Software  >  


RSS Feed   
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 

Malware definition sponsored by, powered by an online computer dictionary
Malware Reports
1 - 25 of 920 Matches Previous Page  |  Next Page
Ransomware Prepare to Protect 2019
sponsored by OffSiteDataSync
VIDEO: This webinar will help your organization prepare for ransomware threats in the coming year, taking into account the role of human error, 6 ransomware delivery channels, Office 365 vulnerabilities, Ransomware as a Service, and proven tactics to stay protected. Join the conversation here.
Posted: 11 Dec 2018 | Premiered: 05 Dec 2018


Security Automation Quick Wins
sponsored by Siemplify
VIDEO: The state of security operations has led to teams embracing automation to combat alert overload and make the most of their security tools. However, many companies don't know where to start. This webcast details which processes are ripe for automation and gives practical examples for automating security operations processes.
Posted: 07 Dec 2018 | Premiered: 05 Dec 2018


Inner Workings of Ransomware and Ways to Detect and Respond
sponsored by Arctic Wolf
VIDEO: Ransomware hacks can bypass your perimeter controls and infect your critical systems, brining your business to a halt. Unfortunately, focusing on prevention technologies, with point security products, may not be sufficient enough to fight these key security concerns. This webinar contains key insights on a ransomware cyber kill chain.
Posted: 07 Dec 2018 | Premieres: 31 Dec 2018

Arctic Wolf

2018 State of Cybercrime
sponsored by Dell SecureWorks
WHITE PAPER: Find out the deep, dark truth behind the underground hacker economy.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Dell SecureWorks

Protecting and Securing Your Critical Data with Acronis Backup
sponsored by Acronis
WHITE PAPER: This white paper introduces you to a security-rich data protection solution that addresses the growing threat that ransomware attacks pose: Acronis Backup. In order to prevent serious downtime and data corruption in your organization, check out this resource.
Posted: 15 Nov 2018 | Published: 15 Nov 2018


Insider Threat to Financial Services
sponsored by Recorded Future
WHITE PAPER: Research from leading analysts at Forrester revealed that insiders accounted for 39% of data breaches through accidental and malicious misuse of data. In this white paper, explore current security technologies that are aimed at preventing and detecting insider threats, and learn about the 3 categories to understand the risks they pose.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

Recorded Future

Granite Ridge Builders Protect Their Data from Ransomware with Acronis
sponsored by Acronis
CASE STUDY: Read this study to see the rest of Granite Ridge's story, which involves a bare-metal backup solution that protects their data from hardware failures, automates both on-site and off-site backups, supports agentless backup of Hyper-V, and proactively protected them from a potentially devastating ransomware attack.
Posted: 09 Nov 2018 | Published: 09 Nov 2018


Hidden Face of the Darknet
sponsored by Radware
VIDEO: Tune in to explore the different attack services and tools that can be purchased inside the dark net.
Posted: 06 Nov 2018 | Premiered: 31 Oct 2018


How to Detect Cryptomining in your Environment with AlienVault
sponsored by AlienVault
VIDEO: In this webcast, learn the what, why and how of cryptomining and how AlienVault Unified Security Management (USM) can help you detect this malicious activity.
Posted: 02 Nov 2018 | Premiered: 02 Nov 2018


Protect Hybrid Workloads from Cyberattack: Advance to Secure Servers
sponsored by Logicalis
WHITE PAPER: Download this white paper to learn about an approach to protecting hybrid workloads from cyberattacks that utilizes a server specifically designed to protect against malicious threats that target firmware.
Posted: 31 Oct 2018 | Published: 31 Oct 2018


Memcached Reflection Attacks
sponsored by IBM Akamai
RESEARCH CONTENT: In early 2018, the DDoS attack size doubled after attackers discovered and employed a new, massive DDoS reflection and amplification method. In this resource, discover an approach to help you protect and prepare for any of these future web & DDoS attacks.
Posted: 25 Oct 2018 | Published: 25 Oct 2018

IBM Akamai

Ransomware: Four Ways to Protect Data Now
sponsored by Citrix
RESOURCE: Discover 4 ways you can protect your data from ransomware.
Posted: 25 Oct 2018 | Published: 25 Oct 2018


Druva Annual Ransomware Report
sponsored by Druva Software
WHITE PAPER: Learn how other organizations, just like yours, are being targeted by ransomware attackers and how they are recovering from these attacks.
Posted: 22 Oct 2018 | Published: 22 Oct 2018

Druva Software

You've Got Ransomware. Now What?
sponsored by Druva Software
WHITE PAPER: Find out what to do before and after your company is attacked by checking off the important steps in this checklist.
Posted: 18 Oct 2018 | Published: 18 Oct 2018

Druva Software

Solution Overview: Iron Cloud Critical Protection and Recovery
sponsored by Iron Mountain
PRODUCT OVERVIEW: This product overview highlights a managed data protection solution that copies essential data to its secure data center over a private, encrypted network connection. Read on for this iron defense strategy to keep threats like ransomware at bay.
Posted: 18 Oct 2018 | Published: 18 Oct 2018

Iron Mountain

Playbook Fridays: Conducting VMRay Malware Analysis
sponsored by ThreatConnect
RESOURCE: Learn about a playbook that takes malicious file samples and transmits them to an automated malware analysis system, to help security teams become more efficient.
Posted: 16 Oct 2018 | Published: 21 May 2018


Fileless Attacks
sponsored by Bitdefender
RESOURCE: Cybercriminals don't have to use malware files anymore to achieve a successful data breach or attack. Fileless or zero-footprint attacks are growing in popularity, today. Why? Read on to find out.
Posted: 09 Oct 2018 | Published: 09 Oct 2018


Five Endpoint Attacks Your Antivirus Won't Catch: A Guide to Endpoint Detection and Response
sponsored by AlienVault
RESOURCE: In this white paper, discover how to quickly evolve your threat detection strategy with 5 endpoint attacks your antivirus won't catch.
Posted: 08 Oct 2018 | Published: 08 Oct 2018


IoT Attack Handbook
sponsored by Radware
WHITE PAPER: Download this IoT Attack Handbook to learn about each Mirai attack vector, understand the profile and parameters of the attacks and explore how to defend against each of the attacks.
Posted: 08 Oct 2018 | Published: 08 Oct 2018


Advanced Endpoint Protection Test
sponsored by Bitdefender
WHITE PAPER: An advanced endpoint protection test was conducted to look at the proactive protection, exploit, false alarm, and ransomware capabilities of Bitdefender's product, GravityZone Elite Security, against 9 of its competitors. Read on for the results.
Posted: 08 Oct 2018 | Published: 30 Nov 2017


How Safe Are Your Backups?
sponsored by Solarwinds MSP
RESOURCE: Techvangelism founder Nick Cavalancia provides you with three steps designed to prevent inappropriate access or manipulation of your backups in this resource. Access those steps, which will help you reduce the likelihood that your backups will fall victim to an attack like ransomware, here.
Posted: 05 Oct 2018 | Published: 05 Oct 2018

Solarwinds MSP

Security of Medical Technology Devices Solution Brief
sponsored by Cylance
PRODUCT LITERATURE: With 6,000 hospitals in the U.S. and five to 10 connected devices per hospital bed, medical technolgy devices are a large and attractive attack surface for cybercriminals, utilizing malware and ransomware. Learn more about how you can uniquely address the threats that medical technology devices face.
Posted: 04 Oct 2018 | Published: 04 Oct 2018


Tufts Medical Center Takes on Cybersecurity
sponsored by Cylance
CASE STUDY: In this case study, learn how Tufts Medical Center adopted cybersecurity platforms to identify previously undetected malicious files and malware, and allowed the organization's focus to remain on delivering safe patient care.
Posted: 04 Oct 2018 | Published: 04 Oct 2018


The Medical Device Paradox: Hospital Systems Race Against Time to Close the Patient Safety Cyber Gap
sponsored by Cylance
WHITE PAPER: In this white paper, learn about the growing paradox of medical device efficacy and the trends in medical device vulnerability and cybersecurity. Find out why your hospital system needs to consider an endpoint protection platform to proactively prevent the execution of advanced persistent threats and malware.
Posted: 03 Oct 2018 | Published: 31 Dec 2017


Fraud: It's Not Just for Banks Anymore
sponsored by F5 Networks
RESOURCE: Download this resource to learn why using a web application firewall (WAF), with full-proxy capabilities, can be your best defense mechanism against fraudsters.
Posted: 21 Sep 2018 | Published: 31 Dec 2017

F5 Networks
1 - 25 of 920 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement