Software  >  


RSS Feed   
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 

Malware definition sponsored by, powered by an online computer dictionary
Malware Reports
1 - 25 of 861 Matches Previous Page  |  Next Page
Protecting Your Network from Malware
sponsored by Akamai Technologies
WHITE PAPER: 67% of workers use their own devices at work, according to IDC, and it only takes one compromised device to unleash malware that cripples the network or facilitates data exfiltration. Secure your network from vicious malware and most importantly, your data.
Posted: 21 Jun 2018 | Published: 30 Apr 2018

Akamai Technologies

Network Security: Spotlight on Australia/New Zealand
sponsored by
EGUIDE: In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

How to Respond to the 2018 Threat Landscape
sponsored by Armor
RESEARCH CONTENT: Patching, detection and vulnerability management are some ideal ways for security and risk management leaders to face a ransomware-dominated landscape. Tap into this report to explore more evolving tactics that ease the timely process of tracking cyberattacks.
Posted: 19 Jun 2018 | Published: 31 Dec 2017


Cloud Security: Top Threats and Key Defenses
sponsored by TierPoint - VMware
WHITE PAPER: This white paper will teach you about some of the top threats facing clouds today. Then, once you're familiar with how cybercriminals are getting in, learn how you can get them out using techniques such as intrusion detection software, endpoint and anti-virus protection, and much more.
Posted: 18 Jun 2018 | Published: 18 Jun 2018

TierPoint - VMware

DDoS Defense: EMEA Multinational Banking Group Case Study
sponsored by Radware
CASE STUDY: Find out how one EMEA-based financial services company implemented an on-premise DDoS mitigation appliance along with cloud-based services designed to combat against DDoS and other encrypted threats.
Posted: 18 Jun 2018 | Published: 18 Jun 2018


HSM Reimagined: Cloud Ready Encryption, Key Management and Tokenization as a Service
sponsored by Equinix
RESOURCE: More data in multi-cloud environments present increased security challenges, including the inability to obtain total control of encryption keys and data, malicious attacks and more. Learn how HSM as a Service provides cloud-ready encryption, key management and much more to help you stay protected.
Posted: 18 Jun 2018 | Published: 18 Jun 2018


Dwell Time as a Critical Security Success Metric
sponsored by Armor
WHITE PAPER: Find out how security professionals can more accurately measure and report on dwell times so that they can identify when a threat enters their environment and work to remediate it faster.
Posted: 15 Jun 2018 | Published: 15 Jun 2018


Hospital Had Backups, Paid Ransom Anyway
sponsored by Cylance
CASE STUDY: Every enterprise with sensitive data can fall victim to a ransomware attack like SamSam. This case study explores how enterprises with sensitive or important data should make backups and address how they implement their remote desktop protocol (RDP). Read on to understand the value RDP has to offer when used correctly.
Posted: 13 Jun 2018 | Published: 13 Jun 2018


How Protect Your Backups from Ransomware
sponsored by OffSiteDataSync
DATA SHEET: Today's ransomware is getting smarter, and savvy attackers can now to encrypt or even delete backup data. In this data sheet, learn about a program that provides an isolation layer between your cloud storage and deleted data, so that any unintentional or malicious deletion of data isn't permanent.
Posted: 08 Jun 2018 | Published: 08 Jun 2018


The Secret to Combating Fileless Attacks
sponsored by Cylance
RESOURCE: Fileless malware is the danger to your system that threat detection methods likely aren't picking up on. Download this resource to learn how to detect fileless malware and for ways to combat a fileless attack.
Posted: 06 Jun 2018 | Published: 06 Jun 2018


Malware, Machine Learning and the Battle to Eliminate Human Error
sponsored by Radware
WHITE PAPER: Find out how IT security teams are taking steps to outsmart malware and cyberattacks with machine learning.
Posted: 06 Jun 2018 | Published: 06 Jun 2018


The Importance of Kerberos Decryption
sponsored by CyberArk Software, Inc
WHITE PAPER: In this white paper, learn how decrypting Kerberos can help bring previously inaccessible data into the light, and uncover the malicious activity hidden within. Then read on to learn about how you can decrypt this program in a simple 3-step process.
Posted: 06 Jun 2018 | Published: 06 Jun 2018

CyberArk Software, Inc

SE Labs Predictive Malware Response Test
sponsored by Cylance
ANALYST REPORT: Uncover findings from SE Labs predictive malware response testing, and learn how an AI technology at the heart of an endpoint protection platform can keep your organization safe from zero-day attacks.
Posted: 05 Jun 2018 | Published: 05 Jun 2018


The Future of Cybersecurity
sponsored by Check Point Software Technologies Ltd.
RESEARCH CONTENT: After the disruptive year the IT security industry had in 2017, cyberattacks were placed as one of the biggest global risks for 2018. Learn what it means that "the fifth generation of cyberattacks has arrived."
Posted: 05 Jun 2018 | Published: 05 Jun 2018

Check Point Software Technologies Ltd.

VolitionRx Takes on Cybersecurity
sponsored by Cylance
CASE STUDY: In this case study, learn how VolitionRx took on cybersecurity to prevent malicious activity targeting endpoints before it could endanger sensitive patient information.
Posted: 04 Jun 2018 | Published: 04 Jun 2018


Only You Can Prevent Ransomware, Instead of Falling Victim to It
sponsored by Cylance
WHITE PAPER: This white paper can help enterprises better understand the current threat landscape and how to stay protected against growing ransomware attacks.
Posted: 01 Jun 2018 | Published: 01 Jun 2018


Human Factor Report 2018
sponsored by Proofpoint, Inc.
RESEARCH CONTENT: This 2018 Human Factor Report teaches you how to take action against the wide range of advanced threats. View now and learn how to identify and block targeted attacks that travel over email and other threat vectors.
Posted: 31 May 2018 | Published: 31 May 2018

Proofpoint, Inc.

Fundamentals of Endpoint Security: Anti-Malware Protection
sponsored by Citrix
EGUIDE: Access this e-guide to learn about anti-malware protection and how endpoint security technology can prevent malware from infecting end-user computers and corporate networks.
Posted: 29 May 2018 | Published: 29 May 2018


Protect Yourself from Legacy Antivirus
sponsored by Palo Alto Networks
WHITE PAPER: Legacy antivirus (AV) software often fails to prevent security breaches across endpoints – it simply wasn't designed with today's advanced threats in mind. This white paper explores the costs of operating a legacy antivirus system and details 5 security requirements that any AV replacement technology must meet.
Posted: 29 May 2018 | Published: 31 Dec 2017

Palo Alto Networks

2018 Threat Landscape Report
sponsored by Fortinet, Inc.
RESEARCH CONTENT: According to the Fortinet Threat Landscape Report, in Q1 of 2018 alone, there were 15,071 unique variants of malware. Explore this 24-page Threat Landscape Report to uncover staggering statistics regarding exploits, malware, and botnets and how you can use the current trends to improve your threat management security posture.
Posted: 29 May 2018 | Published: 29 May 2018

Fortinet, Inc.

Managed Antivirus: Blocking All Viruses, Both Old and New
sponsored by Solarwinds MSP
WHITE PAPER: In this white paper explore a new remote monitoring and management (RMM) software that uses traditional signature-based protection to keep you safe from known threats, while simultaneously using exploratory checks and behavioral scans to hunt down new viruses.
Posted: 29 May 2018 | Published: 29 May 2018

Solarwinds MSP

The Evolution of ADC
sponsored by Citrix
EGUIDE: Explore the companies that offer the broadest selection of ADC features, and learn about the evolution of ADCs as demands have changed.
Posted: 23 May 2018 | Published: 22 May 2018


Insider's Guide To Minimizing The Impact of Ransomware
sponsored by Druva Software
WHITE PAPER: The best way to protect from ransomware is with a strong backup strategy. In this guide, learn 6 proactive steps that you can use to keep your data safe.
Posted: 22 May 2018 | Published: 31 Dec 2016

Druva Software

2018 Threat Landscape Report
sponsored by Fortinet, Inc.
RESEARCH CONTENT: According to the Fortinet Threat Landscape Report, in Q1 of 2018 alone, there were 6,623 unique exploits, 15,071 unique variants of malware and 1.8 active botnets per firm. Explore this 24-page Threat Landscape Report to uncover staggering statistics and how you can use the current trends to improve your threat management security posture.
Posted: 21 May 2018 | Published: 21 May 2018

Fortinet, Inc.

An Evaluator's Guide to Cloud-Based NGAV
sponsored by Carbon Black
WHITE PAPER: In this SANS white paper, learn how antivirus is growing up, and why organizations look to spend their antivirus budget on replacing current solutions with next-generation antivirus (NGAV) platforms.
Posted: 10 May 2018 | Published: 10 May 2018

Carbon Black
1 - 25 of 861 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement