Software  >  

Malware

RSS Feed   
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 

Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Malware Reports
76 - 100 of 556 Matches Previous Page  |  Next Page
Royal Holloway: Man proposes, fraud disposes
sponsored by ComputerWeekly.com
RESEARCH CONTENT: In May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.
Posted: 07 Jul 2020 | Published: 14 Jul 2020

ComputerWeekly.com

Royal Holloway: A novel approach to clustering malware behaviour to improve malware detection
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Clustering malware behaviour can be very useful, but it is unknown how accurate clustering algorithms are when dealing with malware
Posted: 07 Jul 2020 | Published: 08 Jul 2020

ComputerWeekly.com

Webinar - Simplicity is the new complexity – How malware authors make attack detection simple yet complex
sponsored by Cisco Umbrella
VIDEO: Emerging malware techniques indicate that cybercriminals are favoring simple, yet complex tricks in order to successfully conduct their campaigns. Watch this video to learn more about trending threat patterns, new malware tricks and how the simplest techniques can help organizations overcome these challenges.
Posted: 02 Jul 2020 | Premiered: 01 Jun 2020

Cisco Umbrella

Webinar - Summer school gone virtual? How to keep virtual activities safe for students
sponsored by Cisco Umbrella
WEBCAST: Schools are under constant threat from a variety of attacks, and with students now learning from home, hackers are finding it easier to break in. Without the right network security, your school district could be at risk.Watch this informative webcast about Cisco Umbrella, cloud-delivered network security that keeps your school safe.
Posted: 01 Jul 2020 | Premiered: May 18, 2020

Cisco Umbrella

Student Cybersecurity 101
sponsored by Cisco Umbrella
EBOOK: Today’s schools face more security threats than ever before. Sensitive information is at stake, and school districts search for the best ways to protect their students. Through adoption of cloud technologies from Cisco, you can get your security back on track and shift focus back to education. Dive into this e-book to take a closer look.
Posted: 01 Jul 2020 | Published: 01 Jul 2020

Cisco Umbrella

Dexar Group Takes on Cybersecurity
sponsored by BlackBerry
CASE STUDY: In this case study, follow the Dexar Group, a real estate and property management organization, as they partner with ForwardIT to deploy CylancePROTECT and reduce the time and effort needed to managed their nearly 450 endpoints, addressing the security needs of their remote employees and BYOD devices.
Posted: 30 Jun 2020 | Published: 01 Jul 2020

BlackBerry

Nefilim Ransomware and Mitigating Attacks in the COVID-19 Era
sponsored by BlackBerry
RESOURCE: In Australia, organizations across every sector have been on the receiving end of increasingly frequent and complex malware and ransomware attacks. This article highlights one of the most prominent ransomware attacks, discusses cybersecurity in the COVID-19 era, and more. Read on to get started.
Posted: 30 Jun 2020 | Published: 15 Jun 2020

BlackBerry

B&R Enclosures Takes on Cybersecurity
sponsored by BlackBerry
CASE STUDY: In this case study, follow B&R Enclosures, leading specialist in the design and manufacture of industrial equipment in the ‘Australasia’ region, as they incorporate CylancePROTECT in the wake of 2 ransomware attacks in order to leverage the power of AI to detect and prevent future malware and ransomware campaigns.
Posted: 30 Jun 2020 | Published: 30 Jun 2020

BlackBerry

The Australian Museum Takes on Cybersecurity
sponsored by BlackBerry
CASE STUDY: In this case study, follow the Australian Museum, keepers of a vast collection of sensitive historic and cultural information, as they partner with CylancePROTECT to implement a multi-layer approach to security that enables them to prevent malware attacks and secure their invaluable research data.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

BlackBerry

Plan for the worst: Creating an effective cyber security incident response plan
sponsored by Verizon
RESOURCE: Cyberattacks are now a matter of “when,” not “if” so as attacks become more sophisticated, it’s critical to have an incident response plan in place to deal with them. Access this resource to learn the 6 steps to include in your cyber security incident response plan to ensure your network is prepared for an attack.
Posted: 22 Jun 2020 | Published: 07 Jan 2020

Verizon

The Definitive Email Security Strategy Guide: A People-Centric Approach to Stopping Malware, Phishing, and Email Fraud
sponsored by Proofpoint
WHITE PAPER: With 94% of external cyber threats start with email, organizations need to ensure that their email security strategy can keep pace with this growing threat landscape. This white paper explores a new, people-centric approach to email security and provides you with a comprehensive guide for implementing this approach (including a checklist).
Posted: 05 Jun 2020 | Published: 05 Jun 2020

Proofpoint

BLUEPRINT: MODERN LAYERED SECURITY
sponsored by SonicWall
WHITE PAPER: The concept of a layered security strategy is nothing new. However, as threats evolve, each layer needs to be revised to ensure it addresses modern security demands. This white paper provides an overview of a comprehensive 11-layer security approach, designed to strengthen your security posture without sacrificing business objectives.
Posted: 01 Jun 2020 | Published: 01 Jun 2020

SonicWall

The Cybersecurity Professional's Guide to Pandemic-Related Threats
sponsored by TechTarget
RESOURCE: Amid the existing uncertainty of the current pandemic, it's unfortunate – but not surprising – to see an increase in cyberattack campaigns using the coronavirus as an entry point. This expert guide, The Cybersecurity Professional's Guide to Pandemic-Related Threats, explores the various threats to watch out for and highlights
Posted: 01 Jun 2020 | Published: 05 Aug 2020

TechTarget

RANSOMWARE REALITIES FOR SMALL AND MEDIUM-SIZED BUSINESSES
sponsored by Crowdstrike
WHITE PAPER: Contrary to the belief that ransomware only targets large organizations, small and medium-sized businesses (SMBs) are on the receiving end of a breach nearly 43% of the time. But without the resources of a large business, what can SMBs do to protect themselves? Read on to find out.
Posted: 20 May 2020 | Published: 20 May 2020

Crowdstrike

THE EVOLUTION OF RANSOMWARE: HOW TO PROTECT ORGANIZATIONS FROM NEW TRENDS AND METHODS
sponsored by Crowdstrike
WHITE PAPER: Each year, ransomware attacks grow increasingly frequent and successful – leading to more dollars lost. In fact, by 2021 global damages from ransomware is expected to reach $20 billion. In this white paper, you’ll discover a comprehensive overview of the evolution of ransomware, common trends and how to protect against it.
Posted: 19 May 2020 | Published: 19 May 2020

Crowdstrike

Spear Phishing vol3: Top Threats and Trends: Defending against business email compromise attacks
sponsored by Barracuda
WHITE PAPER: Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
Posted: 18 May 2020 | Published: 30 Nov 2019

Barracuda

13 email threat types to know about right now
sponsored by Barracuda
RESOURCE: As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
Posted: 07 May 2020 | Published: 01 May 2020

Barracuda

The Malicious Bot Playbook: Early Warning Signs, and What to Do About Them
sponsored by Cloudflare
WHITE PAPER: Similar to social engineering attacks, bot attacks are highly targeted to expose the vulnerabilities of a specific organization. Understanding the telltale bot warning signs has proven to be an effective measure at predicting and preventing attacks. This playbook outlines the common warning signs and tactics for addressing them.
Posted: 01 May 2020 | Published: 01 May 2020

Cloudflare

MSPs transform their endpoint security
sponsored by Malwarebytes
CASE STUDY: In this collection of case studies, follow the journeys of three organizations (Optimus System, Sentrian, and Edge Computers) as they partner with Malwarebytes to navigate endpoint security challenges related to malware infections, downtime, ransomware, and more. Read on to get started.
Posted: 14 Apr 2020 | Published: 14 Apr 2020

Malwarebytes

Protect & recover your data with StorageCraft Ransomware Recovery Solutions
sponsored by StorageCraft Technology Corporation
DATA SHEET: The following resource highlights a set of solutions from StorageCraft with which you can combat these attacks. Access now to view the advantages of deploying them and to ensure your last line of defense against ransomware is as resilient as ever.
Posted: 06 Apr 2020 | Published: 31 Dec 2019

StorageCraft Technology Corporation

Ultimate Guide to Incident Response and Management
sponsored by TechTarget
RESOURCE: To avoid the increasingly detrimental consequences of a successful cyberattack, organizations are realizing the importance of incident response (IR) planning. So, how does your team plan to address potential vulnerabilities? Let us know & receive exclusive access to our guide, the Ultimate Guide to Incident Response and Management.
Posted: 24 Mar 2020 | Published: 10 Sep 2020

TechTarget

Top 9 DDOS Threats Your Organization Must be Prepared For
sponsored by Radware
WHITE PAPER: Each year, cyberattacks grow in frequency and sophistication, leading to varied methods of conducting the same attacks. For distributed denial-of-service (DDoS) attacks, preparing for the “common” attack is no longer enough. This white paper contains the top 9 DDoS threats your organization needs to keep an eye on.
Posted: 16 Mar 2020 | Published: 16 Mar 2020

Radware

Cryptomining - How Cryptocurrency is Changing Cyber Security
sponsored by Cisco Umbrella
WEBCAST: The days of ransomware are not over, but the more ominous threats facing us now are cryptojacking, miners, and crypto exchange phishing. Is your environment safe? View this webcast to learn everything you need to know about cryptocurrency, cryptojacking, and how you can protect yourself.
Posted: 10 Mar 2020 | Premiered: Mar 10, 2020

Cisco Umbrella

SMB Cybersecurity: The Need for Better Protection
sponsored by Kaspersky
EGUIDE: Small and medium-sized businesses (SMBs) are failing to keep their remote working employees adequately protected against the vast range of cyber threats they face, according to a study by Kaspersky. Access this e-guide to learn why many SMBs are turning to managed detection and response today.
Posted: 07 Jul 2020 | Published: 01 Jul 2020

Kaspersky

Navigating Ransomware Recovery
sponsored by Cisco Umbrella
EGUIDE: The decisions and road to recovery will involve several stakeholders and real costs. So, when organizations must make the tough decision of whether to pay a ransom, rebuild the system, or file a report, there are many factors to consider. Use this e-guide to help you plan and map out steps to avoid rushing into bad choices that can’t be reversed.
Posted: 20 Apr 2020 | Published: 11 Feb 2020

Cisco Umbrella
76 - 100 of 556 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences