Software  >  

Malware

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
Malware Reports
126 - 150 of 750 Matches Previous Page  |  Next Page
Sandboxing: CPU-Level Threat Prevention
sponsored by Check Point Software Technologies Ltd.
VIDEO: This brief video explores how you can detect advanced malware that hides in the CPU-level of an application. Read on to discover how you can stop even the most advanced and evasive threats.
Posted: 17 Nov 2015 | Premiered: 04 May 2015

Check Point Software Technologies Ltd.

Multi-Layered Defense for an Evolving Threat Landscape
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Access this webcast to learn how you can protect against both known and unknown malware and to make today's difficult cybersecurity landscape just a little bit easier.
Posted: 16 Nov 2015 | Premiered: Oct 13, 2015

Check Point Software Technologies Ltd.

How Sandboxing puts a Stop to Today's Advanced Attacks
sponsored by Check Point Software Technologies Ltd.
VIDEO: This video introduces a modern approach to sandboxing that catches even the most evasive attack. Take a look to learn how you can upgrade your sandboxing capabilities to match today's advanced and zero-day attacks.
Posted: 16 Nov 2015 | Premiered: 20 Oct 2015

Check Point Software Technologies Ltd.

Staying One Step Ahead with Zero-Day Protection
sponsored by Check Point Software Technologies Ltd.
WEBCAST: This webcast examines how you can stop today's advanced hackers. Watch and learn how sandboxing, CPU-level detection and more can keep your organization secure from even the most sophisticated threats.
Posted: 16 Nov 2015 | Premiered: Sep 22, 2015

Check Point Software Technologies Ltd.

Exposing The Unknown: How Sandboxing Technology Fights Modern Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this white paper to learn how sandboxing has evolved to fight modern cybercrime and how the technology could secure your business.
Posted: 13 Nov 2015 | Published: 30 Jun 2015

Check Point Software Technologies Ltd.

How to Stop Today's Advanced Hackers
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This white paper discusses how you can protect against any threat today's advanced hackers throw at you.
Posted: 13 Nov 2015 | Published: 19 Aug 2015

Check Point Software Technologies Ltd.

Combat the Rise of Malware
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This resource discusses the growing malware threat and gives suggestions for combatting zero-day attacks, non-executable attacks, and more.
Posted: 13 Nov 2015 | Published: 26 Oct 2015

Check Point Software Technologies Ltd.

A Strategic Approach to Combatting Security Threats Featuring ESG Analyst Jon Oltsik
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This paper discusses how organizations can take a more strategic approach to threat management by moving to a tightly integrated and centrally managed defense-in-depth architecture.
Posted: 12 Nov 2015 | Published: 31 Oct 2015

Check Point Software Technologies Ltd.

How to Choose Your Next Sandboxing Solution
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this white paper for a look at the eight essential qualities of effective sandboxing solutions and advice from Gartner on preventing the most sophisticated unknown malware from compromising your systems and networks.
Posted: 12 Nov 2015 | Published: 13 Jul 2015

Check Point Software Technologies Ltd.

How Boston Properties Stays One Step Ahead of Advanced Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this case study to discover how Boston Properties, a real estate company, found a security tool that could catch any cybersecurity threat, even unknown ones.
Posted: 12 Nov 2015 | Published: 12 Nov 2015

Check Point Software Technologies Ltd.

Evaluating the Next Generation of Threat Prevention
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This white paper looks at a next-generation threat prevention tool, evaluating the effectiveness of this form of technology and the practicality of implementing it.
Posted: 10 Nov 2015 | Published: 10 Nov 2015

Check Point Software Technologies Ltd.

Targeted Attack Protection: Bolstering Your Mobile Defenses
sponsored by Proofpoint, Inc.
WEBCAST: In this informative webcast, learn the top 6 malware apps users will encounter, how to secure Apple and Android devices, and mitigate malicious apps. Discover the top mobile app malware threats plaguing organizations and how to thwart them in their tracks before data leakage occurs.
Posted: 30 Oct 2015 | Premiered: Oct 7, 2015

Proofpoint, Inc.

Anatomy of A Hack Disrupted
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper takes a close-up look one successfully mitigated malware attack, giving you insight on how to stop a potential cyber-breach.
Posted: 28 Oct 2015 | Published: 28 Oct 2015

LogRhythm, Inc.

Report Summary: Reliability Analysis of Juniper Networks SRX5000 Line of Services Gateways
sponsored by Juniper Networks, Inc.
ANALYST REPORT: This analysis report focuses on a networking and security service that provides application security, UTM, integrated IPS, and advanced integrated threat management. Read on to see how this scalable, resilient security solution can guard your enterprise's data center against cyber threats and malware.
Posted: 26 Oct 2015 | Published: 31 Jan 2015

Juniper Networks, Inc.

The Changing State of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This report reveals just how often cloud environments are hacked and what methods are used when they are.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Alert Logic

5 Steps for Stronger Advanced Threat Protection
sponsored by Blue Coat Systems
WHITE PAPER: This resource outlines the 5 steps your organization can take to protect against advanced threats and strengthen your line of defenses. Learn how to take a network-based approach for 20/20 visibility into all threats, and access more security best practices.
Posted: 23 Oct 2015 | Published: 31 Dec 2014

Blue Coat Systems

When Minutes Count:How to Fight Advanced Threats with Real-Time SIEM
sponsored by Intel Security
WHITE PAPER: This report assesses organizations' abilities to detect and deflect targeted attacks, reveals the top eight most critical indicators of attack, and examines best practices for proactive incident response, including use of real-time SIEM solutions.
Posted: 22 Oct 2015 | Published: 31 Dec 2014

Intel Security

Special Report: Best Practices for Incident Response
sponsored by Intel Security
WHITE PAPER: The SANS 2015 Incident Response survey results reveals an increasingly complex response landscape and the need for automation of processes and services to provide both visibility across systems and best avenues of remediation. Read this paper for coverage of these issues, along with best practices and sage advice.
Posted: 22 Oct 2015 | Published: 31 Aug 2015

Intel Security

Gartner Magic Quadrant for Secure Email Gateways 2015
sponsored by Proofpoint, Inc.
WHITE PAPER: In this Magic Quadrant report, find out what SEGs top the list as leaders delivering strong email security capabilities. View now to learn the strengths of today's top SEG platforms as well as cautionary advice from insiders.
Posted: 21 Oct 2015 | Published: 29 Jun 2015

Proofpoint, Inc.

Email is Today's #1 Advanced Threat Vector – Here's Why
sponsored by Proofpoint, Inc.
RESOURCE: Check out this brief infographic to learn what files hackers are using to dupe employees into clicking malicious links. Uncover the succes - or unsuccessful - level of protection antivirus provides against targeted threats.
Posted: 20 Oct 2015 | Published: 14 Oct 2015

Proofpoint, Inc.

The Cybercrime Economics of Malicious Macros
sponsored by Proofpoint, Inc.
RESOURCE: Learn more about how cybercriminals are driving today's massive targeted attack campaigns with ease.
Posted: 20 Oct 2015 | Published: 07 Oct 2015

Proofpoint, Inc.

Research Report: Attack Detection and Incident Response
sponsored by Intel Security
WHITE PAPER: This report examines organizations' security strategies, cyber-attack environments, and IR challenges and needs, including a lack of visibility into user and network activity, shortage of investigative skills, and poor security analytics capabilities.
Posted: 20 Oct 2015 | Published: 30 Apr 2015

Intel Security

Secure and Monitor Every Endpoint, Everywhere
sponsored by IBM
WHITE PAPER: This white paper discusses the challenges of endpoint security and gives advice on monitoring and protecting all of your endpoints before, during and after a hack.
Posted: 19 Oct 2015 | Published: 31 Jul 2015

IBM

Are You Ready for a New Era of Risk?
sponsored by Global Knowledge
WHITE PAPER: In this age of sophisticated threats, security awareness and training is essential for everyone within an organization. Access this white paper to learn how Cisco has continued to evolve its security solutions and training.
Posted: 19 Oct 2015 | Published: 19 Oct 2015

Global Knowledge

Case Study: Mitigate Email APTs in the Cloud
sponsored by Proofpoint, Inc.
CASE STUDY: Learn how H-E-B, a San Antonio based supermarket chain, eliminated false positive message classification and improved email security against APTs in the cloud.
Posted: 15 Oct 2015 | Published: 23 Sep 2015

Proofpoint, Inc.
126 - 150 of 750 Matches Previous Page    4 5 6 7 8 9    Next Page
 
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement