Software  >  

Malware

RSS Feed   
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 

Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Malware Multimedia (View All Report Types)
1 - 25 of 44 Matches Previous Page  |  Next Page
Six Steps to Ransomware Recovery in a Commvault Environment
sponsored by Commvault
WEBCAST: Unfortunately, it can be hard to understand the aftermath of ransomware unless you or your organization has experienced it. Luckily, that’s where Commvault’s vast experience can come in handy. Watch the webinar, Six-Steps to Ransomware Recovery in a Commvault Environment to learn about Commvault’s ransomware recovery best practices.
Posted: 20 Sep 2021 | Premiered: Sep 20, 2021

TOPICS:  Malware
Commvault

Webinar -Hunting threats in harm’s way and dissecting it the Holmes way!
sponsored by Cisco Umbrella
WEBCAST: This talk will cover the rise of RATS, the rise of XLS attachment exploits, and new obfuscation techniques to conceal core code and configuration files by malware authors. The talk also touches on the theme of how techniques in exfiltration are changing and how rapidly other threat actors are adopting or improvising on these trends.
Posted: 21 May 2021 | Premiered: May 21, 2021

TOPICS:  Malware
Cisco Umbrella

Secureworks: Insights from SolarWinds and the Next Steps for Cybersecurity
sponsored by Dell SecureWorks
WEBCAST: The recent SolarWinds Orion software compromise gave the world a crash course in vulnerability. Leverage this webinar featuring incident response experts as they discuss the SolarWinds attacks and the lessons that can be drawn from them, including measures you can take to help keep your organization secure going forward.
Posted: 22 Mar 2021 | Premiered: Mar 22, 2021

Dell SecureWorks

Ransomware Threat Spotlight
sponsored by Barracuda
VIDEO: Another unfortunate consequence of 2020 was the apparent rise of ransomware threats, especially those targeting remote workers. This webinar provides a look back at the top ransomware trends of 2020, highlighting key tactics, common vulnerabilities and more – watch now to get started.
Posted: 23 Dec 2020 | Premiered: 23 Dec 2020

Barracuda

Security in the Fast Lane
sponsored by WhiteHat Security
WEBCAST: Today’s organizations rely on a collection of applications in order to maintain internal operations and interact with end-users. However, dangerous threats targeting data in these critical apps have emerged. Watch this webinar to learn more about the application security threat landscape, notable breaches and how to protect your apps.
Posted: 04 Dec 2020 | Premiered: Dec 4, 2020

WhiteHat Security

Webinar - Defend better and respond faster with security that works together
sponsored by Cisco Umbrella
WEBCAST: Most malware infections happen in one of only 3 ways, so why aren’t they easier to stop? As organizations embrace the cloud, it’s now imperative to find a new approach to securing users and devices. View this webinar to find out how to stop attacks before they start and how to safeguard your organization with a layered approach to cybersecurity.
Posted: 31 Jul 2020 | Premiered: Jul 14, 2020

Cisco Umbrella

Shor's Algorithm
sponsored by Thales
WEBCAST: While quantum computing presents a tremendous opportunity, it’s not without its risks. This webinar highlights the security implications of quantum computing, including the potential cyber threats that may be used by hackers and how organizations can address them. Watch now to learn more about the quantum threat.
Posted: 08 Jul 2020 | Premiered: Jul 8, 2020

Thales

Webinar - Simplicity is the new complexity – How malware authors make attack detection simple yet complex
sponsored by Cisco Umbrella
VIDEO: Emerging malware techniques indicate that cybercriminals are favoring simple, yet complex tricks in order to successfully conduct their campaigns. Watch this video to learn more about trending threat patterns, new malware tricks and how the simplest techniques can help organizations overcome these challenges.
Posted: 02 Jul 2020 | Premiered: 01 Jun 2020

Cisco Umbrella

Webinar - Summer school gone virtual? How to keep virtual activities safe for students
sponsored by Cisco Umbrella
WEBCAST: Schools are under constant threat from a variety of attacks, and with students now learning from home, hackers are finding it easier to break in. Without the right network security, your school district could be at risk.Watch this informative webcast about Cisco Umbrella, cloud-delivered network security that keeps your school safe.
Posted: 01 Jul 2020 | Premiered: May 18, 2020

Cisco Umbrella

Cryptomining - How Cryptocurrency is Changing Cyber Security
sponsored by Cisco Umbrella
WEBCAST: The days of ransomware are not over, but the more ominous threats facing us now are cryptojacking, miners, and crypto exchange phishing. Is your environment safe? View this webcast to learn everything you need to know about cryptocurrency, cryptojacking, and how you can protect yourself.
Posted: 10 Mar 2020 | Premiered: Mar 10, 2020

Cisco Umbrella

Implementing Privacy Policy: Application Security the Easy Way
sponsored by Ionic Security
WEBCAST: The fundamental issue with data protection is that security is often siloed, but sensitive data isn’t, leaving apps and data at risk. This webcast takes a closer look at Ionic Machina, which focuses on data protection through scalability, visibility, and access management controls. Watch now to learn more.
Posted: 04 Mar 2020 | Premiered: Mar 4, 2020

Ionic Security

Threats - Abracadabra of Malwares: Obfuscation
sponsored by Cisco Umbrella
WEBCAST: In this episode of ‘A Cybersecurity Technical Mini Series’, take an in-depth look at obfuscation malware techniques; how they work, types of attacks, and how to mitigate these threats. Watch now to learn more.
Posted: 12 Feb 2020 | Premiered: Nov 30, 2019

Cisco Umbrella

CASE STUDY: Tricentis slams the door on C-level email attacks using Barracuda Sentinel
sponsored by Barracuda
VIDEO: Tune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.
Posted: 08 Oct 2019 | Premiered: 31 May 2019

Barracuda

Tape as an Airgap Against Ransomware
sponsored by Fujifilm Recording Media USA, Inc.
WEBCAST: Join this webcast as Lead Analyst at Storage Switzerland George Crump and Security Strategist at Carbon Black David Balcar share ransomware defense tactics and examine the importance of airgapping infrastructure components. You'll also learn how to use tape as an airgap between ransomware attacks and your data.
Posted: 04 Apr 2019 | Premiered: Apr 4, 2019

Fujifilm Recording Media USA, Inc.

Enterprise Security and your Technology
sponsored by Hewlett Packard Enterprise
WEBCAST: This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett Packard Enterprise

Tips for Expediting Incident Response
sponsored by Threat Track Security
WEBCAST: This informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014

Threat Track Security

Symantec Endpoint Protection 12 Trialware
sponsored by Symantec Corporation
TRIAL SOFTWARE: Access this trial software by Symantec and discover the benefits of effective endpoint security.
Posted: 21 May 2014 | Premiered: 21 May 2014

Symantec Corporation

How to Limit the Risk of Attack on your XP Assets
sponsored by AT&T Cybersecurity
WEBCAST: This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Posted: 08 May 2014 | Premiered: May 8, 2014

AT&T Cybersecurity

Web Security – Virtual Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Cisco Systems, Inc.

Maximum-Strength Threat Detection for Mid-Size Enterprises
sponsored by EMC Corporation
WEBCAST: This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation

Unified Security Management: Real-time Threat Detection
sponsored by AT&T Cybersecurity
TRIAL SOFTWARE: This free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
Posted: 24 Mar 2014 | Premiered: 24 Mar 2014

AT&T Cybersecurity

Hidden Lynx – Professional Hackers for Hire
sponsored by Symantec Corporation
WEBCAST: This in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

Symantec Corporation

HID Global's ActivID® Authentication: Online Banking
sponsored by HID Global
WEBCAST: This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013

HID Global

2013 Cost of Cyber Crime – UK, France and Germany Findings
sponsored by Hewlett-Packard Enterprise
WEBCAST: Click to view a Q&A session with Larry Ponemon, Founder of Ponemon Institute, as he unveils the results from a global survey on cybercrime, and how the UK, France, and Germany have specifically dealt with the costs of these IT security attacks.
Posted: 31 Oct 2013 | Premiered: Oct 31, 2013

Hewlett-Packard Enterprise

Enhancing Security with Intel® Trusted Execution Technology
sponsored by Dell, Inc. and Intel®
VIDEO: This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!
Posted: 29 Aug 2013 | Premiered: 29 Aug 2013

Dell, Inc. and Intel®
1 - 25 of 44 Matches Previous Page    1 2    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences