Software  >  

Malware

RSS Feed   
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 

Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Malware Reports
1 - 25 of 872 Matches Previous Page  |  Next Page
Advanced Security Protections for Public Cloud Environments
sponsored by Tech Data - Check Point/Mosaic451
WHITE PAPER: How can you protect your cloud environments as threats become more sophisticated? Access this brief resource for an overview of CloudGuard for Alibaba Cloud.
Posted: 25 Apr 2018 | Published: 31 Jan 2018

Tech Data - Check Point/Mosaic451

Multi-Vector Protection: Defense-in-Depth With Layered Techniques for Corporate Endpoints
sponsored by Tech Data - MalwareBytes
RESOURCE: Corporate endpoints are under constant attack. According to the Verizon 2017 DBIR 51% of corporate breaches included malware. Access this resource to find out why securing your organization's endpoints requires multi-layered protection techniques.
Posted: 23 Apr 2018 | Published: 23 Apr 2018

Tech Data - MalwareBytes

Enterprise Endpoint Protection Buyer's Guide
sponsored by Tech Data - MalwareBytes
WHITE PAPER: Cybercriminals have moved to a multi-vector attack approach, making it difficult to defend against attacks on the endpoint system. This guide offers core requirements to help navigate enterprise endpoint protection vendor analysis as well as a handy questionnaire to help with the process.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

Tech Data - MalwareBytes

Anatomy of a Cyber Attack
sponsored by Oracle Corporation
WHITE PAPER: Security is everyone's job today, from consumers, to system administrators, to executives. Explore this resource to gain insight into the anatomy of a cyberattack, the lifecycle of a security breach and how to augment your current approach to protect your sensitive data.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

Oracle Corporation

Ransomware Protection: A Best Practices Approach to Securing Your Enterprise
sponsored by Tech Data - MalwareBytes
WHITE PAPER: The primary goal of all ransomware is to gain access and to encrypt the endpoint. Explore this resource to uncover a best practices approach to securing your enterprise against malware.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

Tech Data - MalwareBytes

A Look Into the Global "Drive-by Cryptocurrency Mining" Phenomenon
sponsored by Tech Data - MalwareBytes
WHITE PAPER: Cryptocurrencies were bound to trigger the interest of criminals and it wasn't long before coin mining malware made an appearance. Explore this resource to gain insight into the phenomenon known as "drive-by cryptocurrency mining".
Posted: 20 Apr 2018 | Published: 20 Apr 2018

Tech Data - MalwareBytes

Detect Ransomware Before it's Too Late with AlienVault USM Anywhere
sponsored by AlienVault
WEBCAST: Ransomware alone is the fastest growing security threat. Take a look at this webcast to uncover how to detect ransomware before it's too late with a unified security management (USM) strategy.
Posted: 17 Apr 2018 | Premiered: Apr 17, 2018

AlienVault

Malware Quiz
sponsored by Cisco Umbrella
RESOURCE: Every good story needs a villain, and the world of network security has plenty. Explore this resource to test your malware IQ (and your knowledge of fairy tales) by taking our quick quiz on famous villains.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

Cisco Umbrella

How to Respond to the 2018 Threat Landscape
sponsored by VMware
WHITE PAPER: By 2020, 1/3 of successful attacks experienced by enterprises will be on data located in shadow IT resources, including shadow IoT. Explore this Gartner report to gain insight into responding to the 2018 threat landscape.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

VMware

How Better Backups Tackle Today's Ransomware Challenges
sponsored by StorageCraft Technology Corporation
WHITE PAPER: Read this white paper to learn how to guard your organization from data loss and ransom payments by improving your backup and data protection policies. You'll explore how ransomware operates, as well as why a combination of cloud data protection and an isolated Backup Area Network is the smart way to ensure your information is recoverable, and more
Posted: 11 Apr 2018 | Published: 11 Apr 2018

StorageCraft Technology Corporation

Modern-Day Security Tales
sponsored by Cisco Umbrella
RESOURCE CENTER: How quickly is your organization able to combat security challenges? Explore this resource to uncover how to cut through your security challenges and implement effective protection in minutes, rather than months.
Posted: 10 Apr 2018 | Published: 10 Apr 2018

Cisco Umbrella

Best Practices for Securing Backups and Mitigating Ransomware Attacks
sponsored by StorageCraft Technology Corporation
WHITE PAPER: Click inside to learn how you can optimize your backup strategy, and take steps to protect your data from the ransomware threats that are on the rise. Find out how a variety of strategies, from isolation backup repositories to combining cloud and offsite replication can keep your information safe.
Posted: 10 Apr 2018 | Published: 10 Apr 2018

StorageCraft Technology Corporation

Quadrupling Backup Speed and Blocking Ransomware with Cloud Backup
sponsored by Acronis
CASE STUDY: Read this case study to learn why this electric company turned to the cloud when looking for a backup system to protect them from future ransomware attacks.
Posted: 10 Apr 2018 | Published: 10 Apr 2018

Acronis

Protecting Against the Top 5 Attack Vectors
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Recently, there has been an abundance of cyberattacks in the news with popular companies, such as Uber and Equifax. Explore this resource to uncover how to protect against the top 5 attack vectors.
Posted: 09 Apr 2018 | Published: 09 Apr 2018

Arctic Wolf Networks, Inc.

Disaster Recovery Techniques that Stop the Enemy Within
sponsored by Unitrends
WHITE PAPER: Employee error is the number one cause of business interruptions according to a CRN study, but what do these errors look like, and how can you stop them? Read this white paper to explore 5 examples of Risky employees, as well as some tips on how you can mitigate the damage they cause.
Posted: 09 Apr 2018 | Published: 09 Apr 2018

Unitrends

Protect Your Employees and Data From Advanced Malware Attacks in Real-Time
sponsored by Dell EMC and Microsoft
WHITE PAPER: Organizations of every size now face a daily risk of cyberattacks, such as spear-phishing, drive-by downloads, poisoned search engine results, and more. Take a look at this resource to learn how new defenses are needed at the endpoint to protect your employees and data from advanced attacks in real-time.
Posted: 06 Apr 2018 | Published: 06 Apr 2018

Dell EMC and Microsoft

Understanding Different Types of Phishing attacks
sponsored by Veeam Software
RESOURCE CENTER: According to Veeam, a new phishing site is created every 20 seconds. Explore this custom resource to understand how phishers are doing business today and learn how to better protect your enterprise.
Posted: 05 Apr 2018 | Published: 05 Apr 2018

Veeam Software

A New Approach to Defending your Network Against Ransomware
sponsored by Veeam Software
WHITE PAPER: In this white paper, learn how to a concerted backup and disaster recovery process helps in minimizing the damage of ransomware, and some tips on how you can get started.
Posted: 05 Apr 2018 | Published: 31 Mar 2018

Veeam Software

Shoring Up the Weak Link in Phishing Defenses: Your People
sponsored by Veeam Software
WHITE PAPER: Because phishing is happening all of the time, to every organization, security pros need to understand where the next attack is going to come from in order to be better prepared. Explore this expert resource to learn how to secure the weakest link of your phishing defense: your people.
Posted: 05 Apr 2018 | Published: 05 Apr 2018

Veeam Software

How to Fight Cybercrime: Tips from a Former FBI Agent
sponsored by Veeam Software
WHITE PAPER: What can the criminal activity of the 1930's teach us about cybercrime today? Read this white paper to find out, as Jeff Lanza, a former FBI agent with 20 years of experience shares tips on fighting ransomware in today's turbulent threat landscape.
Posted: 04 Apr 2018 | Published: 04 Apr 2018

Veeam Software

Ransomware: Block Attackers with a Layered Defense
sponsored by Cisco & Dimension Data
WHITE PAPER: Ransomware is affecting companies across all industries at an alarming rate. This resource reveals what ransomware is, what it does, and how organizations can defend against it.
Posted: 03 Apr 2018 | Published: 03 Apr 2018

Cisco & Dimension Data

Ransomware: Everything you Need to Know
sponsored by Cisco & Dimension Data
WHITE PAPER: According to Cisco, a typical ransom can be anywhere from $200 to $10,000, but some institutions have paid a far higher price. Access this resource to uncover everything you need to know about ransomware and protecting your enterprise.
Posted: 03 Apr 2018 | Published: 03 Apr 2018

Cisco & Dimension Data

Seeing the Future is the Future of Cybersecurity
sponsored by Sophos
WEBCAST: In an effort to augment security, many vendors are looking toward transitioning from a reactive approach to a more predictive approach. Take a look at this webcast to gain insight into the future of cybersecurity and how your enterprise can better predict attacks to intercept them before they wreak havoc on your enterprise.
Posted: 02 Apr 2018 | Premiered: Apr 2, 2018

Sophos

Enterprise DNS Security
sponsored by Infoblox
WHITE PAPER: According to an ESG research report, 72% of organizations believe cybersecurity operations have become significantly more difficult over the past 2 years. Explore this white paper to gain insight into enterprise DNS security, its benefits and what to expect for the future of cybersecurity.
Posted: 02 Apr 2018 | Published: 02 Apr 2018

Infoblox

Standing Up to Cryptojacking: Best Practices for Fighting Back
sponsored by Sophos
WHITE PAPER: Cryptojacking has recently erupted due to the surge in value of cryptocurrencies. This resource explores the differences between legitimate mining and cryptojacking, how cryptojacking works and the costs of cryptojacking to today's organizations.
Posted: 02 Apr 2018 | Published: 02 Apr 2018

Sophos
1 - 25 of 872 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement