Software  >  

Malware

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
Malware Reports
1 - 25 of 1004 Matches Previous Page  |  Next Page
What I've Learned from 5,000 Data Breaches
sponsored by AllClear ID
WHITE PAPER: Learn how to clearly communicate with customers after a data breach to ensure trust remains intact. Minimize confusion and anger by proactively preparing before a major breach occurs. Plan out how affected customers will be notified and supported throughout the entire response process, from notification, to protection, to fraud resolution.
Posted: 29 Jun 2016 | Published: 01 May 2016

AllClear ID

Neutralize Emerging Threats: Reducing the Time to Discover and Recover
sponsored by Intel Security
PODCAST: Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.
Posted: 29 Jun 2016 | Premiered: May 1, 2016

Intel Security

Neutralize Emerging Threats: Reducing the Time to Discover and Recover Transcript
sponsored by Intel Security
WHITE PAPER: Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.
Posted: 29 Jun 2016 | Published: 01 May 2016

Intel Security

Why Traditional Security Fails
sponsored by Intel Security
PODCAST: Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure and shows you four key areas to focus on when implementing a new, more efficient security solution.
Posted: 28 Jun 2016 | Premiered: May 1, 2016

Intel Security

Komerční bankaReducing logins from malware-infected endpoints by90 percent in just three months
sponsored by IBM
WHITE PAPER: Learn about KB's security struggles and how they were able to mitigate malware attacks with advanced fraud and malware protection. They are now able to detect, block and remediate infections and detect phishing threats before damage can be done to their enterprise.
Posted: 28 Jun 2016 | Published: 01 May 2016

IBM

Market Overview: Customer Data Breach Notification And Response Services
sponsored by AllClear ID
WHITE PAPER: A poorly handled breach notification will do more harm to your organization after a breach. Take charge of customer notification to keep your responses on track. Learn how to best Reassure your customers and the broader public with clear communications and appropriate sensitivity in your messages.
Posted: 28 Jun 2016 | Published: 01 May 2016

AllClear ID

Check Point 2015 Security Report
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Based on how bad 2014 was from a cyber security perspective, it's clear that cybercriminals are not slowing down. Read this extensive report that explains the benefits of implementing a three-layer security approach and highlights the threats your enterprise may fall victim to without implementing it.
Posted: 28 Jun 2016 | Published: 31 Dec 2015

Check Point Software Technologies Ltd.

Breach Response: Preparing for the Threat; Controlling the Chaos
sponsored by AllClear ID
WHITE PAPER: Examine past breaches, in this report, to learn the tangible benefits of being well-prepared for a cyber attack. Other benefits, like good data governance and responsible stewardship, are less tangible, but inspire confidence and can reinforce your good reputation. Discover how to emerge from every data breach unscathed, public image intact.
Posted: 28 Jun 2016 | Published: 01 Oct 2014

AllClear ID

Net Diligence Cyber Claims Study 2014
sponsored by AllClear ID
WHITE PAPER: This study helps you risk understand the true impact of data insecurity by consolidating claims data from multiple insurers. The combined pool of claims is sizable enough that it allows us to ascertain real costs and project future trends.
Posted: 28 Jun 2016 | Published: 31 Dec 2014

AllClear ID

BitSight Global View
sponsored by BitSight
WHITE PAPER: This report shows you the security performance results of 250 random organizations per country from the U.S., the U.K., Singapore, Germany, China and Brazil during May 1, 2015 until May 1, 2016. It can help your organization's security stance as you move forward into new, global markets.
Posted: 28 Jun 2016 | Published: 01 May 2016

BitSight

Don’t Let “Trusted” Vendors Become Cyber-Breach Enablers
sponsored by BitSight
WHITE PAPER: Learn how to evaluate vendors' security ratings simply and effectively. Police vendors entrusted with handling your sensitive data and greatly enhance your vendor risk management program no matter where it is on the maturity curve.
Posted: 28 Jun 2016 | Published: 01 May 2016

BitSight

Why Traditional Security Fails
sponsored by Intel Security
WHITE PAPER: Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure and shows you four key areas to focus on when implementing a new, more efficient security solution.
Posted: 27 Jun 2016 | Published: 01 May 2016

Intel Security

Why Traditional Security Fails
sponsored by Intel Security
WEBCAST: Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure and shows you four key areas to focus on when implementing a new, more efficient security solution.
Posted: 27 Jun 2016 | Premiered: May 1, 2016

Intel Security

UK’s Hottest Banking FraudSchemes
sponsored by IBM
WHITE PAPER: Leading cybersecurity authority Limor Kessem teaches you top fraud threats to UK banking institutions and the impact cybercrime is having on them today. You'll learn top cybercrime trends and the scale at which these practices are growing.
Posted: 27 Jun 2016 | Published: 01 May 2016

IBM

EMEA: Rethinking the Cyber Security Disconnect to Save Money
sponsored by VMware
WHITE PAPER: Discover five ways you can improve your security posture today and instruct employees on more secure data handling. Learn why it's important for business leaders in Africa, Europe, and the Middle East to understand cyber security as a top priority and ultimately save money in mitigating threats rather than reacting to them.
Posted: 24 Jun 2016 | Published: 01 May 2016

VMware

IBM Security QRadar: SIEM Product Overview
sponsored by IBM
EGUIDE: In this e-guide, expert Karen Scarfone looks at QRadar, IBM's enterprise security information and event management (SIEM) tool. Learn how its features allow you to easily collect log data from hosted assets, operating systems, applications, vulnerabilities and user behavior.
Posted: 23 Jun 2016 | Published: 01 May 2016

IBM

Cybersecurity skills shortage demands new workforce strategies
sponsored by IBM
EGUIDE: The race to find InfoSec professionals who can outpace advanced threats has companies worldwide facing hurdles. This e-guide discusses organizations' want for better qualified candidates and reveals what skills exactly most security professionals are currently lacking.
Posted: 23 Jun 2016 | Published: 21 Jun 2016

IBM

Unlocking the Lucrative Criminal Business Model: An Analyst Report
sponsored by Palo Alto Networks
ANALYST REPORT: Cryptographic ransomware has quickly become one of the greatest cyberthreats facing organisations around the world. Access this analyst report to properly understand today's brand of ransomware, examine the future of ransomware, and identify 6 key strategies with which you will execute your defense.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Palo Alto Networks

Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to explore why IT professionals are increasingly adopting desktop virtualization paired with thin client solutions to significantly reduce risks and improve protection at endpoints. Examine thin client solutions to help you select one that can best support enhanced endpoint security for your organization.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Dell, Inc.

IBM Security Trusteer Pinpoint Detect Solution Brief
sponsored by IBM
WHITE PAPER: You need a fundamentally different approach to detecting fraud that will also decrease false positives. Discover how to build fraud detection based on visibility, global threat intelligence and agility. Simplify your approach and accurately identify fraud throughout the entire fraud lifecycle.
Posted: 21 Jun 2016 | Published: 01 May 2016

IBM

Analyze This
sponsored by SAS
WHITE PAPER: See how other organizations define security analytics and why you should consider its implementation to better optimize your organization. Learn how you can assess security performance to make better spending and policy decisions.
Posted: 21 Jun 2016 | Published: 01 May 2016

SAS

IBM Security Trusteer Fraud Protection Suite solution brief
sponsored by IBM
WHITE PAPER: Discover more accurate fraud detection and gain greater visibility and adaptability across the fraud management lifecycle.
Posted: 21 Jun 2016 | Published: 01 May 2016

IBM

Mobile Data Security Threats: Hype vs. Reality
sponsored by Lookout
EGUIDE: As threats such as mobile malware evolve, so do the tools to combat them. It's a chess match, and you must stay well-educated to ensure protection. In this e-guide, learn about today's common mobile threats so you can prepare your network to combat them.
Posted: 20 Jun 2016 | Published: 14 Jun 2016

Lookout

The Future of Endpoint Protection
sponsored by Atos
ANALYST BRIEF: Discover how to best secure your endpoints against today's hostile threat environment. Learn how secure operations, secure technology and secure applications to protect corporate data against physical or digital theft.
Posted: 17 Jun 2016 | Published: 01 May 2016

Atos

‘PowerShell’ Deep Dive: A United Threat Research Report
sponsored by Carbon Black
WHITE PAPER: Learn more about PowerShell and how cybercriminals are using it to expedite their criminal activities. This report outlines several techniques attackers use to leverage PowerShell to gain access to organizations' endpoints and provides suggestions on how security teams can detect, prevent and respond to such attacks.
Posted: 17 Jun 2016 | Published: 01 May 2016

Carbon Black
1 - 25 of 1004 Matches Previous Page    1 2 3 4    Next Page
 
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement