Software  >  

Malware

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
Malware Reports
126 - 150 of 853 Matches Previous Page  |  Next Page
Anatomy of a Hack Disrupted
sponsored by LogRhythm, Inc.
WHITE PAPER: What if there was a way to solve these potentially devastating problems before they occurred in the first place? Access this paper to uncover a real-life situation, in which a malware attack took place but was mitigated before any damage took place.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

LogRhythm, Inc.

2016 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This in-depth analysis outlines what IT and security professionals learned from 2015's cyberattacks. Discover which industries were most targeted, the role insiders played in exploitation of vulnerabilities and, most importantly, what you can do to avoid catastrophic data loss.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

IBM

Manage Risk by Protecting Apps, Data and Usage
sponsored by Citrix
WHITE PAPER: When it comes to securing vulnerabilities, especially in apps, there are 5 best practices you can follow. This white paper provides and overview of how to ensure privacy, protect sensitive information and enable compliance of apps and data without compromising workforce flexibility and productivity.
Posted: 24 Aug 2016 | Published: 31 Dec 2015

Citrix

Explore a Security Intelligence Model for Combating Cyber Threats
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover how to fully realize your security intelligence objectives. You'll learn how to keep your security architecture flexible to adopt and mature security intelligence capabilities over time and significantly reduce your risk of experiencing costly cyber incidents moving forward.
Posted: 23 Aug 2016 | Published: 31 Dec 2015

LogRhythm, Inc.

Info-Tech Research Group SIEM Vendor Landscape Report
sponsored by LogRhythm, Inc.
WHITE PAPER: In this Info-Tech research report, discover the effectiveness and simplicity SIEM can bring to threat management for your organization. Uncover pros and cons of leading SIEM products, insights on where the SIEM market is going, and more.
Posted: 22 Aug 2016 | Published: 01 Jul 2016

LogRhythm, Inc.

Specific Security Monitoring Lessons Learned from: Target, Nieman Marcus, Sony and Other Breaches
sponsored by LogRhythm, Inc.
WEBCAST: In this webcast, three cyber security veterans will discuss today's rapidly evolving cyber threat landscape and what new tools you need to survive. Learn how to address your current security intelligence maturity, and more.
Posted: 19 Aug 2016 | Premiered: Mar 19, 2015

LogRhythm, Inc.

Extracting actionable data from banking malware
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.
Posted: 17 Aug 2016 | Published: 17 Aug 2016

ComputerWeekly.com

SC Mag Reviews a SIEM Platform
sponsored by LogRhythm, Inc.
PRODUCT REVIEW: Learn how you can upgrade to next-generation SIEM with artificial intelligence, sophisticated pattern recognition and behavioral analysis. Discover a 5-star review of a SIEM platform with a breakdown of its strengths, weaknesses and more.
Posted: 16 Aug 2016 | Published: 01 May 2016

LogRhythm, Inc.

How to Detect a Ransomware Attack Before it's too Late
sponsored by LogRhythm, Inc.
WHITE PAPER: Your organization's defense success against ransomware depends largely on your level of preparation and the tools you deploy to monitor your systems. Learn how effectively defend against catastrophic attacks through early detection and elimination of suspicious activity.
Posted: 16 Aug 2016 | Published: 01 Jul 2016

LogRhythm, Inc.

Why DDoS Prevention Appliances are So Important Today
sponsored by Arbor Networks
WHITE PAPER: Discover a carefully curated set of key observations, backgrounds, and drivers of the DDoS prevention appliances market - giving an overall picture of how the DDoS landscape is changing. Learn how your enterprise can stay ahead of the curve and keep your network safe from these nefarious attacks.
Posted: 16 Aug 2016 | Published: 13 Jun 2016

Arbor Networks

Why Micro-Segmentation Matters Now
sponsored by VMware
WHITE PAPER: Cybercriminals count on the fact that data center security is still based on a penetrable, hardware-centric model. Access this white paper to learn how the advent of network virtualization empowered by micro-segmentation changes the economics, ease and speed of data center security, eliminating long-standing vulnerabilities.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

VMware

The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
sponsored by ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
Posted: 29 Jul 2016 | Published: 29 Jul 2016

ComputerWeekly.com

Information Security Consulting Services Report
sponsored by IBM
WHITE PAPER: This Forrester report evaluates the 13 most significant information security consulting service providers against a set of 31 criteria. Uncover how well these consultancies fulfill the criteria and where they stand in relation to each other.
Posted: 30 Aug 2016 | Published: 29 Jan 2016

IBM

Cybersecurity Perspectives from the Boardroom and C-suite
sponsored by IBM
WHITE PAPER: Discover how to best protect you organization against major cyberthreats, types of cyberthreats you may or may not know about and how to optimize your investment in your security solution. See security statistics from organizations across industries to better understand how you can implement your own enterprise risk plan as appropriate.
Posted: 30 Aug 2016 | Published: 01 Jul 2016

IBM

Trends in SAP Cybersecurity
sponsored by IBM
WHITE PAPER: The purpose of this Ponemon Institute study, which encapsulates the survey results of 607 IT and IT security practitioners, is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.
Posted: 29 Aug 2016 | Published: 01 Feb 2016

IBM

Adopt a Bimodal Approach to Manage PCs and Broaden Support for New Devices
sponsored by Lenovo Software
WHITE PAPER: This Gartner Report teaches you new approaches to endpoint management and security as updates to PC software increase in volume and frequency.
Posted: 26 Aug 2016 | Published: 21 Sep 2015

Lenovo Software

The Current Landscape of Advanced Persistent Threats
sponsored by Proofpoint, Inc.
EGUIDE: In this e-guide, discover not only how to talk about Advanced Persistent Threats within your enterprise, but also uncover what the current landscape looks like in regards to these ever-evolving malicious attacks.
Posted: 24 Aug 2016 | Published: 23 Aug 2016

Proofpoint, Inc.

Total Economic Impact (TEI) Study
sponsored by IBM
WHITE PAPER: This Forrester study examines the potential return on investment (ROI) enterprises may realize by identifying web-based and mobile application source code vulnerabilities early in the software development life cycle.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

IBM

Webcast - Enhancing Enterprise Security in 2016 – Part 3
sponsored by Intel
WEBCAST: This webcast informs you on the critical need for security intel sharing and how best to accomplish your sharing goals. Enable your organization to mitigate threats proactively while allowing other organizations to do the same.
Posted: 15 Aug 2016 | Premiered: Mar 31, 2016

Intel

Webcast - Enhancing Enterprise Security in 2016 – Part 2
sponsored by Intel
WEBCAST: Discover how sharing threat intel can pay huge dividends in shifting the balance of power away from the bad guys and allow your organization to operate normally. Learn what exactly threat intel encapsulates and how you can utilize it to improve your organization's cyber defenses.
Posted: 15 Aug 2016 | Premiered: Mar 31, 2016

Intel

Enhancing Enterprise Security in 2016
sponsored by Intel
WEBCAST: In this informative webcast, Chris Young maps out a new model for cybersecurity, and shares what's currently underway. Learn how to get the most bang for your security buck and what role the government is playing in keeping your enterprise secure.
Posted: 15 Aug 2016 | Premiered: Mar 31, 2016

Intel

The Threat Defense Lifecycle — Why Traditional Security Fails
sponsored by Intel Security
WHITE PAPER: Learn how to navigate the new world of cyber threats and security tools while maintaining an open mind towards new strategies and priorities. Collaborate with business pros and innovate to fortify existing defenses and establish new bulwarks against threats lurking around the corner.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

The Threat Defense Lifecycle — Reducing the Time to Discover and Recover
sponsored by Intel Security
WHITE PAPER: You need a new philosophy that'll reduce manual intervention, cut management complexity and optimize existing resources in order to reduce mitigation times. Discover an automated, analytics driven threat defense lifecycle that will give you the best opportunity for long-term, sustainable success in staying in front of security threats.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

The Threat Defense Lifecycle: Intelligent Endpoint Threat Defense
sponsored by Intel Security
WHITE PAPER: Adopt a threat defense lifecycle that will allow you to discover threats faster, respond quicker and overall outsmart attackers, driving business efficiency forward. Learn how to then apply these insights to an automated policy that can block similar attack attempts up front.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

Seven Steps to Ease the Pain of Managing a SOC
sponsored by Intel Security
WHITE PAPER: Discover seven steps that will help SOC managers improve their ability to spot and eradicate threats at several points in the IT ecosystem, from the data center to the endpoint, both onpremises and in the cloud. Learn new, real-world solutions that simplify management, improve detection, and increase the speed of mitigation.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security
126 - 150 of 853 Matches Previous Page    4 5 6 7 8 9    Next Page
 
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement