Software  >  

Malware

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
Malware Reports
51 - 75 of 848 Matches Previous Page  |  Next Page
Ransomware: Mitigating the Threat
sponsored by Zerto
WHITE PAPER: Discover more about recent advancements in ransomware, where it's going and what you can do you protect your files. Learn steps you must take before a ransomware attack hits to ensure its crippling effects don't threaten your business.
Posted: 07 Dec 2016 | Published: 30 Nov 2016

Zerto

Demo: Next-Gen Antivirus in Action
sponsored by Carbon Black
WEBCAST: Learn how next-generation antivirus protection works in this quick demonstration. Discover how to stop new and emerging malware threats, including zero-day ransomware attacks from owning your database and holding your data hostage.
Posted: 05 Dec 2016 | Premiered: Nov 30, 2016

Carbon Black

From Reactive to Proactive: How to Avoid Alert Fatigue
sponsored by ThreatConnect
WHITE PAPER: Learn how to prioritize security alerts and reduce alert fatigue. Discover how to achieve active response, allowing you to respond to attacks as quickly as they are detected.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

ThreatConnect

Remove the Security Blind Spots Created by Encrypted Traffic
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover how to get the visibility and control you need over encrypted traffic to ensure compliance with privacy and regulatory policies. Enable your organization to cost-effectively eliminate blind spots within your environment and maximize the effectiveness of your security infrastructure investments overall.
Posted: 17 Nov 2016 | Published: 31 Oct 2016

Symantec & Blue Coat Systems

2016 Global Cyber Threat Defense Report
sponsored by Symantec & Blue Coat Systems
RESOURCE: This cyber threat defense report aims to inform the IT security community about how their global peers are defending against threats and changes they expect to make moving forward.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Symantec & Blue Coat Systems

Build a Defense-in-Depth Security Approach
sponsored by TrendMicro
WHITE PAPER: Discover why a multi-layered, defense-in-depth approach to security is your best option to keep your organization protected. A robust, multi-layered approach should involve a vast array of techniques sharing threat intelligence to improve detection accuracy and deliver a maximum level of protection.
Posted: 14 Nov 2016 | Published: 01 Oct 2016

TrendMicro

Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility
sponsored by TrendMicro
WHITE PAPER: See how security pros and decision makers are responding to the increased frequency, volume and ferocity of today's cyber threats to endpoint devices. Discover what realizations they've come to about their own security tools and posture and learn just how inadequate your current threat protection most likely is.
Posted: 11 Nov 2016 | Published: 31 Oct 2016

TrendMicro

Beyond Next-Gen: Defining Future-ready Endpoint Security
sponsored by TrendMicro
WHITE PAPER: In this ESG report, discover how to achieve your desired level of high fidelity to get the most out of your endpoint protection. Learn how other organizations are buying their endpoint protection and make determinations for your own endpoint solution moving forward.
Posted: 10 Nov 2016 | Published: 31 Oct 2016

TrendMicro

The Top 5 Myths of Next-Gen Endpoint Protection
sponsored by TrendMicro
WHITE PAPER: Next-generation endpoint protection has been getting a lot of press recently. But what does the term actually mean? This short white paper dispels five common next-generation endpoint protection myths to help you sort through the marketing noise.
Posted: 10 Nov 2016 | Published: 31 Oct 2016

TrendMicro

Top Three Gaping Holes in Your Data Security
sponsored by Globalscape
WHITE PAPER: Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Globalscape

Effectively Manage Application Security Risk in the Cloud
sponsored by IBM
WHITE PAPER: Discover why application security is so important, why organizations struggle to achieve it and what effective application security looks like.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

IBM

Assessing Application Security: A Buyer’s Guide
sponsored by Veracode, Inc.
WHITE PAPER: In this SANs guide, learn the four-step method for acquiring the services you need to support a comprehensive application security (AppSec) lifecycle security program. Discover what goes into an effective AppSec team and how to acquire the resources necessary for deployment.
Posted: 07 Nov 2016 | Published: 31 May 2016

Veracode, Inc.

Vendor Comparison: Endpoint Security Leaders Revealed
sponsored by Carbon Black
RESOURCE: Discover which endpoint security provider Forrester determined was the leader in their field. Learn how to replace your old antivirus solution and arm incident-response teams with advanced tools to proactively hunt down threats.
Posted: 28 Oct 2016 | Published: 19 Oct 2016

Carbon Black

The Phishing Breakthrough Point
sponsored by KnowBe4
WHITE PAPER: Habits take time to form and become part of one's daily life – the same applies to being cyber street-smart about phishing prevention. Learn how to create a more effective phishing awareness training program through deeper analysis of the human landscape of your organization.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Employees at the Frontline in the Battle Against Ransomware
sponsored by KnowBe4
WHITE PAPER: In crunch time, it's all up to your employees to defend your critical information. Enable them to protect your organization sufficiently with proper security training and education in place. With well-trained personnel on the frontlines, you can ensure your organization stays safe from the crippling effects of ransomware.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Ransomware: A Hostage Rescue Manual
sponsored by KnowBe4
WHITE PAPER: Learn the different types of ransomware, how to spot them and how to prevent an attack against your files. Should you become infected, learn the steps you must take to best protect your assets and how to avoid future ransomware attacks.
Posted: 09 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Resource Center: Stop Threats and Prevent Data Loss
sponsored by Intel Security
RESOURCE: Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.
Posted: 21 Nov 2016 | Published: 30 Sep 2016

Intel Security

Resource Center: How to Safeguard Data
sponsored by Intel Security
RESOURCE: This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

Intel Security

Mitigate Security Risks with Hyperconverged Infrastructure
sponsored by SimpliVity
WHITE PAPER: Improve your security posture and best mitigate risks by implementing comprehensive security measures across your entire enterprise - from the network perimeter to the application layer. Discover how a hyperconverged infrastructure limits potential points of attack and consolidates security controls.
Posted: 18 Nov 2016 | Published: 31 Dec 2015

SimpliVity

Dynamic Security Management for a Productive Mobile Workforce
sponsored by RES Software
WHITE PAPER: This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.
Posted: 17 Nov 2016 | Published: 24 May 2016

RES Software

Do You Need Malware Protection on a VDI Thin Client?
sponsored by Dell, Microsoft and Citrix
EGUIDE: There are plenty of options for VDI thin client devices out there, and most are safe to use without antimalware software. But there are some thin client models that should have added malware protection. Learn which thin client needs extra protection and why.
Posted: 15 Nov 2016 | Published: 15 Nov 2016

Dell, Microsoft and Citrix

Four Top Cybercrime Trends
sponsored by IBM
WHITE PAPER: Today, organizations are going back to the basics. The major cybersecurity trends of recent can largely be addressed by focusing on "security 101." Learn how to reduce enterprise risk and limit attackers' opportunities as much as possible.
Posted: 02 Nov 2016 | Published: 31 Dec 2015

IBM

Reviewing a Year of Serious Data Breaches, Major Attacks and New Vulnerabilities
sponsored by IBM
WHITE PAPER: Discover which industries were hit hardest in 2015 and what these attacks mean for the future. Learn what steps you can take to prepare your security plan for growing threats in 2016 and beyond.
Posted: 02 Nov 2016 | Published: 01 Apr 2016

IBM

Malware Analysis: How Some Strains 'Adapt' to Virtual Machines
sponsored by Kaspersky Lab
EGUIDE: Server-oriented malware is actually more likely to infect a virtual system than a physical one in many organizations. Now what? This expert e-guide provides the real story of how malware is adapting to virtual environments, so you can ensure protection going forward.
Posted: 01 Nov 2016 | Published: 27 Oct 2016

Kaspersky Lab

Effectively Protect your Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how you can stay one step ahead of attacker with this infographic. Achieve a high level security posture with tools like web filtering, sandboxing and next generation firewall.
Posted: 31 Oct 2016 | Published: 30 Sep 2016

Fortinet, Inc.
51 - 75 of 848 Matches Previous Page    1 2 3 4 5 6    Next Page
 
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement