Software  >  

Malware

RSS Feed   
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 

Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Malware Reports
1 - 25 of 911 Matches Previous Page  |  Next Page
You've Got Ransomware. Now What?
sponsored by Druva Software
WHITE PAPER: Find out what to do before and after your company is attacked by checking off the important steps in this checklist.
Posted: 18 Oct 2018 | Published: 18 Oct 2018

Druva Software

Solution Overview: Iron Cloud Critical Protection and Recovery
sponsored by Iron Mountain
PRODUCT OVERVIEW: This product overview highlights a managed data protection solution that copies essential data to its secure data center over a private, encrypted network connection. Read on for this iron defense strategy to keep threats like ransomware at bay.
Posted: 18 Oct 2018 | Published: 18 Oct 2018

Iron Mountain

Playbook Fridays: Conducting VMRay Malware Analysis
sponsored by ThreatConnect
RESOURCE: Learn about a playbook that takes malicious file samples and transmits them to an automated malware analysis system, to help security teams become more efficient.
Posted: 16 Oct 2018 | Published: 21 May 2018

ThreatConnect

Fileless Attacks
sponsored by Bitdefender
RESOURCE: Cybercriminals don't have to use malware files anymore to achieve a successful data breach or attack. Fileless or zero-footprint attacks are growing in popularity, today. Why? Read on to find out.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

Bitdefender

Five Endpoint Attacks Your Antivirus Won't Catch: A Guide to Endpoint Detection and Response
sponsored by AlienVault
RESOURCE: In this white paper, discover how to quickly evolve your threat detection strategy with 5 endpoint attacks your antivirus won't catch.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

AlienVault

IoT Attack Handbook
sponsored by Radware
WHITE PAPER: Download this IoT Attack Handbook to learn about each Mirai attack vector, understand the profile and parameters of the attacks and explore how to defend against each of the attacks.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

Radware

Advanced Endpoint Protection Test
sponsored by Bitdefender
WHITE PAPER: An advanced endpoint protection test was conducted to look at the proactive protection, exploit, false alarm, and ransomware capabilities of Bitdefender's product, GravityZone Elite Security, against 9 of its competitors. Read on for the results.
Posted: 08 Oct 2018 | Published: 30 Nov 2017

Bitdefender

How Safe Are Your Backups?
sponsored by Solarwinds MSP
RESOURCE: Techvangelism founder Nick Cavalancia provides you with three steps designed to prevent inappropriate access or manipulation of your backups in this resource. Access those steps, which will help you reduce the likelihood that your backups will fall victim to an attack like ransomware, here.
Posted: 05 Oct 2018 | Published: 05 Oct 2018

Solarwinds MSP

Security of Medical Technology Devices Solution Brief
sponsored by Cylance
PRODUCT LITERATURE: With 6,000 hospitals in the U.S. and five to 10 connected devices per hospital bed, medical technolgy devices are a large and attractive attack surface for cybercriminals, utilizing malware and ransomware. Learn more about how you can uniquely address the threats that medical technology devices face.
Posted: 04 Oct 2018 | Published: 04 Oct 2018

Cylance

Tufts Medical Center Takes on Cybersecurity
sponsored by Cylance
CASE STUDY: In this case study, learn how Tufts Medical Center adopted cybersecurity platforms to identify previously undetected malicious files and malware, and allowed the organization's focus to remain on delivering safe patient care.
Posted: 04 Oct 2018 | Published: 04 Oct 2018

Cylance

The Medical Device Paradox: Hospital Systems Race Against Time to Close the Patient Safety Cyber Gap
sponsored by Cylance
WHITE PAPER: In this white paper, learn about the growing paradox of medical device efficacy and the trends in medical device vulnerability and cybersecurity. Find out why your hospital system needs to consider an endpoint protection platform to proactively prevent the execution of advanced persistent threats and malware.
Posted: 03 Oct 2018 | Published: 31 Dec 2017

Cylance

Fraud: It's Not Just for Banks Anymore
sponsored by F5 Networks
RESOURCE: Download this resource to learn why using a web application firewall (WAF), with full-proxy capabilities, can be your best defense mechanism against fraudsters.
Posted: 21 Sep 2018 | Published: 31 Dec 2017

F5 Networks

Top 10 Ransomware from 2017
sponsored by Versa Networks
RESEARCH CONTENT: Discover the top 10 ransomware attacks of 2017 in Versa Network's Threat Research Lab report. This report analyzes the ransomware lifecycle and takes a look at the attacks that negatively impacted businesses worldwide.
Posted: 20 Sep 2018 | Published: 20 Sep 2018

Versa Networks

Magic Quadrant for Security Awareness Computer-Based Training
sponsored by MediaPRO
ANALYST REPORT: As the market for security awareness computer-based training (CBT) is evolving, vendors are seeking out ways to differentiate their products and services to attract security and risk managers. In this Gartner Magic Quadrant market trends report, determine which security awareness CBT vendor is best for your enterprise.
Posted: 20 Sep 2018 | Published: 24 Oct 2017

MediaPRO

Understanding the Limitations of Microsoft Office 365 Security
sponsored by Forcepoint
VIDEO: Tune into this 30-minute webcast where CEO and founder, Mike Osterman, will discuss the key findings of an Office 365 study and organizations' priorities around email security.
Posted: 18 Sep 2018 | Premiered: 06 Sep 2018

Forcepoint

Cybercrime's Most Wanted: Guide to Protection
sponsored by Juniper Networks
RESOURCE CENTER: Find a lineup of today's most wanted cybercriminals, as well as an action plan to help you protect yourself, your data, your reputation, and your enterprise. Read on to find out the details.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

Juniper Networks

Advanced Bot Management
sponsored by Oracle Dyn
RESOURCE CENTER: Download this custom article to learn about an advanced bot manager that will help prevent your organization from falling victim to the bot epidemic.
Posted: 14 Sep 2018 | Published: 14 Sep 2018

Oracle Dyn

Top 10 Ways to Protect Your Organization from Ransomware
sponsored by Mimecast
RESOURCE: Check out this survival guide for the top 10 ways to protect your organization from ransomware.
Posted: 06 Sep 2018 | Published: 06 Sep 2018

Mimecast

Intelligent Web Application Security
sponsored by Oracle Dyn
EBOOK: Through the use of bots, threats are becoming more sophisticated, faster, and increasingly difficult to detect. In this e-book learn how you can protect your web applications through 4 informative chapters.
Posted: 05 Sep 2018 | Published: 05 Sep 2018

Oracle Dyn

2018 Cyberthreat Defense Report
sponsored by Gigamon
RESOURCE: Did you know that 77.2% of businesses were victim to at least 1 cyberattack in 2017, and 62.3% expect to be targets by the end 2018? Download this Cyberthreat Defense Report resource and uncover more key results.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Gigamon

Cyber Resilience for Email: Solution Brief
sponsored by Mimecast
EBRIEF: Learn how your organization can stay protected against advanced email-borne threats through Mimecast's threat protection, adaptability recoverability and durability solution.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Mimecast

Security Change is Inevitable in the Cloud Era
sponsored by Cisco Umbrella
WEBCAST: Hear from Eric Ahlm, research director at Gartner and Meg Diaz, head of product marketing for Cisco Umbrella as they discuss how modern conveniences in the way we access data can lead to security risks as organizations move their sensitive data to the cloud.
Posted: 31 Aug 2018 | Premiered: Aug 31, 2018

Cisco Umbrella

How Yelp Securely Connects People with Great Local Businesses
sponsored by Cisco Umbrella
CASE STUDY: At Yelp, it is the expectation that there will be a consistent high-level user experience for all customers. It is no surprise that Yelp is always seeking to enhance its security practices. This case study examines how Yelp built automation into its security practice to ensure the security of its customers and employees.
Posted: 31 Aug 2018 | Published: 31 Dec 2017

Cisco Umbrella

Cybersecurity for the Modern Era: 3 Steps to Stopping Malware, Credentials Phishing, Email Fraud and More
sponsored by Proofpoint, Inc.
EBOOK: Discover 3 tips for choosing tools and solutions that will improve behaviors, outcomes, and next steps for combatting people-centered attacks with people-centered platforms.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

Proofpoint, Inc.

Protecting People: A Quarterly Analysis of Highly Targeted Attacks
sponsored by Proofpoint, Inc.
RESOURCE: Uncover the shocking survey results from this summer 2018 report where you can find for some key insights into whose being attacked, how they're being targeted, and what you can do about it.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

Proofpoint, Inc.
1 - 25 of 911 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement