Software  >  

Malware

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
Malware Reports
51 - 75 of 711 Matches Previous Page  |  Next Page
Insider Threat Patterns and Ways of Prevention
sponsored by Varonis
EGUIDE: This expert guide addresses the danger of accidental insider threats, giving you insight into how to prevent these threats from happening and how you can analyze network activity to stop unusual actions.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Varonis

Don’t Let Your DDoS Defense Fall Behind
sponsored by Neustar®
WHITE PAPER: This white paper examines the pros and cons of several different DDoS mitigation approaches. Access now to learn how to evaluate and choose the ideal strategy based on your risk assessment.
Posted: 01 Jul 2015 | Published: 13 May 2015

Neustar®

Network Forensics for Attack Mitigation
sponsored by Global Knowledge
WHITE PAPER: This white paper explains how network forensics are emerging as a key solution to limiting the damage of network malware attacks.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Global Knowledge

Enabling Secure Anywhere, Anytime Access
sponsored by HID
WHITE PAPER: This white paper examines how to enable anywhere anytime access to users while providing a simple and secure experience for multi-channel computing.
Posted: 29 Jun 2015 | Published: 06 Mar 2014

HID

Today's Top Mobile Security Challenges and Defense Strategies
sponsored by HID
WHITE PAPER: This white paper examines the top mobile security challenges IT is facing today and the most successful defense strategies being used to mitigate threats.
Posted: 26 Jun 2015 | Published: 05 May 2015

HID

Managing App Sideloading Threats on iOS 2015
sponsored by Lookout
WHITE PAPER: This white paper examines the security threats organizations face when attackers continue to abuse enterprise provisioning and use it to sideload malware on iOS devices.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Lookout

Cybercrime Readiness in Europe
sponsored by Hewlett-Packard Limited
WHITE PAPER: This report reveals the results of a survey assessing Europe's cybercrime readiness.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

Hewlett-Packard Limited

How European Enterprises Are Preparing for Cybercrime
sponsored by Hewlett-Packard Limited
WHITE PAPER: This report reveals the results of a survey assessing Europe's cybercrime readiness.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Hewlett-Packard Limited

10 Ways to Protect Your Company From a Data Breach
sponsored by Bit9 + Carbon Black
WEBCAST: This webcast presents a 10 step strategy to tightening retail security and maintaining PCI compliance.
Posted: 19 Jun 2015 | Premiered: Apr 4, 2014

Bit9 + Carbon Black

Shore Up Your Office 365 Attack Surface
sponsored by SearchSecurity.com
EBOOK: This exclusive e-guide reviews the Office 365 suite's security features, including how to take advantage of its benefits and what challenges you may encounter.
Posted: 18 Jun 2015 | Published: 15 Jun 2015

SearchSecurity.com

Protecting Applications from the Server to the Endpoint
sponsored by Bit9 + Carbon Black
WHITE PAPER: This brief white paper examines a holistic security approach to prevent data breaches.
Posted: 18 Jun 2015 | Published: 27 Mar 2015

Bit9 + Carbon Black

In The Crosshairs: Point of Sale Systems
sponsored by Bit9 + Carbon Black
RESOURCE: In this brief infographic, discover the realities of POS attacks to avoid thinking your organization is covered when you may be the next sitting duck.
Posted: 18 Jun 2015 | Published: 14 Jan 2015

Bit9 + Carbon Black

Virtualization Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom looks at how malware is adapting to virtual networks and tools (advanced malware protection) and processes (hardening, logging, snapshots) that can help organizations secure these environments.
Posted: 17 Jun 2015 | Premiered: 16 Jun 2015

SearchSecurity.com

Malware Defense and the Fundamentals of Endpoint Security
sponsored by Malwarebytes Corporation
EGUIDE: This e-guide contains expert advice on malware detection, endpoint security, and more.
Posted: 12 Jun 2015 | Published: 12 Jun 2015


Endpoint Security and Best Practices for Detecting Malware
sponsored by Malwarebytes Corporation
EGUIDE: In this e-guide, you can find essential tips for adapting your endpoint security to the mobile workforce, and for protecting against hidden malware.
Posted: 12 Jun 2015 | Published: 12 Jun 2015


How to Protect Data from Ransomware and Defend Against the Digital Invasion
sponsored by Malwarebytes Corporation
EGUIDE: This e-guide can help you stay ahead of new cyber-threat developments by telling you all you need to know about ransomware, new digital threats, and more.
Posted: 12 Jun 2015 | Published: 12 Jun 2015


Advanced Persistent Threat Detection and How to Prevent Drive-By Download Attacks
sponsored by Malwarebytes Corporation
EGUIDE: This e-guide explains what you can do to detect and stop even the most advanced threats.
Posted: 12 Jun 2015 | Published: 12 Jun 2015


The Essential Guide To Selling Managed Endpoint Protection
sponsored by Solarwinds N-able
WHITE PAPER: This guide offers essential tips for building managed security services that effectively protect your customers while building your revenue.
Posted: 09 Jun 2015 | Published: 09 Jun 2015

Solarwinds N-able

Current DDoS Attack and Security Landscape
sponsored by Neustar®
RESOURCE: This white paper report outlines the state of DDoS attack trends and the defensive approaches organizations are using. View now to learn why traditional DDoS defenses are allowing hidden malware to sneak through and the new approaches to mitigate DDoS attacks.
Posted: 29 May 2015 | Published: 25 Mar 2015

Neustar®

The 2015 Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: The HP Cyber Risk Report 2015 provides a broad view of the 2014 threat landscape and gives you the insight you need to protect your business from both known vulnerabilities and unknown exploits.
Posted: 29 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Company

Inside a Spear-Phishing Attack and How To Prevent Them
sponsored by Mimecast
WHITE PAPER: This white paper presents the timeline of a spear-phishing attack and the common security strategies used that ultimately fail to protect the organization.
Posted: 26 May 2015 | Published: 22 Apr 2015

Mimecast

Detect and Protect against Advanced Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper examines the architecture of a strong, layered security system and suggests ways to partner with security services in order to achieve it.
Posted: 22 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

Examining the Hacker's Evolution
sponsored by WhiteHat Security
WEBCAST: This webcast examines how hackers are evolving their techniques to achieve their goals faster and undetected and the top 10 attacks they use. Inside, learn how a risk based approach prioritizes vulnerabilities differently than the "high, medium, low" strategy and why it's imperative to make the switch. View now to learn more.
Posted: 21 May 2015 | Premiered: May 6, 2015

WhiteHat Security

Keep Yourself Secure from Growing Cyber-Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this infographic, discover what you can do to stay safe in an increasingly dangerous cyber landscape, including increasing proactivity in your security strategy and partnering with security services.
Posted: 21 May 2015 | Published: 21 May 2015

Hewlett-Packard Limited

Advance the Fight against Cyber Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces the benefits of security services and gives you advice on how to best take advantage of them.
Posted: 21 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited
51 - 75 of 711 Matches Previous Page    1 2 3 4 5 6    Next Page
 
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement