Software  >  

Malware

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
MalwareReports
151 - 175 of 640 Matches Previous Page  | Next Page
Hackers, Hacking, and CEHv8
sponsored by Global Knowledge
WHITE PAPER: This resource addresses hackers, hacking, and what can be done to prevent cyber-attacks. It also highlights the different motives for hacking and common methods hackers use.
Posted: 19 Mar 2014 | Published: 21 Jan 2014

Global Knowledge

Protecting your Endpoints from Cyber-Crime
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This whitepaper highlights the need for a new layered, defense-in-depth security approach – one that fortifies the endpoint itself through a handful of security controls and critical factors to keep users and endpoints safe.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

Dell, Inc. and Intel®

Endpoint Security Technology
sponsored by TechTarget
RESOURCE: With the increasing number of client devices-endpoints, IT is challenged with managing this sheer volume of endpoints as your organization is left with multiple vulnerabilities. This expert guide details how endpoint protection software can help block malicious network traffic while providing secure access to your sensitive business data.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Expert Guide to Secure Web Gateways
sponsored by TechTarget
RESOURCE: Investments in secure Web gateways (SWG) are on the rise because traditional firewalls don't stop all attacks against enterprise systems. Don't waste another minute researching SWG feature options. Participate in our brief survey and waiting for you is your complimentary e-guide that outlines why SWG is worth the investment.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Reducing the Cost and Complexity of Endpoint Management
sponsored by IBM
WHITE PAPER: This guide explores key tactics for thwarting cyber-attacks, how to protect your system, and the benefits of utilizing endpoint management.
Posted: 18 Mar 2014 | Published: 30 Sep 2013

IBM

The Modern Malware Review: Analysis of New and Evasive Malware in Live Enterprise Networks
sponsored by Palo Alto Networks
WHITE PAPER: This crucial paper discusses the latest malware threats, analyzing more than 1,000 organizations and examining the malware samples that were initially undetected by industry-standard security solutions.
Posted: 18 Mar 2014 | Published: 18 Mar 2013

Palo Alto Networks

Evolving Security Tech Presents New Opportunities for Businesses
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Fortinet, Inc.

Attacks on Point of Sale Systems
sponsored by Symantec Corporation
WHITE PAPER: Identity theft is one of the most common forms of cybercrime, and your Point of Sale (POS) system is especially vulnerable to this attack type. This in-depth guide explores how cybercriminals use malware to steal credit card information at the POS.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Symantec Corporation

What can you do differently to guard against threats from rapidly evolving mobile malware?
sponsored by IBM
WHITE PAPER: This must-see white paper discusses the emerging and evolving risks associated with mobile computing and applications. Also inside, find insight to help you effectively address mobile vulnerabilities.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks
sponsored by IBM
WHITE PAPER: This white paper offers background on today's malware and its 4 predictable steps. Click through to discover a set of integrated solutions that offer improved visibility and defense to block advanced attacks.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Five Common Web Application Vulnerabilities and How to Avoid Them
sponsored by Imperva
EGUIDE: In this E-Guide, expert Michael Cobb details the five most common Web application vulnerabilities and provides methods to help enterprises fix the original problems.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Imperva

DDoS Mitigation: Best Practices for a Rapidly Changing Threat Landscape
sponsored by Verisign, Inc.
WHITE PAPER: This guide explores one company's set of best practices that enables organizations to keep pace with DDoS attacks while minimizing impact on business operations.
Posted: 28 Feb 2014 | Published: 31 Dec 2012

Verisign, Inc.

Information Security ASEAN March 2014
sponsored by SearchSecurity.com
EZINE: This ezine looks at the security challenges facing IT security professionals in the ASEAN region with a look at threats and industry trends.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

SearchSecurity.com

Information Security ANZ March 2014
sponsored by SearchSecurity.com
EZINE: This issue looks at the security challenges facing IT security professionals in the Australia/New Zealand region.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

SearchSecurity.com

State of Security Operations
sponsored by Hewlett-Packard Company
WHITE PAPER: With businesses recognizing the need for further investment in cyber-defense, it is essential to figure out which tools and strategies are best for your organization. Read now and find out more about the current state of security operations in 2014.
Posted: 14 Mar 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

Detecting Sophisticated Online Attacks with Streaming Analytics
sponsored by EMC Corporation
WHITE PAPER: Discover how RSA Web Threat Detection delivers actionable intelligence by leveraging big data to correlate anomalies and detect online threats in real time.
Posted: 13 Mar 2014 | Published: 31 Dec 2013

EMC Corporation

How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER: This white paper explores the widening gap between the offensive capabilities of today's cyber attackers and the weak traditional defenses deployed in most data centers.
Posted: 10 Mar 2014 | Published: 31 Dec 2013

FireEye

EFT Server to Replace USB for SCADA; EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture
sponsored by GlobalScape
WHITE PAPER: This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally.
Posted: 06 Mar 2014 | Published: 31 Dec 2012

GlobalScape

Insider Edition: Antimalware Technologies and Techniques to the Rescue
sponsored by SearchSecurity.com
EZINE: In this special edition of Information Security, our experts examine the recent advances in anti-malware detection and prevention, and which ones can tip the scale in your favor in the fight against malware.
Posted: 05 Mar 2014 | Published: 05 Mar 2014

SearchSecurity.com

The Definitive Guide to the Next Generation of Threat Protection
sponsored by FireEye
EBOOK: This in-depth eBook examines the next generation of threat protection and provides key insights into critical topics, such as advanced persistent threats and zero-day attacks.
Posted: 04 Mar 2014 | Published: 31 Dec 2013

FireEye

The SIEM Evaluator's Guide
sponsored by AlienVault
WHITE PAPER: This guide takes a look at the current trends in security management and how an effective SIEM strategy can help you ensure security.
Posted: 04 Mar 2014 | Published: 04 Mar 2014

AlienVault

Symantec Intelligence Report - January 2014
sponsored by Symantec Corporation
WHITE PAPER: This in-depth analysis explores the current threat landscape, the most common security threats, and how you can prevent them.
Posted: 03 Mar 2014 | Published: 31 Jan 2014

Symantec Corporation

Internet Security Census 2013
sponsored by Fortinet, Inc.
WHITE PAPER: This guide explores key survey findings regarding increased workplace mobility and how security threats are targeted toward various mobile endpoints.
Posted: 28 Feb 2014 | Published: 31 Dec 2013

Fortinet, Inc.

Advanced Attacks Require Federal Agencies to Reimagine IT Security
sponsored by FireEye
WHITE PAPER: This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FireEye

Supply Chain Analysis: From Quartermaster to Sunshop
sponsored by FireEye
WHITE PAPER: This in-depth guide explores the current threat landscape and the role of APTs. Read now for more information on how APTs are being used for wide-scale cybercrime campaigns.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FireEye
151 - 175 of 640 Matches Previous Page    5 6 7 8 9 10    Next Page
 
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement