Software  >  

Malware

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
MalwareReports
101 - 125 of 652 Matches Previous Page  | Next Page
HawkEye G-The Active Defense Grid
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: This informative whitepaper takes a look at a unique security tool designed to prevent advanced persistent threats.
Posted: 27 May 2014 | Published: 27 May 2014

Hexis Cyber Solutions Inc

Advanced Persistent Threats: Detect, Engage and Remove
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This informative resource explores a unique, next-generation strategy for thwarting APTs – focusing their attention on the behavior examination.
Posted: 27 May 2014 | Premiered: May 27, 2014

Hexis Cyber Solutions Inc

Data Breach Detection and Response
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This informative resource explores the changes in data breaches and outlines a strategy for incident response.
Posted: 22 May 2014 | Premiered: May 22, 2014

Hexis Cyber Solutions Inc

Five Things To Do After You've Been Hacked
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: Access this informative guide to find out 5 things to do after you've been hacked – keeping your system safe and secure.
Posted: 22 May 2014 | Published: 22 May 2014

Hexis Cyber Solutions Inc

Five Things To Do After An Attack
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: Advanced persistent threats are a top priority for many IT departments – as they should be. Access this informative whitepaper and find out 5 things to do after a potential attack.
Posted: 22 May 2014 | Published: 22 May 2014

Hexis Cyber Solutions Inc

Symantec Endpoint Protection 12 Trialware
sponsored by Symantec Corporation
TRIAL SOFTWARE: Access this trial software by Symantec and discover the benefits of effective endpoint security.
Posted: 21 May 2014 | Premiered: 21 May 2014

Symantec Corporation

Protecting Your Mid-Size Business from Today’s Security Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This whitepaper takes a look at the importance of securing your business from a midmarket perspective.
Posted: 16 May 2014 | Published: 16 May 2014

Hewlett-Packard Company

Phishing: The Latest Tactics And Potential Business Impacts
sponsored by Symantec
WHITE PAPER: This informative guide takes an in-depth look at phishing and how it has become an effective tactic for cybercriminals.
Posted: 14 May 2014 | Published: 14 May 2014

Symantec

The Business Value of Integrated Anti-Virus Management
sponsored by IBM
WHITE PAPER: This white paper features an integrated anti-malware protection solution that not only improves identification and remediation across all endpoints, but also offers benefits to your bottom line.
Posted: 13 May 2014 | Published: 31 Jan 2014

IBM

State of Security Operations
sponsored by Hewlett-Packard Limited
WHITE PAPER: With businesses recognising the need for further investment in cyber-defence, it is essential to figure out which tools and strategies are best for your organisation. Read now and find out more about the current state of security operations in 2014.
Posted: 13 May 2014 | Published: 31 Jan 2014

Hewlett-Packard Limited

Internet Security Threat Report - 2014
sponsored by Symantec Corporation
WHITE PAPER: This in-depth guide explores today's widespread threat landscape and 7 areas that deserve special attention in the coming year.
Posted: 07 May 2014 | Published: 07 May 2014

Symantec Corporation

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

IBM

Detecting and Preventing Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

LogRhythm, Inc.

Understanding the Advanced Persistent Threat
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the APT lifecycle and helps you understand the motives behind these attacks, making it easier to prevent them.
Posted: 30 Apr 2014 | Published: 31 Dec 2013

LogRhythm, Inc.

Cyber Preppers Guide
sponsored by Threat Track Security
WHITE PAPER: This informative guide provides an effective security preparedness plan – which outlines key strategies for stopping advanced persistent threats (APTs) and other forms of sophisticated malware.
Posted: 22 May 2014 | Published: 14 May 2014

Threat Track Security

RSA Security Operations Management (SecOps) in Action
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This informative resource explores a unique security solution that aims to simplify your security management while providing improved security.
Posted: 20 May 2014 | Published: 21 Mar 2014

RSA, The Security Division of EMC

Cloud Security Designed for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
Posted: 19 May 2014 | Published: 19 May 2014

Trend Micro

Top 10 Ways to Assess The Risk of Data Loss
sponsored by Infrascale
WHITE PAPER: This white paper offers 10 signs of whether or not your employees are using free file sharing services and what kinds of risks these pose to your organization's sensitive data.
Posted: 15 May 2014 | Published: 15 May 2014

Infrascale

The Power To Destroy: How Malware Works
sponsored by Symantec
WHITE PAPER: View this comprehensive resource to understand today's malware and how it can negatively impact your business if you don't include website vulnerability assessments.
Posted: 14 May 2014 | Published: 14 May 2014

Symantec

The Fight for Full Network Visibility in a Dangerous World
sponsored by APCON, Inc.
WHITE PAPER: This white paper highlights critical features your network security strategies may be missing that are mandatory in today's advanced threat environment.
Posted: 09 May 2014 | Published: 09 May 2014

APCON, Inc.

Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks
sponsored by IBM
WHITE PAPER: This white paper offers background on today's malware and its 4 predictable steps. Click through to discover a set of integrated solutions that offer improved visibility and defense to block advanced attacks.
Posted: 08 May 2014 | Published: 31 Jan 2014

IBM

How to Limit the Risk of Attack on your XP Assets
sponsored by AlienVault
WEBCAST: This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Posted: 08 May 2014 | Premiered: May 8, 2014

AlienVault

Adapting to the new web security and email security threats
sponsored by Cisco Systems, Inc.
EGUIDE: In this expert e-guide from SearchSecurity.com, industry leaders Karen Scarfone and Nick Lewis offer critical tips to securing email and Web use – given the latest advanced, targeted threats.
Posted: 06 May 2014 | Published: 06 May 2014

Cisco Systems, Inc.

How Are DDoS Attacks Evolving?
sponsored by Neustar®
WHITE PAPER: This resource highlights the top 8 changes in distributed denial of service (DDoS) attacks that most organizations aren't ready to defend against.
Posted: 05 May 2014 | Published: 05 May 2014

Neustar®

Case Study - Anittel Simplifies Managed AV Service
sponsored by Webroot
WHITE PAPER: This informative whitepaper explores one company's success with simplified anti-virus services and how it provided their system with the security it was lacking.
Posted: 30 Apr 2014 | Published: 31 Dec 2013

Webroot
101 - 125 of 652 Matches Previous Page    3 4 5 6 7 8    Next Page
 
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement