Software  >  

Malware

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
Malware Reports
151 - 175 of 750 Matches Previous Page  |  Next Page
Simplified Network Security  in 90 Seconds
sponsored by OpenDNS
WEBCAST: View this webcast to learn how to protect users on any device in any location from today's top network security threats such as malware and phishing attacks.
Posted: 14 Oct 2015 | Premiered: Jun 30, 2012

OpenDNS

Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware
sponsored by BlackBerry
WHITE PAPER: Take a deep look at recent malware attacks against file sharing systems and potential countermeasures to thwart them. Learn how to achieve secure mobile file sharing and mitigate the risk of information loss.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

BlackBerry

Speed Up Incident Response and Reveal Malicious IP Sources
sponsored by OpenDNS
WHITE PAPER: This breif white paper outlines how to gain great visibility and control over network traffic to uncover sophisticated threats.
Posted: 09 Oct 2015 | Published: 30 Sep 2015

OpenDNS

The 2015 Internet of Things in the Enterprise Report: Executive Summary
sponsored by OpenDNS
WHITE PAPER: In this IoT report, take a closer look at the 7 key findings about IoT devices, connectivity, and infrastructure. Access now and learn what you can do to protect your organization.
Posted: 09 Oct 2015 | Published: 29 May 2015

OpenDNS

Enhance Security Visibility to Improve Incident Response and Compliance
sponsored by OpenDNS
WHITE PAPER: In this white paper, explore the limitations of traditional security log measures such as firewalls, AD, and web proxies and why it's imperative to gain complete visibility over DNS and your network. View now to learn how to eliminate network security blind spots and enable your SIEM to detect masked cybersecurity threats.
Posted: 08 Oct 2015 | Published: 30 Sep 2015

OpenDNS

Understand The Anatomy of Attacks to Stay One Step Ahead
sponsored by OpenDNS
WHITE PAPER: In this white paper, learn the 7 (often repetitive) steps of a cybersecurity attack. View now to learn how to leverage DNS to gain east-west visibility into your network and stop hidden attacks before your data is compromised.
Posted: 08 Oct 2015 | Published: 02 Sep 2015

OpenDNS

The Importance of Secure Application Development Lifecycles
sponsored by WhiteHat Security
EGUIDE: This expert e-guide lays out four steps to implementing secure code. View now to learn how to develop the skills to mitigate malware attacks at the application layer. Additionally, examine the myths about compliance-ready web app security assessment tools.
Posted: 01 Oct 2015 | Published: 11 Mar 2015

WhiteHat Security

How Bad Can Adversaries Get?: Examining the Hacker's Evolution Over Time
sponsored by WhiteHat Security
WEBCAST: This webcast examines how hackers are evolving their techniques to achieve their goals faster and undetected, as well as the top 10 attacks they're using. Learn how a risk-based approach prioritizes vulnerabilities differently than the "high, medium, low" strategy and why it's imperative to make the switch.
Posted: 01 Oct 2015 | Premiered: May 6, 2015

WhiteHat Security

An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 01 Oct 2015 | Premiered: Jul 1, 2015

WhiteHat Security

Securing Apps from the First Line of Code
sponsored by WhiteHat Security
WHITE PAPER: This white paper teaches you how to integrate security analysis into apps from the moment the first line of code is written to reduce risks. View now to learn how to discover and remedy vulnerabilities during the development process in real-time.
Posted: 01 Oct 2015 | Published: 28 Oct 2014

WhiteHat Security

Evaluating the Total Cost of Ownership for Protecting Web Applications
sponsored by WhiteHat Security
WHITE PAPER: This white paper breaks down the total cost of web app security in the three major risk categories associated with successful attacks. Access now to learn how to quantify the costs of web app security compared to the costs of a breach.
Posted: 01 Oct 2015 | Published: 14 Oct 2013

WhiteHat Security

Mimecast Broad Spectrum Email Security for Office 365
sponsored by Mimecast
WHITE PAPER: In this white paper, you'll learn the limitations of Office 365 security and what you can do to protect your users and your email.
Posted: 11 Sep 2015 | Published: 05 Aug 2015

Mimecast

Endpoint Protection Software Features and Functionality
sponsored by Webroot
EGUIDE: This expert guide breaks down all the capabilities endpoint security platforms can offer, helping you determine which ones to look for and which ones your clients need most.
Posted: 10 Sep 2015 | Published: 10 Sep 2015

Webroot

Protecting Today's Endpoints: Rankings of Eight Endpoint Security Products
sponsored by Webroot
WHITE PAPER: This report contains the test results of eight different endpoint security systems, rating them on thirteen performance metrics so you can see which would work best for you.
Posted: 04 Sep 2015 | Published: 31 Aug 2015

Webroot

A New Approach to Endpoint Security
sponsored by Webroot
WHITE PAPER: Access this white paper to learn how you can take a new approach to security that provides unmatched protection for your devices and those of your customers.
Posted: 03 Sep 2015 | Published: 03 Sep 2015

Webroot

Cyber-Threats in 2015
sponsored by Webroot
WHITE PAPER: This white paper arms you with the most up-to-date web security knowledge that you need to keep your clients safe.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

Webroot

Why Endpoint Security Providers Must Evolve
sponsored by Webroot
WHITE PAPER: This analyst report evaluates what businesses are expecting from their endpoint security investments and discusses how you can meet these expectations.
Posted: 31 Aug 2015 | Published: 31 Dec 2014

Webroot

Email Security Guide: 7 Critical Capabilities of Email Gateways
sponsored by LogicNow
WHITE PAPER: This white paper presents the 7 critical capabilities of email gateways to mitigate the top 5 email attacks.
Posted: 27 Aug 2015 | Published: 22 Jul 2015

LogicNow

VARs: Gain More Reliable Revenue from Endpoint Security
sponsored by Webroot
WHITE PAPER: This white paper discusses the challenges VARs face when providing endpoint security and suggests offering cloud-based options as an alternative.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

Webroot

How to Get Bullet-Proof Grade Enterprise Email Protection
sponsored by LogicNow
WHITE PAPER: This white paper outlines a defense strategy for employing a third-party system to complement your email provider's security protection. Read on to add an additional line of defense to your business' email service to combat the melting pot of internet threats.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

LogicNow

Why Application Whitelisting Is Essential For Advanced Threat Defense
sponsored by Digital Guardian
WHITE PAPER: This webinar transcript explores the challenge of securing your endpoints from zero-day attacks and suggests application whitelisting as a solution.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Digital Guardian

Data Breaches: What Can and Cannot Be Done
sponsored by Global Knowledge
WHITE PAPER: This white paper discusses the inevitability of data breaches and gives tips for staying as secure as possible in an insecure threat environment.
Posted: 11 Aug 2015 | Published: 11 Aug 2015

Global Knowledge

Quick Guide to Network Anomaly Detection
sponsored by Prelert
WHITE PAPER: This brief white paper details the two types of anomaly scores and how they are manifested. Continue reading now to learn how to use each score as an indicator for proactive alerting.
Posted: 10 Aug 2015 | Published: 30 Jul 2015

Prelert

"Hacking as a Service," and Other Emerging Threats
sponsored by SearchSecurity.com
EZINE: Lethal threats to enterprise security are emerging from every which way. Access this exclusive edition of Information Security Magazine to learn just what you're up against.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

SearchSecurity.com

Endpoint Security: Beyond Antivirus
sponsored by SearchSecurity.com
EBOOK: In this e-book, security experts share tips on endpoint security that moves beyond outdated signature-based tools.
Posted: 10 Sep 2015 | Published: 10 Sep 2015

SearchSecurity.com
151 - 175 of 750 Matches Previous Page    5 6 7 8 9 10    Next Page
 
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement