Software  >  

Malware

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
Malware Reports
1 - 25 of 830 Matches Previous Page  |  Next Page
Protecting the Financial Services Organization
sponsored by Juniper Networks, Inc.
WHITE PAPER: Click inside to learn how cyberattacks have grown and changed over the past several years, as several best practices already in place in financial service protection strategies that you can bring back to your organization.
Posted: 17 Nov 2017 | Published: 30 Jun 2017

Juniper Networks, Inc.

How Malware Can Steal Your Data
sponsored by F5 Networks
EBOOK: 51% of data breaches include malware. This e-book provides insight into how malware can steal your data and offers strategies you use to prevent it from happening.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

F5 Networks

Busting the Myth of the Malware "Silver Bullet"
sponsored by McAfee, Inc.
WHITE PAPER: Malware is continuing to evolve, and the next generation of it is requiring us to adopt next-level defenses. Unfortunately, there is no "silver bullet" to protect you from the lurking malware-wolf. Access this white paper to learn how to create a layered defense with complimentary tools that work in unison to fight malware threats.
Posted: 16 Nov 2017 | Published: 28 Feb 2017

McAfee, Inc.

Discover an Advanced Cloud-Based Threat Prevention Suite
sponsored by Juniper Networks, Inc.
WHITE PAPER: Inside learn about Sky Advanced Threat Prevention, a cloud-based service that provides advanced malware protection built to adapt to the ever-changing threat landscape, and give you the level of protection needed to fend off today's ransomware and DDoS attacks.
Posted: 16 Nov 2017 | Published: 30 Nov 2016

Juniper Networks, Inc.

Top Cybercrime Threats to Financial Institutions
sponsored by Digital Shadows
WHITE PAPER: The most prevalent cybercrime threats against financial institutions are: the use or sale of ATM malware, targeted network intrusions, data breaches and the use of banking Trojans. Take a look at this white paper to learn more about these financial threats that stem from cybercriminals.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

The Need for Automotive Cybersecurity Testing Standards
sponsored by Synopsys
WHITE PAPER: Most organizations creating connected systems and devices today spend a considerable amount of time looking at security issues, but often lack a standard framework for testing security. Uncover the importance of developing standards for validating and verifying security.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

Synopsys

Peak Retail Season Threats to Look for
sponsored by Booz Allen Hamilton
WHITE PAPER: During the holiday season, cybercriminals prepare attacks on retailers everywhere in the hopes the retailers will pay ransom to ensure their websites are running smoothly for peak holiday hours. This threat report reveals the top threats ranked by security and likelihood that websites will face during peak retail season.
Posted: 06 Nov 2017 | Published: 06 Nov 2017

Booz Allen Hamilton

Outsmarting Malware
sponsored by Juniper Networks, Inc.
WHITE PAPER: Learn about how you can combine adaptable machine learning algorithms with anti-malware technologies to give you the edge over evolving cyber-threats.
Posted: 06 Nov 2017 | Published: 30 Nov 2016

Juniper Networks, Inc.

Top-of-Mind Threats and Their Impact on Endpoint Security Decisions
sponsored by Cylance
WHITE PAPER: According to this ESG report, 91% of cybersecurity professionals express the greatest concern over the threat posed by email phishing. Explore this report to learn how to protect your organization's endpoints against cyberattacks with specific defense strategies, including machine learning.
Posted: 01 Nov 2017 | Published: 01 Nov 2017

Cylance

Next-Generation Anti-Malware Testing for Dummies
sponsored by Cylance
WHITE PAPER: Inside this Next-Generation Anti-Malware Testing for Dummies e-book, learn about next-generation endpoint security techniques and how you can use machine learning and AI to protect against advanced persistent threats.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

Cylance

5 Risk Points to Avoid in Enterprise Security
sponsored by Microsoft
WHITE PAPER: According to the Verizon Data Breach Investigations Report, nearly 80% of organizations reported data breaches, with 1/3 of them reporting more than 6 breaches. In this white paper, find out how you can boost your organization's device and app security, all while protecting against malware, data breaches and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Microsoft

EternalBlue – Everything there is to know
sponsored by Check Point Software Technologies Ltd.
RESOURCE: Go inside this asset to learn everything you've ever wanted to know about the EternalBlue vulnerability. From its mysterious background, the 3 bugs it uses, and even the code it runs on.
Posted: 24 Oct 2017 | Published: 29 Sep 2017

Check Point Software Technologies Ltd.

Does Your Mobile Anti-Virus App Protect or Infect You? The truth behind DU Antivirus Security
sponsored by Check Point Software Technologies Ltd.
RESOURCE: Instead of protecting user data, DU Antivirus Security, did just the opposite. Instead of encrypting data, they used private information for commercial purposes without permission. Go inside to learn more about how DU Antivirus Security works, and how you can take steps to avoid other malicious apps like it in the future.
Posted: 20 Oct 2017 | Published: 18 Sep 2017

Check Point Software Technologies Ltd.

Marcher Marches On: The Anatomy of a Banker Malware
sponsored by Check Point Software Technologies Ltd.
RESOURCE: Inside, get a breakdown of the mobile banking malware known as Marcher. Learn how Marcher gets into mobile devices using flash phishing, what harm it can cause once inserted into your device, and more.
Posted: 20 Oct 2017 | Published: 28 Apr 2016

Check Point Software Technologies Ltd.

"The Next WannaCry" Vulnerability is Here – Let's Stop it before it's too Late
sponsored by Check Point Software Technologies Ltd.
RESOURCE: Go inside to learn why the WannaCry attack was able to exploit the EternalBlue vulnerability 2 months after a patch was released, where the next big attack might come from, as well as tips you can take to bolster your system now to defend against malware in the future.
Posted: 19 Oct 2017 | Published: 11 Aug 2017

Check Point Software Technologies Ltd.

Reducing Risk in the Face of Cyberattacks and Data Loss Exposure
sponsored by Oracle Corporation UK Ltd
RESOURCE: In this white paper, you'll find guidance on eliminating exposure to the risks of database data loss with a backup appliance that enables a sub-second recovery point. Access now to see how this appliance combats threats like ransomware by continually validating backups, and more.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

Oracle Corporation UK Ltd

From HummingBad to Worse: The History of the Yingmob
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Inside, learn about the malware known as HummingBad, the main tool of the Chinese cybercriminal group Yingmob. Find out what damage this malware can do, how it went global, and more.
Posted: 18 Oct 2017 | Published: 30 Dec 2016

Check Point Software Technologies Ltd.

The Mobile Banker Threat - from End to End
sponsored by Check Point Software Technologies Ltd.
RESOURCE: This resource offers an example of one strain of malware which infected Google Play, and shows you how easy it is for it to mutate, grow, and change to beat even advanced AVs. Read on to learn what you should do to protect yourself from these threats.
Posted: 17 Oct 2017 | Published: 17 May 2017

Check Point Software Technologies Ltd.

ExpensiveWall: A Dangerous 'Packed' Malware on Google Play that will Hit You in Your Wallet!
sponsored by Check Point Software Technologies Ltd.
RESOURCE: Go inside this resource to learn what makes the new malware found on Google Play, nicknamed "ExpensiveWall" so unique and dangerous, as well as what steps you can take to stay protected.
Posted: 17 Oct 2017 | Published: 14 Sep 2017

Check Point Software Technologies Ltd.

Anti-Virus Comparative
sponsored by Symantec
WHITE PAPER: Malicious software poses an ever-increasing threat, not only because the number of malware programs are increasing, but also due to the continuously changing threat-landscape. Uncover results from the Malware Protection Test and the Exploit Test to compare 7 endpoint security vendors.
Posted: 16 Oct 2017 | Published: 31 Oct 2016

Symantec

The Real Identity behind a Wave of Cyberattacks on Energy, Mining and Infrastructure Companies
sponsored by Check Point Software Technologies Ltd.
RESOURCE: This case study explores how, using a remote access Trojan known as NetWire and a keylogging program Hawkeye, a Nigerian hacker was able to steal thousands of dollars from companies. Read on to discover the larger trend of business email compromise attacks, and how you can better prepare your company to defend against them in the future.
Posted: 16 Oct 2017 | Published: 15 Sep 2017

Check Point Software Technologies Ltd.

The Evolution of Crypto Attacks: Understanding, Detecting, and Preventing Ransomware
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Watch this webinar to learn how ransomware targets your end users and infiltrates your network and explore the history of ransomware form the 1989 AIDS Trojan to 2016's KeRanger attack.
Posted: 16 Oct 2017 | Premiered: May 16, 2016, 01:03 EDT (05:03 GMT)

Check Point Software Technologies Ltd.

Symantec™ Cloud Generation Malware Analysis
sponsored by Symantec
WHITE PAPER: Hackers continue to show endless ingenuity in penetrating corporate networks with malware, which means organizations need to fight back harder than ever. By reading this white paper, you'll learn more about defeating malware.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Symantec

Mobile Malware in the UK
sponsored by Lookout
WHITE PAPER: The average malware infection on a mobile device costs £6,400. With the rise of employees using mobile devices for work, companies need to be aware of the high cost and vulnerability of malware attacks. This white paper offers a malware case study to help organizations fight back against mobile threats.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Lookout

Most Wanted Malware: Banking Trojans and Ransomware That Want Your Money
sponsored by Check Point Software Technologies Ltd.
RESOURCE: Read this rundown of the top 10 malwares that tried to steal your money in the summer of 2017.
Posted: 12 Oct 2017 | Published: 19 Sep 2017

Check Point Software Technologies Ltd.
1 - 25 of 830 Matches Previous Page    1 2 3 4    Next Page
 
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement