Software  >  

Malware

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
Malware Reports
101 - 125 of 854 Matches Previous Page  |  Next Page
SAN 2016 Incident Response Survey: The Current Threat Landscape
sponsored by Intel Security
WEBCAST: A SANS survey was conducted to assess the current state of incident response (IR), polling 591 respondents on metrics such as: dwell time, automation, and more. Explore the survey's results in this webcast to uncover critical findings about the current threat landscape, the rise of ransomware, and "smash and grab" attack vectors.
Posted: 26 Sep 2016 | Premiered: Jun 8, 2016

Intel Security

SANS Survey Report: Incident Response Capabilities in 2016
sponsored by Intel Security
RESEARCH CONTENT: The 2016 SANS survey was conducted to assess the current state of incident response (IR), polling 591 respondents on metrics such as dwell time and automation. Explore the survey's results in this report to uncover critical findings about the current IR landscape, breach environment, and areas that could see improvement in the near future.
Posted: 26 Sep 2016 | Published: 30 Jun 2016

Intel Security

Safeguarding Vital Data Is a Battle You Can Win
sponsored by Intel Security
WHITE PAPER: In this resource, uncover what it means to develop data management and protection policies that reach from the core of the business out to mobile devices, the cloud and beyond. Also, learn how to be ready for whatever security challenges the world sends your way.
Posted: 24 Sep 2016 | Published: 24 Sep 2016

Intel Security

Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value
sponsored by Palo Alto Networks
WHITE PAPER: Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

5 Steps to Raising Ransomware Resistance
sponsored by SearchSecurity.com
EBOOK: This TechGuide explores the nature of the threat and the latest ransomware trends. It outlines several steps information security pros should take in order to heighten their organization's resistance and prevent ransomware attacks.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

SearchSecurity.com

Advanced Security Platform for Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER: If your organization is looking to migrate to Microsoft Office 365, you might be wondering whether additional security is needed. Discover how to safeguard users against advanced threats and targeted attacks and gain the power to identify these attacks as they happen.
Posted: 12 Sep 2016 | Published: 01 Aug 2016

Proofpoint, Inc.

Protect The Way You Work Today
sponsored by Proofpoint, Inc.
PRODUCT DEMO: Whether you seek email protection, mobile defense, threat intelligence, or another type of tool to bolster your security posture, how can you be sure these investments will deliver? Uncover free, limited-time evaluations, trial versions, and demos of cloud-based security and compliance solutions.
Posted: 09 Sep 2016 | Premiered: 01 Aug 2016

Proofpoint, Inc.

Protecting Against Impostor Email Threats
sponsored by Proofpoint, Inc.
VIDEO: Learn how to combat imposter emails and other advanced threats by watching this short video. Get detailed email analysis to oust spam, phishing, malware and now imposter emails quickly before they reach your employees.
Posted: 09 Sep 2016 | Premiered: 12 Apr 2016

Proofpoint, Inc.

Safeguarding Office 365
sponsored by Proofpoint, Inc.
WEBCAST: Discover how to get full attack chain detection for Office 365 through this short video. Learn how you can achieve complete coverage from advanced threats, both known and unknown across your entire global network.
Posted: 09 Sep 2016 | Premiered: Aug 1, 2016

Proofpoint, Inc.

6 Capabilities For Securing Office 365 Email
sponsored by Proofpoint, Inc.
WEBCAST: Discover the 6 key capabilities enterprises should consider to secure their Office 365 email environment. Plus, learn common pitfalls to avoid in the planning stages.
Posted: 07 Sep 2016 | Premiered: Aug 1, 2016

Proofpoint, Inc.

Case Study: Office 365 Enterprise Strengths
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how a privately-held supermarket, H-E-B solved their Office 365 issues by seamlessly implementing a security overlay tool. Learn how to eliminate false positive message classification leading to data loss, unwanted spam, and improve email security in the cloud.
Posted: 07 Sep 2016 | Published: 01 Aug 2016

Proofpoint, Inc.

How To Get the Most Out of SOCs
sponsored by ServiceNow
EGUIDE: This e-guide teaches you how to refocus your security efforts on detection through continuous monitoring and greater network visibility. Learn how to set up your security operations center (SOC) to achieve more timely detection capabilities and learn from industry-recognized security expert Eric Cole, on how to get the most out of SOCs.
Posted: 07 Sep 2016 | Published: 31 Aug 2016

ServiceNow

Is Microsoft Office 365 Secure?
sponsored by Proofpoint, Inc.
WHITE PAPER: How do you ensure security in Office 365? Discover how to layer smart security to detect and block attacks and automate response to quickly remove threats before than can do harm. With a little planning, you'll soon be able to stop 99.9% of advanced threats before they reach your users.
Posted: 07 Sep 2016 | Published: 01 Aug 2016

Proofpoint, Inc.

Combating financial crime: The increasing importance of financial crimes intelligence units in banking
sponsored by SAS
WHITE PAPER: This white paper assesses how aware banks in Europe and North America are of FCIUs and what measures they have been taking to be more prepared for full implementation of their own FCIU. Understand the importance of banks' FCIUs and potential central intelligence services will offer to the banking industry and to crime prevention.
Posted: 02 Sep 2016 | Published: 01 Aug 2016

SAS

Data Visualization. The What, Why and How
sponsored by SAS
WHITE PAPER: Data visualizations can help your organization tremendously when it comes to finding and eliminating cyberthreats deep within your organization. Discover how to not only detect and block attacks in minutes, but also get insight from these attack locations to better protect against emerging trends and anticipate signs of threats.
Posted: 02 Sep 2016 | Published: 01 Aug 2016

SAS

UBM Dark Reading: Close the Detection Deficit with Security Analytics
sponsored by SAS
WHITE PAPER: Discover how to collect and correlate data from multiple sources, separate relevant data from irrelevant, and apply context to the data to extract meaningful value from data analysis. Mitigate threats faster than ever and learn the 5 essential characteristics of a security analytics solution.
Posted: 02 Sep 2016 | Published: 01 Aug 2016

SAS

2016 Neustar DDoS Attacks & Protection Report
sponsored by Neustar
WHITE PAPER: This report represents a global view of the DDoS outlook with insights and data from 6 continents and more than one thousand executives. Discover what the future holds for your organization and learn why security should be a central concern for all devices on your network.
Posted: 29 Sep 2016 | Published: 30 Apr 2016

Neustar

Neustar DDOS Attacks & Protection Report: North America & EMEA The Continuous Risk to Digital Brands
sponsored by Neustar
WHITE PAPER: This report encapsulates the survey results of 760 CSOs, CIOs, CTOs and others in IT security. Its purpose is to learn how companies in North America and the EMEA region (Europe, the Middle East, and Africa) encounter and defend against DDoS attacks.
Posted: 28 Sep 2016 | Published: 31 Dec 2015

Neustar

Recovering From Ransomware Starts with a Data Protection Strategy
sponsored by Dell Software
EGUIDE: Stopping ransomware is almost impossible, but recovering from it doesn't have to be. Discover how to devise a solid ransomware recovery plan to successfully return your organization to normal conditions after an outbreak. Using your existing data protection tools and regular back-ups, you can ensure business continuity after disaster strikes.
Posted: 27 Sep 2016 | Published: 22 Sep 2016

Dell Software

How to Protect Data from Ransomware
sponsored by Dell Software
WHITE PAPER: It can be difficult to recover data that is encrypted by ransomware malware. In this expert guide, discover how to stop ransomware from breaching your network in the first place and backup all of your data.
Posted: 27 Sep 2016 | Published: 22 Sep 2016

Dell Software

Ransomware Protection is Futile, but All Hope is Not Lost
sponsored by Dell Software
EGUIDE: Discover how you can avoid ransomware and save your critical files. Get advice from IT experts Trevor Pott, Michael Stump, and Timothy Warner on ways to fortify Windows systems and throw up roadblocks to make ransomware attacks less dangerous.
Posted: 26 Sep 2016 | Published: 21 Sep 2016

Dell Software

Securing Data Access Within the Healthcare Industry
sponsored by VASCO Data Security International
WHITE PAPER: Access this white paper to better understand the changing role of technology within the healthcare sector and best practices to integrate security without compromising the patient experience.
Posted: 23 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

Preventing Ransomware Threats to Health Data in 10 Steps
sponsored by Cisco
WHITE PAPER: Health data has become some of the most sought-after personal data on the black market, making healthcare professionals and hospital systems prime targets for cybercrime – particularly ransomware attacks. This e-guide will provide you with 10 steps to avoid ransomware attacks on your health systems.
Posted: 16 Sep 2016 | Published: 14 Sep 2016

Cisco

Operationalize Security to Patch Vulnerabilities
sponsored by BMC
WHITE PAPER: This report features analysis and commentary about the importance of security operations automation technology. Learn how you can solve your vulnerability issues simply through IT security and IT operations cooperation using best practices and technology available today.
Posted: 09 Sep 2016 | Published: 01 Aug 2016

BMC

Blended IT and Security Operations: Where's the Balance?
sponsored by ServiceNow
EGUIDE: Within this informative e-guide, you'll learn the benefits – and the risks – of integrating IT and security operations. Discover how you can leverage information collected from multiple data sources to get an accurate picture about the issues affecting both security and performance.
Posted: 07 Sep 2016 | Published: 31 Aug 2016

ServiceNow
101 - 125 of 854 Matches Previous Page    3 4 5 6 7 8    Next Page
 
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement