
sponsored by Trustwave
WHITE PAPER: What key areas should you be thinking about when making the critical decision to ally with a Managed Security Service Provider (MSSP)? This decision guide offers key questions and considerations to help you select an MSSP and evaluate their solutions to best secure your business.
Posted: 15 Nov 2016 | Published: 31 Oct 2016

Trustwave

Threats and Mitigations: A Guide to Multi-Layered Web Security
sponsored by Akamai
EBOOK: Discover the various types of threats that plague internet resources, the necessary elements of an adequate web security tool, and the options available to you. Plus, learn 5 steps to improve your web application security profile.
Posted: 15 Nov 2016 | Published: 31 Oct 2016

Akamai

Do You Need Malware Protection on a VDI Thin Client?
sponsored by Dell, Microsoft and Citrix
EGUIDE: There are plenty of options for VDI thin client devices out there, and most are safe to use without antimalware software. But there are some thin client models that should have added malware protection. Learn which thin client needs extra protection and why.
Posted: 15 Nov 2016 | Published: 15 Nov 2016

Dell, Microsoft and Citrix
1 - 25 of 959 Matches Previous Page    1 2 3 4    Next Page
 
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement