Software  >  

Malware

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
Malware Reports
101 - 125 of 709 Matches Previous Page  |  Next Page
Infographic: What is Malvertising?
sponsored by Malwarebytes Corporation
WHITE PAPER: In this infographic, learn all you need to know about malvertising and how to stop it.
Posted: 06 May 2015 | Published: 06 May 2015


An Inside View of a Zero-Day Campaign
sponsored by Malwarebytes Corporation
WHITE PAPER: This white paper follows one real-life zero-day attack, detailing how the attack entered the network, what parts of the network it infiltrated, and how it was eventually mitigated.
Posted: 06 May 2015 | Published: 06 May 2015


17 Security Products Tested for Malware Removal and Repair
sponsored by Malwarebytes Corporation
WHITE PAPER: This white paper presents the results of a series of independent tests on seventeen different anti-malware products.
Posted: 05 May 2015 | Published: 05 May 2015


How Anti-Exploit Software Stops Malware Early
sponsored by Malwarebytes Corporation
WHITE PAPER: This brief white paper explains the concept of anti-exploit technology and discusses its capabilities.
Posted: 05 May 2015 | Published: 05 May 2015


An Inside View of a Zero-Day Campaign
sponsored by Malwarebytes Corporation
WHITE PAPER: This article gets you inside the workings of a zero-day attack by giving you a step-by-step look at one that occurred just a few months ago.
Posted: 05 May 2015 | Published: 21 Apr 2015


Sandbox and Secure Email Gateway - Security Dynamic Duo
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, you'll discover how SEGs are evolving to deliver additional layers of protection against hackers and how sandboxing, when used concurrently, can inspect harmful emails that reside within the grey area between white and black lists. View now to learn how to prevent APTs from reaching your end users.
Posted: 05 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

Survey Results: Endpoint Security in a Time of Uncertainty
sponsored by Malwarebytes Corporation
WHITE PAPER: In this survey report, find statistics on the most common endpoint security threats faced, what protections are being leveraged, and more.
Posted: 05 May 2015 | Published: 05 May 2015


Network Vulnerabilities Defended: Fighting Today’s Advanced Attacks
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper reveals the three phase strategy to defending your network against determined cybercriminals.  Read on to take a look into hackers' minds and learn how to improve data protection.
Posted: 04 May 2015 | Published: 22 Apr 2015

Fortinet, Inc.

Anti-Exploit Tools: The Next Wave of Enterprise Security
sponsored by Malwarebytes Corporation
WHITE PAPER: In this white paper, discover the shortcomings of traditional preventative security approaches and what you can do to move beyond them.
Posted: 01 May 2015 | Published: 01 May 2015


Keeping Applications Safe with Whitelisting
sponsored by Digital Guardian
EGUIDE: This e-guide outlines the basics of whitelisting filtering approaches and explores how to use them for advanced malware protection.
Posted: 27 Apr 2015 | Published: 08 Apr 2015

Digital Guardian

Evolve or Die: Security Adaptation in a Virtual World
sponsored by BitDefender
WHITE PAPER: This white paper describes and suggests solutions for some of the biggest issues in virtualization security.
Posted: 27 Apr 2015 | Published: 31 Dec 2014

BitDefender

Securing the Virtual Infrastructure without Impacting Performance
sponsored by BitDefender
WHITE PAPER: This white paper discusses some of the most common security pitfalls found in virtualized environments and suggests ways to avoid them.
Posted: 27 Apr 2015 | Published: 31 Dec 2014

BitDefender

It's Time to Identify and Confront Today's Data Center Security Challenges
sponsored by VMware
WHITE PAPER: In this white paper, you will learn how to detect, isolate, and block dynamic threats with a granular security approach from inside your data center. Access now to learn why network security is a good start and how to enhance it.
Posted: 23 Apr 2015 | Published: 29 Dec 2014

VMware

Extend Security and Control from the Data Center Edge to the core
sponsored by VMware
WHITE PAPER: This white paper explores how to enable comprehensive data center security through network virtualization. Access now to learn how to overcome the three major issues with traditional network security and how to defend your data center from within.
Posted: 21 Apr 2015 | Published: 04 Mar 2015

VMware

Four Business Cases for Endpoint Security
sponsored by IBM
WHITE PAPER: This white paper presents four endpoint security business cases, analyzing how you can balance security with cost savings to come up with an effective and affordable way to stay secure.
Posted: 21 Apr 2015 | Published: 31 Mar 2015

IBM

Advancing Cyber-security Measures from the Inside
sponsored by VMware
RESOURCE: This infographic teaches you how to secure your network and data center from the inside and add to your perimeter defenses.
Posted: 20 Apr 2015 | Published: 11 Dec 2014

VMware

Securing Apps from the First Line of Code
sponsored by WhiteHat Security
WHITE PAPER: This white paper teaches you how to integrate security analysis into apps from the moment the first line of code is written to reduce risks. View now to learn how to discover and remedy vulnerabilities during the development process in real-time.
Posted: 16 Apr 2015 | Published: 28 Oct 2014

WhiteHat Security

Evaluating the Total Cost of Ownership for Protecting Web Applications
sponsored by WhiteHat Security
WHITE PAPER: This white paper breaks down the tocal cost of web app security in the three major risk categories associated with sucessful attacks. Access now to learn how to quantify the costs of web app security compared to the costs of a breach.
Posted: 16 Apr 2015 | Published: 14 Oct 2013

WhiteHat Security

Don’t let crime rule your network – building an efficient cyber crime strategy
sponsored by Hewlett-Packard Limited
WHITE PAPER: Featuring input from expert analysts with years of experience, this white paper presents a series of guidelines for creating security that can survive the modern threat landscape.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

Hewlett-Packard Limited

2014 Cost of Cyber Crime Study
sponsored by Hewlett-Packard Limited
RESOURCE: If you want to avoid the costs of cybercrime, you need to know what you're up against. This resource can help.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Hewlett-Packard Limited

How to Defend Websites in the Era of Site Scraping
sponsored by Distil Networks
WHITE PAPER: This white paper explores the prevalence of website scraping and examines the first SaaS strategy focused on stopping automated attacks to make the web more secure. View now to learn how to block and/or repurpose these bots to your advantage.
Posted: 09 Apr 2015 | Published: 25 Mar 2015

Distil Networks

SSL Decryption for Greater Threat Visibility
sponsored by Gigamon
WEBCAST: This webcast explores a new approach to SSL security and decryption.  View now to learn more and how to enhance your current security solutions.
Posted: 09 Apr 2015 | Premiered: Oct 28, 2014

Gigamon

The Rise of Web Bot Attacks and Demise of Traditional Defenses
sponsored by Distil Networks
WHITE PAPER: This white paper details why ad hoc bot security approaches continue to fail and explores a new approach to blocking bots. View now to learn how you can close security vulnerability gaps to hackers' attempts.
Posted: 07 Apr 2015 | Published: 18 Feb 2015

Distil Networks

Cybercrime 101
sponsored by Global Knowledge
WHITE PAPER: Discover the ways in which cybercrime occurs in three realms: individual, business, and governmental. Learn what you can do to protect yourself and your organization.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

Global Knowledge

The Evolution and Necessity of a Next-Gen Firewall
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper takes you through the history and development of firewalls and explores each generation's strengths and weaknesses. Read on to learn what characteristics you need in a next-gen firewall to improve your security strategy.
Posted: 27 Mar 2015 | Published: 15 Oct 2014

Juniper Networks, Inc.
101 - 125 of 709 Matches Previous Page    3 4 5 6 7 8    Next Page
 
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement