Software  >  

Malware

RSS Feed   
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 

Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Malware Reports
51 - 75 of 869 Matches Previous Page  |  Next Page
Ransomware Survival Guide
sponsored by Proofpoint, Inc.
RESEARCH CONTENT: According to a Ponemon Institute report, nearly 60% of companies believe a ransomware attack would have serious financial consequences for their business. Take a look at this guide to uncover how to survive ransomware attacks and strategies for preventing them from occurring entirely.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Proofpoint, Inc.

The Definitive Email Security Strategy Guide
sponsored by Proofpoint, Inc.
RESEARCH CONTENT: 95% of enterprise attacks are email fraud, according to the Identity Theft Resource Center. Explore this guide to uncover 5 steps to improving email security to better protect your enterprise from harmful attacks.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Proofpoint, Inc.

How to Prepare for Cyber Threats in 2018
sponsored by Proofpoint, Inc.
VIDEO: Network-propagating ransomware caused at least $5 billion in losses in 2017, according to Proofpoint. Explore this webcast to uncover a look back into 2017's cyber threats, 2018 threat predictions and top cybersecurity recommendations to protect your organization.
Posted: 23 Feb 2018 | Premiered: 21 Feb 2018

Proofpoint, Inc.

The Mystery of the APT
sponsored by Kaspersky Lab
WHITE PAPER: For companies that experiences a targeted attack, 68% report data loss or exposure as a direct result of the attack, according to a Kaspersky Lab study. This resource reveals insight into advanced persistent threats (APTs) and offers protection strategies to avoid falling victim to harmful attacks.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Kaspersky Lab

5 Ways Modern Malware Defeats Your Defenses
sponsored by Radware
WHITE PAPER: According to the Verizon DBIR, 51% of data breaches include the usage of malware, whether for initial breach, expansion within the network or heisting data. This resource reveals 5 common evasion techniques used by modern malware and how they conquer anti-malware defenses.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Radware

How Continuous Data Protection can Improve Ransomware Recovery
sponsored by DataCore Software Corporation
RESOURCE: In this resource, learn why continuous data protection (CDP) might be the best way for you to make recovering from ransomware fast and effective.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

DataCore Software Corporation

How to Secure Your Network from Ransomware
sponsored by Palo Alto Networks
WHITE PAPER: This white paper explores the trends in ransomware, from what attackers are hoping to gain, to what it costs victims. Click inside to learn about a new approach to defending against this malware through cloud-based threat analysis.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Palo Alto Networks

Ransomware: Unlocking the Lucrative Criminal Business Model
sponsored by Palo Alto Networks
RESEARCH CONTENT: To better understand how you can combat ransomware, read this Unit 42 Report which outlines the history of ransomware, as it has evolved from a tool used for profit, to a weapon of espionage. Then, learn about how you can prepare for these attacks and respond to them both in their current form, and as they continue to mutate in the future.
Posted: 20 Feb 2018 | Published: 31 Dec 2017

Palo Alto Networks

Five Essential Elements of Next-Gen Endpoint Protection
sponsored by CrowdStrike
WHITE PAPER: Many endpoint strategies are fixated on stopping malicious attacks, rather than seeking out indicators of attacks that can point to breach activity, even when malware isn't present. Key into this white paper to uncover 5 essential elements of next-generation endpoint protection.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

CrowdStrike

Software-defined Secure Networks
sponsored by Juniper Networks
WHITE PAPER: According to this ESG study, 28% of organizations claim to have a shortage with network security specialists. This research report delves into how organizations can monitor their networks to detect suspicious activities and effectively enforce policies to prevent malicious behavior with the help of software-defined networks.
Posted: 12 Feb 2018 | Published: 31 Dec 2017

Juniper Networks

Cloud Service Provider Reduces Impact of Global Denial-of-Service Attacks by Over 90 Percent
sponsored by Juniper Networks
CASE STUDY: In this case study learn how i3D.net, a managed hosting provider based in the Netherlands, reduced the impact of global DoS attacks by over 90% and reduced the amount of trouble tickets lowering service costs.
Posted: 12 Feb 2018 | Published: 31 Dec 2017

Juniper Networks

Recovering from Ransomware Solutions Brief
sponsored by StorageCraft Technology Corporation
DATA SHEET: Click inside to learn about a program that could give you highly recoverable data to protect you from ransomware attacks by taking immutable snapshots every 10 seconds, individual file recovery, and more.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

StorageCraft Technology Corporation

Cyberespionage Campaign Hits Energy Companies
sponsored by SecurityMatters
WHITE PAPER: What will your company do if the next Dragonfly-type attack targets you? Discover why the implementation of a defense-in-depth strategy is key to successfully mitigate cyberthreats like Dragonfly.
Posted: 09 Feb 2018 | Published: 31 Dec 2017

SecurityMatters

The Voice of the Enterprise CISO
sponsored by NSS Labs
WHITE PAPER: According to the 2017 Verizon DBIR, approximately 90% of all security incidents and breaches involve some form of phishing attack. This white paper uncovers the biggest challenges for security leaders and offers strategies for combatting such challenges.
Posted: 09 Feb 2018 | Published: 09 Feb 2018

NSS Labs

How to Align with the NIST Cybersecurity Framework
sponsored by SecurityMatters
EBOOK: Many organizations are embracing the NIST Cybersecurity Framework to manage their cybersecurity risks. This e-book reveals how to align with the NIST Cybersecurity Framework, the 3 components of the framework and its benefits.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

SecurityMatters

The Benefits of Network Monitoring for Industrial Automation
sponsored by SecurityMatters
WHITE PAPER: Recently, there have been many cyberattacks occurring in the industrial automation world including the Mirai botnet, WannaCry, Non-Petya and more. This whitepaper reveals an approach to improving network security by assessing, detecting, responding, and preventing attacks.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

SecurityMatters

The Rising Face of Cybercrime: Ransomware
sponsored by BitSight
RESEARCH CONTENT: This BitSight Insights Report examines the cybersecurity performance of nearly 20,000 organizations in the face of rising ransomware attacks. Uncover the report's 5 key findings about the different types of ransomware attacks across industries like education, government, and finance.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

BitSight

Third-Party Risk Management for Financial Services
sponsored by BitSight
WHITE PAPER: Financial institutions are facing new, sophisticated, and highly dangerous threats from cybercriminals, including ransomware, DDoS attacks, fraud, and identity theft. This resource reveals helpful strategies for third-party risk management to help you protect sensitive data.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

BitSight

Integrated Security Operations - The Difference between Knowing and Guessing
sponsored by ServiceNow
WEBCAST: Cyberattacks are getting more sophisticated and in turn, harder to defend and protect against. Access this webinar to gain insight into integrated security operations strategies.
Posted: 02 Feb 2018 | Premiered: Feb 2, 2018

ServiceNow

Economics of Insecurity
sponsored by Cylance
WHITE PAPER: Traditional AV companies don't want to help you prevent attacks. They want to help you react to breaches - so they can sell you more solutions with every intrusion. It's all part of the "Economics of Insecurity". Tired of the status quo and investing in more of the same old technology? Learn why it's time to think beyond the stack.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

Cylance

Ransomware 101: 3 Keys Ways to Get Started Combating Ransomware
sponsored by Splunk
WHITE PAPER: Ransomware was recently declared the number 2 most dangerous online threat to consumers and organizations, according to Europol. This white paper offers insight into complex, growing ransomware attacks and reveals 3 tangible steps to combatting ransomware within your organization.
Posted: 29 Jan 2018 | Published: 29 Jan 2018

Splunk

Ransomware Defense for Dummies
sponsored by Cisco Umbrella
EBOOK: Based on statistics from Cisco's Talos threat intelligence group, on average, 2.9% of compromised victims in a ransomware attack will pay the ransom. Inside this for Dummies e-book, learn everything you need to know about ransomware attacks as well as best practices to reduce ransomware risks.
Posted: 26 Jan 2018 | Published: 26 Jan 2018

Cisco Umbrella

The New World of Endpoint Security: Traditional Signature-Based Malware and Virus Protection Can't Keep Up
sponsored by Carousel Industries
WHITE PAPER: As cyberattacks develop in complexity, traditional anti-virus and malware protection is no longer the most effective security approach. Explore this white paper to gain insight into an advanced endpoint security strategy and how machine learning can enhance malware protection.
Posted: 25 Jan 2018 | Published: 25 Jan 2018

Carousel Industries

2018 Security Predictions for an Unpredictable World
sponsored by WhiteHat Security
VIDEO: Large scale breaches are going to continue to occur, so understanding past breaches and coming up with an attack action plan for the future is necessary. This webinar provides a cybersecurity review of 2017 and offers 2018 predictions for which to prepare.
Posted: 24 Jan 2018 | Premiered: 24 Jan 2018

WhiteHat Security

Defense-In-Depth Security: Key to Keeping IT Safe
sponsored by SearchSecurity.com
EBOOK: The enterprise perimeter's demise is in part due to BYOD. Leverage this expert handbook to uncover an effective approach to constructing your IT security "fortress" and replacing the outdated idea of a security perimeter.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

SearchSecurity.com
51 - 75 of 869 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement