Software  >  

Malware

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 

Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Malware Reports
1 - 25 of 798 Matches Previous Page  |  Next Page
Security within the Financial Services Industry
sponsored by enSilo
RESOURCE: There has been an increase in "file-less malware" as it goes undetected in most organizations. Attackers' motivation is driven by financial gain, so targeting the banking industry with attacks is common. Take a look at this resource to uncover how to improve security within the financial industry to protect against dangerous malware variants.
Posted: 18 Jan 2018 | Published: 18 Jan 2018


Unified MTD + MARS is the Best Practice for Mobile Security
sponsored by Lookout
WEBCAST: Download this webcast to understand the full mobile risk matrix and discover how mobile threat defense (MTD) combined with mobile app reputation services (MARS) can protect your organization from mobile threats to apps, devices, networks and more.
Posted: 17 Jan 2018 | Premiered: Jan 17, 2018

Lookout

Automated Endpoint Security Realized
sponsored by enSilo
RESOURCE: Modern malware is evolving at a rapid rate and most traditional security defenses are failing to detect it in an efficient timeframe. Take a look at this resource to uncover how to leverage endpoint security to protect against damaging malware attacks targeting your enterprise.
Posted: 16 Jan 2018 | Published: 16 Jan 2018


Broadcast Media Case Study
sponsored by enSilo
CASE STUDY: Explore this case study to gain insight into how companies within the broadcast media industry overcame the challenge of phishing campaigns targeting their enterprises.
Posted: 16 Jan 2018 | Published: 16 Jan 2018


Market Guide for Mobile Threat Defense Solutions
sponsored by Lookout
WHITE PAPER: Download this market guide for mobile threat defense solutions to discover how they can protect your organization at the device, network and application level and compare vendors in the space.
Posted: 16 Jan 2018 | Published: 22 Aug 2017

Lookout

Stripping the Malware Threat Out of PowerShell
sponsored by enSilo
WHITE PAPER: This white paper provides insight into PowerShell and how it is being leeched onto by threat actors. In addition, learn how to protect your endpoints against this increasing threat.
Posted: 15 Jan 2018 | Published: 15 Jan 2018


An Intelligent Response to Rising Threats
sponsored by AdvizeX Technologies
WHITE PAPER: This white paper offers an approach to enhancing your current SIEM approach to improve security and protect against ransomware and malware targeting your enterprise's data.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

AdvizeX Technologies

A Cornerstone for Ransomware Protection & Recovery is Understanding the Threat
sponsored by Carbonite
RESOURCE: In this guide, learn about the ransomware problem in greater detail, as well as some steps, strategies, and best practices to take in order to mitigate the damage of a ransomware attack
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Carbonite

PCI DSS & Your Call Center: The Do's & Don'ts of Compliance
sponsored by Semafone
WEBCAST: According to the Ponemon Institute, on average security breaches cost $4 million annually. To prevent breaches and the large costs that come along with it, complying with policy regulations is important. This webinar provides insight into the importance of the PCI DSS regulation and offers approaches for becoming compliant.
Posted: 09 Jan 2018 | Premiered: Jan 9, 2018

Semafone

Advanced Threats: 4 New Attacks to Get Ahead Of
sponsored by TechTarget
RESOURCE: Uncover how to protect your enterprise against new malware variants and advanced attacks, which are emerging every day by utilizing our brand new guide: Advanced Threats: 4 New Attacks to Get Ahead Of.
Posted: 06 Jan 2018 | Published: 06 Jan 2018

TOPICS:  Malware
TechTarget

2018 Threat Predictions
sponsored by Fortinet, Inc.
WHITE PAPER: As technology continues to evolve, there is a growing criminal element looking to exploit new opportunities the digital society brings. This white paper reveals predictions regarding the future threat landscape, offers insight into specific threats, and provides mitigation tactics to enhance security.
Posted: 13 Dec 2017 | Published: 13 Dec 2017

Fortinet, Inc.

Threat Landscape Report
sponsored by Fortinet, Inc.
RESOURCE: According to the Fortinet Threat Landscape Report, in Q3 of 2017 alone, there were 14,904 unique variants of malware. Explore this 28-page Threat Landscape Report to uncover staggering statistics regarding exploits, malware, and botnets and how you can use the current trends to improve your threat management security posture.
Posted: 11 Dec 2017 | Published: 11 Dec 2017

Fortinet, Inc.

Potentially Dangerous User Accounts Identitifed
sponsored by Janrain
RESOURCE: A company's brand can be severely damaged when fraudulent accounts are created on digital properties with spam, phishing, and program abuse. This data sheet provides insight into protecting your web applications from fraud and various other cyberattacks.
Posted: 07 Dec 2017 | Published: 07 Dec 2017

Janrain

Veeam's 3-2-1 System for Countering Ransomware
sponsored by Veeam Software
WHITE PAPER: In this white paper, learn about the 3-2-1 principle of backup, as well as a system which is built around this strategy to deliver comprehensive ransomware protection by providing tight integration with industry leading storage vendors, WAN acceleration and encryption, and more.
Posted: 27 Nov 2017 | Published: 31 May 2017

Veeam Software

How to Handle a Ransom Driven DDoS Attack
sponsored by Corero Network Security
WHITE PAPER: Corero found that in the first quarter of 2017, their customers experienced an average of 4 DDoS attacks attempts per day. This step-by-step guide offers strategies to protecting against DDoS attacks and the rising ransom-driven DDoS attacks.
Posted: 27 Nov 2017 | Published: 27 Nov 2017

Corero Network Security

The Evolving Risk Landscape
sponsored by F5 Networks
WHITE PAPER: There was nearly a 22% increase in attacks on web applications from 2016 to 2017. While apps have increased productivity, they have also opened the door to unprecedented threats, expanding the risk landscape and putting corporate data at risk. This e-book offers a guide to protecting against web fraud, credential stuffing, ransomware, and phishing.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

F5 Networks

How Malware Can Steal Your Data
sponsored by F5 Networks
EBOOK: 51% of data breaches include malware, according to Verizon's 2017 Data Breach Investigations Report. This e-book provides insight into how malware can steal your data and offers strategies you use to prevent it from happening.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

F5 Networks

Top Cybercrime Threats to Financial Institutions
sponsored by Digital Shadows
WHITE PAPER: The most prevalent cybercrime threats against financial institutions are: the use or sale of ATM malware, targeted network intrusions, data breaches and the use of banking Trojans. Take a look at this white paper to learn more about these financial threats that stem from cybercriminals.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

The Need for Automotive Cybersecurity Testing Standards
sponsored by Synopsys
WHITE PAPER: Most organizations creating connected systems and devices today spend a considerable amount of time looking at security issues, but often lack a standard framework for testing security. Uncover the importance of developing standards for validating and verifying security.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

Synopsys

Top-of-Mind Threats and Their Impact on Endpoint Security Decisions
sponsored by Cylance
WHITE PAPER: According to this ESG report, 91% of cybersecurity professionals express the greatest concern over the threat posed by email phishing. Explore this report to learn how to protect your organization's endpoints against cyberattacks with specific defense strategies, including machine learning.
Posted: 01 Nov 2017 | Published: 01 Nov 2017

Cylance

Next-Generation Anti-Malware Testing for Dummies
sponsored by Cylance
WHITE PAPER: Inside this Next-Generation Anti-Malware Testing for Dummies e-book, learn about next-generation endpoint security techniques and how you can use machine learning and AI to protect against advanced persistent threats.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

Cylance

Five Reasons to Reevaluate Your Current Backup Approach
sponsored by Acronis
WHITE PAPER: By downloading this resource, you'll discover 5 reasons you may need to reevaluate your current backup approach. Read on to see a platform that enables instant recovery from ransomware, supports all major hypervisors, and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Acronis

Case Study: Quadruple Backup Speed and Blocks Ransomware Attacks with Backup Platform
sponsored by Acronis
CASE STUDY: This case study explores how Johnson Electric, one of the world's largest electrical providers, protected their organization against ransomware targeting their large amount of data.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Acronis

Protect Your Data from Malicious Ransomware Threats
sponsored by Veeam Software
WHITE PAPER: Don't find yourself forced to pay for a simple oversight. Use this white paper as your guide to creating a rock-solid data availability plan by making backup images invisible, frequently testing your environment, and more.
Posted: 20 Nov 2017 | Published: 31 Jan 2017

Veeam Software

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity
1 - 25 of 798 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement