Software  >  

Malware

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
Malware Reports
226 - 250 of 925 Matches Previous Page  |  Next Page
Today's Top Intrusion Prevention Systems
sponsored by IBM
WHITE PAPER: This Magic Quadrant presents the strengths and weaknesses of today's top next-generation intrusion prevention system (NGIPS) vendors and outlines what capabilities your security strategy needs. View now to learn how to evaluate NGIPS vendors and platforms.
Posted: 18 Feb 2016 | Published: 16 Nov 2015

IBM

Protect Your Business with the Next-Generation Firewall
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper shows you how to achieve next-generation firewall protection with integrated application awareness, intrusion prevention and role-based user controls.
Posted: 18 Feb 2016 | Published: 31 Jul 2015

Juniper Networks, Inc.

Think You Have Application Security Covered? Think again.
sponsored by Black Duck Software
WHITE PAPER: Access this white paper and learn about some of the complications developers have when dealing with open source application development.
Posted: 17 Feb 2016 | Published: 27 Jan 2016

Black Duck Software

Know Your Open Source Code Security is Enhanced by Better Visibility into Code Acquired from Multiple Sources
sponsored by Black Duck Software
WHITE PAPER: This white paper shows you the benefits and shortcomings of open source code and how to deal with any problems you might face when developing with it.
Posted: 16 Feb 2016 | Published: 27 Jan 2016

Black Duck Software

What Executives Need to Know About Security Testing Tools and Open Source
sponsored by Black Duck Software
WHITE PAPER: This white paper teaches you how to utilize open source code without accruing potential risks involved in it.
Posted: 16 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

A Guide to Email Security for Mid-sized Businesses
sponsored by LogicNow
WHITE PAPER: In this white paper, examine the current state of email security for mid-sized businesses and evaluate the key features of a successful email gateway security solution. View now to learn how you can mitigate your email risk with multiple antivirus engines, filtering for email exploits, and intelligent spam filtering.
Posted: 16 Feb 2016 | Published: 31 Dec 2015

LogicNow

Gartner: Magic Quadrant for Enterprise Data Loss
sponsored by Digital Guardian
WHITE PAPER: This white paper discusses today's DLP market and what your DLP architecture should look like. Read more to learn about the two categories from DLP: Enterprise DLP and Integrated DLP.
Posted: 15 Feb 2016 | Published: 28 Jan 2016

Digital Guardian

10 Things Your Cybersecurity Solution Must Do
sponsored by Palo Alto Networks
WHITE PAPER: As cybercrime evolves, so must your defense strategy to secure your organization; however, multiple tools often do not mesh perfectly and vulnerabilities are left open. In this white paper, learn the 10 must-have security capabilities for your strategy.
Posted: 15 Feb 2016 | Published: 23 Dec 2015

Palo Alto Networks

Application Security in 2016: A Comprehensive Overview
sponsored by Black Duck Software
WHITE PAPER: In this white paper, you will read about key open source application security challenges that your business will face in 2016. Learn how CISO's can address and manage those challenges effectively.
Posted: 15 Feb 2016 | Published: 27 Jan 2016

Black Duck Software

Next Generation Firewall for Dummies
sponsored by Palo Alto Networks
EBOOK: This eBook provides and in-depth overview of next-gen firewalls.
Posted: 15 Feb 2016 | Published: 27 Jan 2016

Palo Alto Networks

Lightboard WildFire vs Standalone Sandboxing
sponsored by Palo Alto Networks
VIDEO: This presentation shows you how to simplify your network traffic monitoring and get rid of your existing Sandbox appliance. Protect against zero-day threats by using both static and dynamic analysis techniques.
Posted: 12 Feb 2016 | Premiered: 17 Oct 2014

Palo Alto Networks

What Security Professionals Need to Know About Open Source Vulnerabilities
sponsored by Black Duck Software
WHITE PAPER: This resource reviews the use of automated controls throughout the software lifecycle and which processes can be used to reduce open source security vulnerabilities.
Posted: 12 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

The Business Benefits of Managing Cyber Risk and Minimizing Unnecessary Data
sponsored by UnitedLex
EGUIDE: Cyber risk management is becoming an increasingly important area of concern as company directors' realize the limitations of insurance. How can you address this risk and instill confidence in your customer engagement? Find out how to enhance your cyber risk management using 4 key strategies.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

The Problem Facing Advanced Threat Defense
sponsored by UnitedLex
EGUIDE: The biggest problem facing advanced threat defense is not necessarily the threat itself but rather uncertainty about which security strategy will offer the best results—and there's often not enough time to answer that question before making an investment. This e-guide provides expert commentary on how to address this problem in threat management.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Advanced Persistent Threat Detection: Can It Find Custom Malware?
sponsored by UnitedLex
EGUIDE: A recent test showed that some well-known threat detection products were unable to detect custom-written malware samples thrown at them. Access this resource and find out if APT detection is an effective way to find custom malware, and why signature-based antimalware tools can't keep up with today's evolving security risks.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

How Global Threat Intelligence Fits into a Security Strategy
sponsored by UnitedLex
EGUIDE: While global threat intelligence services can be a powerful business security tool, it's not the first one you should consider when setting strategy for better business security. Read on to evaluate the role of global threat intelligence in today's enterprise and assess other tactics to bolster this strategy.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

The top threat intelligence services for enterprises
sponsored by UnitedLex
EGUIDE: If threat intelligence is right for you, this e-guide will help you get started with a list of top threat intelligence products on the market today and how to choose the right one for your needs.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Targeted Cyber Attacks: Infecting the Victim
sponsored by UnitedLex
EGUIDE: This e-guide goes in-depth examining the most popular attacks used by hackers and what steps you need to take to defend yourself.
Posted: 18 Feb 2016 | Published: 10 Feb 2016

UnitedLex

Podcast: Protecting Your Crown Jewels from Devastating Data Breaches
sponsored by Lancope
PODCAST: Using these tools and tactics, you can identify advanced attacks and protect the crown jewels on your network.
Posted: 18 Feb 2016 | Premiered: Feb 16, 2016

Lancope

Protecting Your Crown Jewels from Devastating Data Breaches
sponsored by Lancope
WEBCAST: Join Cisco's Cyber Security Specialist, Charles Herring, to learn how network behavioral anomaly detection (NBAD) and deep visibility through NetFlow can be used to quickly alert administrators to these violations.
Posted: 18 Feb 2016 | Premiered: Jan 27, 2016

Lancope

AWS & Alert Logic Case Study
sponsored by Alert Logic
WHITE PAPER: This case study shows you the results of Concep and how they gained comprehensive network threat and intrusion detection capabilities.
Posted: 17 Feb 2016 | Published: 31 Dec 2015

Alert Logic

7 Best Practices of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This white paper give you steps you should take and point of interest you should review in your network security.
Posted: 17 Feb 2016 | Published: 27 Jan 2016

Alert Logic

Secure Wi-Fi for K-12 Education
sponsored by Fortinet, Inc.
WHITE PAPER: Mobile devices present new security challenges for schools that need to protect their network integrity as well as restrict students' access to dangerous sites. Access this resource to learn about a solution that unifies network and application security and delivers maximum control at a low cost.
Posted: 16 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.

Case Study: Increasing Bandwidth and Network Security
sponsored by Fortinet, Inc.
WHITE PAPER: This case study details how one leading university was able to bolster its network security as bandwidth increased. View now to learn how they achieved this goal and the benefits they were able to reap.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

Fortinet, Inc.

Solution Brief: Satisfying Today's Bandwidth Hungry Consumers
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights a high performance next generation firewall solution that protects information and applications without slowing down your network or affecting availability. Read on to see how this firewall solution can provide your enterprise with in-depth visibility and reporting, highly effective intrusion prevention system, and more.
Posted: 12 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.
226 - 250 of 925 Matches Previous Page    8 9 10 11 12 13    Next Page
 
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement