Software  >  

Malware

RSS Feed   
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 

Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Malware Reports
1 - 25 of 577 Matches Previous Page  |  Next Page
Solution Brief: A Unified-Client Platform for Enterprise-Grade Endpoint Security
sponsored by SonicWall
PRODUCT OVERVIEW: With the growth of ransomware and the persistent use of credential theft, endpoints are the battleground of today's threat landscape. That's why many turn to SonicWall Capture Client for advanced behavior-based malware protection, cloud sandbox file testing, and web threat protection. Download this brief to learn more about the benefits today.
Posted: 10 Jun 2019 | Published: 10 Jun 2019

SonicWall

Solution Brief: Real-Time Deep Memory Inspection
sponsored by SonicWall
PRODUCT REVIEW: Learn about SonicWall Real-Time Deep Memory Inspection technology and how it can catch more malware faster than behavior-based sandboxing methods, with a lower false positive rate.
Posted: 07 Jun 2019 | Published: 07 Jun 2019

SonicWall

Understanding Email Fraud
sponsored by Proofpoint
RESOURCE: Business Email Compromise (BEC) is one of today's greatest cyberthreats to an organization. These highly targeted attacks are exploiting people rather than technologies to steal money and valuable business information. In this infographic, explore key email fraud statistics from Proofpoint's research of 2,250 IT decision makers.
Posted: 07 Jun 2019 | Published: 07 Jun 2019

Proofpoint

Lincoln Memorial University Case Study
sponsored by Proofpoint
CASE STUDY: There was an increasing amount of students and faculty members at Lincoln Memorial University targeted by phishing attacks. After realizing the problem, the IT team began looking for a spam filter replacement to deliver better email protection. In this case study, learn about why Lincoln Memorial University decided to implement Proofpoint.
Posted: 06 Jun 2019 | Published: 06 Jun 2019

Proofpoint

Corralling Email-Based Threats To Keep Them Out Of Users' Mailboxes
sponsored by Proofpoint
CASE STUDY: When Agri-Marché started seeing more and more email threats in employees' inboxes, the food company needed an email security platform that would secure 5 email domains and protect 300 inboxes. In this case study, learn how Agri-Marché was able to do this by deploying Proofpoint Email Protection and Proofpoint Target Attack Protection.
Posted: 06 Jun 2019 | Published: 06 Jun 2019

Proofpoint

Integrating Threat Intelligence into Endpoint Security
sponsored by CrowdStrike
WHITE PAPER: As the threat landscape continues to change security teams need all the help they can get to more effectively prevent, detect and respond to threats. In this white paper, learn how incorporating a threat intelligence platform, like CrowdStrike's Falcon X, into the detection and response workflow could help to significantly enhance investigations.
Posted: 05 Jun 2019 | Published: 30 Nov 2018

CrowdStrike

The Golden State Warriors Case Study: Leading on the Court and in Social Media
sponsored by Proofpoint
CASE STUDY: As the Golden State Warriors' social media pages became more popular, bad actors were attracted to the large audiences. They began posting malware, phishing scams and spam to their pages. In this case study, learn how the Warriors were able to manage this malicious behavior by bringing in Proofpoint's Nexgate team.
Posted: 05 Jun 2019 | Published: 05 Jun 2019

Proofpoint

Securing Office 365 Email with Isolation
sponsored by Menlo Security
EBOOK: An isolation platform can address many of the gaps in email and web security, that are currently left unaddressed by attackers in Office 365. Read on to learn about the benefits of an isolation platform and how it can help protect users from web-borne malware attacks via drive-by downloads, watering-hole attacks, malvertising, and much more.
Posted: 05 Jun 2019 | Published: 05 Jun 2019

Menlo Security

Royal Bank of Scotland Reduces Phishing Susceptibility
sponsored by Proofpoint
CASE STUDY: The Royal Bank of Scotland (RBS) recognized that its email users presented a significant attack surface. As they began experiencing phishing attacks, RBS saw the need to educate their employees on the damage phishing attacks can cause. In this case study, learn how RBS was able to do this using Proofpoint Security Awareness Training.
Posted: 05 Jun 2019 | Published: 28 Feb 2019

Proofpoint

Who needs malware? How Adversaries use Fireless Attacks to Evade your Security
sponsored by CrowdStrike
WHITE PAPER: According to CrowdStrike, 8 out of 10 attack vectors that resulted in a successful breach used fileless attack techniques. Access this white paper to learn how fileless attacks work and why traditional techniques fail to protect your organization.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

Cyber Intrusion Services
sponsored by CrowdStrike
WHITE PAPER: In this report, discover how the CrowdStrike Falcon can deliver the visibility and operational expertise necessary to stop breaches before adversaries can take control of your entire network, as well as stories from the front lines of incident response in 2018 and insights that matter for 2019.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

AV Replacement Guide
sponsored by CrowdStrike
WHITE PAPER: Antivirus is virtually universal, so why are so many attacks succeeding? Attackers expect their targets to be running some form of protection and have adapted their tools, techniques and procedures to evade detection. In this white paper, learn the most important elements to consider when replacing an antivirus or endpoint protection solution.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

2019 SonicWall Cyberthreat Report
sponsored by SonicWall
RESEARCH CONTENT: Even for organizations, businesses and governments, a cyberattack is personal. At its very core, they strip these establishments and employees of their identities, privacy, reputation and monetary assets. In SonicWall's 2019 SonicWall Cyber Threat Report, explore key advancements in the threat landscape.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

SonicWall

The Human Factor Report 2018
sponsored by Proofpoint
RESEARCH CONTENT: Over the last year, cybercriminals have increased their use of social engineering, scaling up people-centered threats. Whether they are broad-based or targeted the social engineering tactics used in these attacks work time and time again. In this research report, explore 5 recommendations to help protect your organization against these threats.
Posted: 04 Jun 2019 | Published: 31 Dec 2018

Proofpoint

Endpoint Protection Buyers Guide
sponsored by CrowdStrike
WHITE PAPER: Endpoint security is one of the most critical components of a cybersecurity strategy. Unfortunately, for those responsible for protecting their organizations' endpoints, it has never been more challenging to select the best solution for the job. In this white paper, discover an evaluation of endpoint protection platforms based on 5 key elements.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

The Insider Threat: Real Defense for Real Businesses
sponsored by Proofpoint
WEBCAST: How do you detect and mitigate insider data leaks and reduce the potential for such incidents in the first place? In this webinar, Kate Burnell, Global Insider Threat Specialist at Dtex Systems and Kurt Wescoe, Chief Architect at Wombat Security discuss how cybersecurity professionals can address the insider threat without shutting down business.
Posted: 30 May 2019 | Premiered: Nov 30, 2018

Proofpoint

Interview: The People Factor: Fight Back Against Phishing
sponsored by Proofpoint
WEBCAST: Phishing remains the top attack vector used by cybercriminals and every end user is a potential target. But with the right security awareness training, these same people can be a key component in your anti-phishing defense. In this webcast, Kurt Wescoe, Chief Architect at Wombat Security shares his insights on preventing phishing attacks.
Posted: 30 May 2019 | Premiered: Jun 30, 2018

Proofpoint

Apply the ASD Top 4 and Mitigate up to 85% of Endpoint Attacks
sponsored by Ivanti ANZ
DATA SHEET: As cybersecurity breaches proliferate, targeting the user and the endpoint, the pressure on InfoSec and IT teams to protect their organization grows. In this data sheet, learn how Ivanti's Security portfolio provides InfoSec and IT teams with capabilities essential for ransomware and other malware prevention.
Posted: 29 May 2019 | Published: 31 Dec 2017

Ivanti ANZ

Protecting People: A Quarterly Analysis of Highly Targeted Cyberattacks
sponsored by Proofpoint
RESEARCH CONTENT: Today's attackers can trick your workers into opening an unsafe attachment or clicking on a dubious web link. They can also impersonate your CEO and order your finance department to wire money. Download this quarterly analysis to discover who at your organization is being attacked and how you can help protect them from these threats.
Posted: 28 May 2019 | Published: 28 May 2019

Proofpoint

Protect Critical Infrastructures from Nation-State Attacks
sponsored by enSilo
RESOURCE: Nation states funding allows cybercriminals to develop APT groups targeting discontinued, unsupported and outdated control systems, lacking relevant security measures. This is a combination for worldly disaster. In this resource, explore 5 ways your organization can defeat state sponsored attacks.
Posted: 24 May 2019 | Published: 24 May 2019


Cybersecurity Benchmarking & Security Performance Management
sponsored by BitSight
WHITE PAPER: A new, data-driven security performance management approach is required to maintain security, minimize risk, and reduce costs. The key component of this new data-driven approach is the security rating. In this white paper, explore how the approach can be applied to security performance management, benchmarking and reporting.
Posted: 22 May 2019 | Published: 22 May 2019

BitSight

Real-Time Automated Endpoint Security
sponsored by enSilo
DATA SHEET: enSilo's real-time automated endpoint security has a mission to deliver comprehensive real-time endpoint protection offering post- and pre-infection protection against advance malware. In this resource, learn more about the benefits of enSilo.
Posted: 22 May 2019 | Published: 22 May 2019


How to Survive Advanced Targeted Attacks
sponsored by enSilo
CASE STUDY: Beverage companies' data is constantly on the radar of competitors and threat actors looking to steal or maliciously modify ingredients in data breaches. In this case study, learn how one beverage company was able to discover over 300 potential threats and unauthorized programs running on their endpoint by installing enSilo.
Posted: 21 May 2019 | Published: 21 May 2019


Instant Security Maturity Assessment
sponsored by CrowdStrike
RESOURCE: In this resource, learn about CrowdStrike's Falcon Complete which fuses machine intelligence with human intervention to prevent breaches. Falcon Complete operationalizes your organization against malware, ransomware and fileless attacks. Download the resource to explore the benefits.
Posted: 21 May 2019 | Published: 21 May 2019

CrowdStrike

Enterprise Email Security, Q2 2019: The 12 Providers That Matter Most And How They Stack Up
sponsored by Trend Micro, Inc.
RESEARCH CONTENT: Email is a critical business function deeply embedded in business processes. Its ubiquity makes email a platform for credential phishing attempts, malware, spam, and business email compromise. This research report suggests 3 key considerations to look for when choosing an email content security provider.
Posted: 21 May 2019 | Published: 16 May 2019

Trend Micro, Inc.
1 - 25 of 577 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement