Software  >  

Malware

RSS Feed   
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 

Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Malware Reports
1 - 25 of 678 Matches Previous Page  |  Next Page
Why Hackers Hack: The Profile
sponsored by Carbonite
EGUIDE: Hackers are often grouped into 1 of 3 classifications – black hat, white hat and grey hat – depending on their methods, motivations and end goals. Read this e-guide for an overview of each subtype, including an explanation as to why each of them hacks.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Carbonite

Protecting APIs and Securing Applications So Business Can Thrive
sponsored by Radware
RESEARCH CONTENT: Nearly every organization relies on applications to connect with customers, business partners, suppliers and staff. As a result, the application and API threat landscape has evolved dramatically. Read this research report for a closer look at the state of application and API security, including top threats, best practices and more.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Radware

Quantum Business Continuity Webinar
sponsored by Quantum Corporation
WEBCAST: Access this webcast to go over the various factors threatening business continuity in the age of work from home, like cyberattacks and ransomware and 4 benefits of implementing VDI.
Posted: 22 Jan 2021 | Premiered: Jan 22, 2021

Quantum Corporation

The Fidelis Threat Intelligence Toolkit is Here
sponsored by Fidelis
RESOURCE: Organizations are struggling to keep up with threat actors as they engage different vectors and develop their toolkit of attacks. It seems only fair, then, that you have a toolkit of your own. Click here to access your Fidelis Threat Intelligence Toolkit. Leverage the latest cybersecurity news and know what’s on the prowl and how to defend.
Posted: 21 Jan 2021 | Published: 21 Jan 2021

Fidelis

Avoiding the Crippling Effects of Ransomware through Early Detection & Response
sponsored by Fidelis
PODCAST: Ransomware remains high on the list of security concerns for enterprises, CISOs and CIOs. But early detection can help your organization, and it’s key in avoiding significant damage and cost. Tune into this podcast to hear former NSA CISO Chris Kubic as he discusses why ransomware is so dangerous and how to protect against it.
Posted: 21 Jan 2021 | Premiered: Jan 21, 2021

Fidelis

Why Hackers Hack
sponsored by Carbonite
DATA SHEET: Chances are that your perception of what a hacker is has been completely skewed by Hollywood. Check out this Carbonite data sheet to bust 6 myths of the modern-day hacker.
Posted: 21 Jan 2021 | Published: 21 Jan 2021

Carbonite

Inky 2020 End of Year Phishing Report
sponsored by Inky Technology
RESEARCH CONTENT: With most people working remote in 2020, reliance on email for communication grew even higher – leading to a stark rise in phishing attacks. This report reflects on the top threat types and security strategies for phishing in 2020 and offers insight into what to expect in 2021 – read on to unlock the full report.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Inky Technology

Fighting Hackers & Responding to Ransomware: A How-To
sponsored by Fidelis
EGUIDE: Cyberthreats aren’t going away any time soon. It’s vital that you take steps to ready your organization for any attack that comes your way. In this expert e-guide, explore 5 actionable deception-tech steps for fighting hackers as well as 9 steps for creating a ransomware incident response plan. Open now to put your best security foot forward.
Posted: 20 Jan 2021 | Published: 15 Jan 2021

Fidelis

Endpoint Protection Best Practices to Block Ransomware
sponsored by Sophos
WHITE PAPER: Ransomware attacks are on the rise – both in terms of frequency and average cost per attack. This white paper provides a comprehensive look into how ransomware attacks work, how they can be stopped, and best practices for configuring your endpoints for the strongest protection possible – read on to get started.
Posted: 11 Jan 2021 | Published: 31 Jul 2020

Sophos

Ransomware Tabletop Exercise
sponsored by CI Security
WEBCAST: Most organizations don’t have a plan to react to ransomware, and the ones that do may not have fully updated it. Be prepared for the worst – watch this webcast to see Mike Simon, CTO of CI Security, lead a 60-minute virtual tabletop exercise featuring a ransomware attack simulation and how a company responds to it.
Posted: 07 Jan 2021 | Premiered: Dec 8, 2020

CI Security

Secure Your Email by Moving it to O365 with Microsoft & Barracuda
sponsored by Barracuda
VIDEO: Email-based cyberattacks are growing increasingly frequent and harder to detect. This webinar provides a closer look at 13 email threat types, the role of automation in incident response and how to improve email security by using Microsoft Office 365 and Barracuda.
Posted: 07 Jan 2021 | Premiered: 07 Jan 2021

Barracuda

Clearedin Office 365, Exchange Online Protection (EOP) and Secure Email Gateway (SEG) Solution
sponsored by Clearedin
WHITE PAPER: Office 365 (O365) applications are used by many in the rapidly expanding remote workforce. However, while these apps have native anti-phishing measures in place, you may need additional layers of protection to prepare for more sophisticated threats. Click here to learn how to properly supplement your O365 security.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

Clearedin

How to Help Prevent Increasingly Rampant Brand Exploitation
sponsored by Mimecast
WHITE PAPER: A company's reputation and trustworthiness is critical to their livelihood – which is why brand exploitation attacks present such a dangerous prospect. Download this white paper to enhance your organization's preparedness and awareness of these lures, which provides an overview of key brand exploitation challenges and solutions.
Posted: 05 Jan 2021 | Published: 20 Jul 2020

Mimecast

Case Study: Lee Company
sponsored by Clearedin
CASE STUDY: In this case study, discover how Lee Company, a construction and building services firm, was able to improve their email, cloud and collaboration security capabilities through a partnership with CleardIn – which equipped them to better identify and prevent email-based threats. Read on for the full story.
Posted: 04 Jan 2021 | Published: 04 Jan 2021

Clearedin

Ransomware Threat Spotlight
sponsored by Barracuda
VIDEO: Another unfortunate consequence of 2020 was the apparent rise of ransomware threats, especially those targeting remote workers. This webinar provides a look back at the top ransomware trends of 2020, highlighting key tactics, common vulnerabilities and more – watch now to get started.
Posted: 23 Dec 2020 | Premiered: 23 Dec 2020

Barracuda

Spear Phishing: Top 3 Impersonation Attacks
sponsored by Barracuda
WHITE PAPER: Spear phishing, alongside other impersonation attacks, are on the rise, and new tactics are making it more difficult to differentiate between an impersonation attempt and a genuine message. Read on to discover the top 3 spear phishing impersonation attacks to keep an eye on.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

Barracuda

10 Experts on Active Threat Management
sponsored by GoSecure
EBOOK: The number of pervasive cyberthreats is growing larger with each passing week, which can leave security professionals feeling overwhelmed. In this e-book, hear from 10 IT security experts, including directors and C-level executives, on active threat management and data protection, and learn how you can better predict, prevent and detect attacks.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

GoSecure

A New Paradigm for Identity Assurance
sponsored by Arrow & RSA
WHITE PAPER: Today’s cyberthreats target either the users with access to critical data, or the data itself – and traditional security approaches are no longer viable against these attacks. The following whitepaper explores how identity assurance is changing, the role of authentication, and how to better protect your users and data – read on to get started.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

Arrow & RSA

Leading private hospital boosts email security to protect user data
sponsored by Barracuda
CASE STUDY: Healthcare is one of the most frequently targeted verticals and patient data has grown in value to cybercriminals. This case study follows how Richard Andrews, Head of IT at King Edward VII’s hospital in London, was able to implement email security for his most vulnerable patients – including members of the Royal Family.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

Barracuda

2020 Threat Hunting Survey Results
sponsored by DomainTools
RESEARCH CONTENT: Each year, SANS conducts a Threat Hunting Survey to better understand the threat hunting landscape and how security professionals are conducting threat hunting in their organizations – read on to unlock the results from this year’s survey.
Posted: 18 Dec 2020 | Published: 18 Dec 2020

DomainTools

5 Best Practices To Secure Remote Workers
sponsored by Microsoft
RESOURCE: COVID-19 has dramatically changed the dynamics and landscape of remote work for the foreseeable future. So, what are the best practices for securing remote work? Read on to unlock 5 that will make your organizations and workers more secure and more productive.
Posted: 16 Dec 2020 | Published: 16 Dec 2020

Microsoft

Driving Real Behavior Change
sponsored by Proofpoint
EBOOK: Because today’s cyberattacks often target an organization’s users, a people-centric approach gives your security team the best chance at identifying and preventing potential threats. Read this e-book to discover how to build an effective security awareness training program.
Posted: 14 Dec 2020 | Published: 14 Dec 2020

Proofpoint

Cyberattack Survival Kit
sponsored by Zerto
EGUIDE: Given the inevitability of ransomware attacks, organizations can no longer rely on cybersecurity measures to prevent attacks – modern approaches need to account for this eventuality and focus efforts on recovery, remediation and resilience. Read this Cyberattack Survival Guide to unlock a 6-step ransomware recovery strategy.
Posted: 11 Dec 2020 | Published: 11 Dec 2020

Zerto

Ransomware Playbook
sponsored by AWS Rapid7
EBOOK: Victims of ransomware attacks suffer the impact of productivity and revenue loss due to work stoppage. Plus, these businesses are likely to have to manage communications with the press, customers, prospects and vendors. It’s time to start taking action and lower your ransomware risk. This e-book provides ample first steps.
Posted: 11 Dec 2020 | Published: 11 Dec 2020

AWS Rapid7

Microsoft Teams: Top 10 Security Threats
sponsored by McAfee
WHITE PAPER: The rapid move towards cloud capabilities and remote worker enablement has led to a massive increase in cloud collaboration tools, like Microsoft Teams. Read this white paper and discover the top 10 Microsoft Teams security threats.
Posted: 10 Dec 2020 | Published: 10 Dec 2020

McAfee
1 - 25 of 678 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info