Software  >  


RSS Feed   
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 

Malware definition sponsored by, powered by an online computer dictionary
Malware Reports
76 - 100 of 868 Matches Previous Page  |  Next Page
How to Avoid Being the Victim of a Data Breach
sponsored by Evident
WEBCAST: There are 3.8 million data records stolen every day, according to Continuum. No businesses are safe, so how can you stay ahead of hackers? This webcast offers insight into what is driving the growth of security breaches, the top causes of data breaches such as malware and phishing, and 3 steps to take when protecting personal data.
Posted: 30 Nov 2017 | Premiered: Nov 30, 2017


Veeam's 3-2-1 System for Countering Ransomware
sponsored by Veeam Software
WHITE PAPER: In this white paper, learn about the 3-2-1 principle of backup, as well as a system which is built around this strategy to deliver comprehensive ransomware protection by providing tight integration with industry leading storage vendors, WAN acceleration and encryption, and more.
Posted: 27 Nov 2017 | Published: 31 May 2017

Veeam Software

The Evolving Risk Landscape
sponsored by F5 Networks
WHITE PAPER: There was nearly a 22% increase in attacks on web applications from 2016 to 2017. While apps have increased productivity, they have also opened the door to unprecedented threats, expanding the risk landscape and putting corporate data at risk. This e-book offers a guide to protecting against web fraud, credential stuffing, ransomware, and phishing.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

F5 Networks

Protecting the Financial Services Organization
sponsored by Juniper Networks, Inc.
WHITE PAPER: Click inside to learn how cyberattacks have grown and changed over the past several years. Discover best practices already in place in financial service firms that you can bring back to your organization.
Posted: 17 Nov 2017 | Published: 30 Jun 2017

Juniper Networks, Inc.

How Malware Can Steal Your Data
sponsored by F5 Networks
EBOOK: 51% of data breaches include malware, according to Verizon's 2017 Data Breach Investigations Report. This e-book provides insight into how malware can steal your data and offers strategies you use to prevent it from happening.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

F5 Networks

Top Cybercrime Threats to Financial Institutions
sponsored by Digital Shadows
WHITE PAPER: The most prevalent cybercrime threats against financial institutions are: the use or sale of ATM malware, targeted network intrusions, data breaches and the use of banking Trojans. Take a look at this white paper to learn more about these financial threats that stem from cybercriminals.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

The Need for Automotive Cybersecurity Testing Standards
sponsored by Synopsys
WHITE PAPER: Most organizations creating connected systems and devices today spend a considerable amount of time looking at security issues, but often lack a standard framework for testing security. Uncover the importance of developing standards for validating and verifying security.
Posted: 08 Nov 2017 | Published: 08 Nov 2017


Top-of-Mind Threats and Their Impact on Endpoint Security Decisions
sponsored by Cylance
WHITE PAPER: According to this ESG report, 91% of cybersecurity professionals express the greatest concern over the threat posed by email phishing. Explore this report to learn how to protect your organization's endpoints against cyberattacks with specific defense strategies, including machine learning.
Posted: 01 Nov 2017 | Published: 01 Nov 2017


Next-Generation Anti-Malware Testing for Dummies
sponsored by Cylance
WHITE PAPER: Inside this Next-Generation Anti-Malware Testing for Dummies e-book, learn about next-generation endpoint security techniques and how you can use machine learning and AI to protect against advanced persistent threats.
Posted: 31 Oct 2017 | Published: 31 Oct 2017


Five Reasons to Reevaluate Your Current Backup Approach
sponsored by Acronis
WHITE PAPER: By downloading this resource, you'll discover 5 reasons you may need to reevaluate your current backup approach. Read on to see a platform that enables instant recovery from ransomware, supports all major hypervisors, and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017


Case Study: Quadruple Backup Speed and Blocks Ransomware Attacks with Backup Platform
sponsored by Acronis
CASE STUDY: This case study explores how Johnson Electric, one of the world's largest electrical providers, protected their organization against ransomware targeting their large amount of data.
Posted: 24 Oct 2017 | Published: 24 Oct 2017


Anti-Virus Comparative
sponsored by Symantec
WHITE PAPER: Malicious software poses an ever-increasing threat, not only because the number of malware programs are increasing, but also due to the continuously changing threat-landscape. Uncover results from the Malware Protection Test and the Exploit Test to compare 7 endpoint security vendors.
Posted: 16 Oct 2017 | Published: 31 Oct 2016


Symantec™ Cloud Generation Malware Analysis
sponsored by Symantec
WHITE PAPER: Hackers continue to show endless ingenuity in penetrating corporate networks with malware, which means organizations need to fight back harder than ever. By reading this white paper, you'll learn more about defeating malware.
Posted: 13 Oct 2017 | Published: 13 Oct 2017


The Next Generation of Cloud App Security
sponsored by Symantec
WHITE PAPER: By 2020, 85% of large enterprises will use a cloud access security broker (CASB) platform for their cloud services which is up from less than 5% today, according to Gartner. This white paper offers benefits of CASB and how to increase efficacy, avoid incidents and more.
Posted: 06 Oct 2017 | Published: 06 Oct 2017


The Human Factor 2017
sponsored by Proofpoint, Inc.
VIDEO: 90% of clicks on malicious URLs occur within 24 hours after they're delivered. Key into this webcast to get a closer look at when users are most likely to click into malicious URLs, which industry's users click the most, and what types of attacks have the most clicks.
Posted: 06 Oct 2017 | Premiered: 06 Oct 2017

Proofpoint, Inc.

Turning the Tide Against Ransomware
sponsored by Proofpoint, Inc.
WEBCAST: WannaCry is officially the largest ransomware outbreak in history, infecting 300,000 total endpoints. But, is it justified to ever pay a ransomware? Watch this webcast to find out.
Posted: 05 Oct 2017 | Premiered: Oct 5, 2017

Proofpoint, Inc.

Your Security Sandbox Won't Catch it all: The Phishing Problem
sponsored by Proofpoint, Inc.
WEBCAST: Take a look at this webcast to uncover different types of email threats through various applications and what your organization can do to reduce your vulnerabilities against malware.
Posted: 04 Oct 2017 | Premiered: Oct 4, 2017

Proofpoint, Inc.

Your Report on the State of Ransomware for MSPs
sponsored by Datto, Inc.
RESEARCH CONTENT: Inside, hear what more than 1,700 service providers found to be major trends, targets, and impacts of ransomware attacks through early 2017, to help you better inform your backup and DR policies going forward.
Posted: 04 Oct 2017 | Published: 04 Oct 2017

Datto, Inc.

Firewall Best Practices to Block Ransomware
sponsored by Sophos
WHITE PAPER: Recent ransomware attacks like Wannacry and Petya have spread largely unchecked through corporate networks in recent months, extorting money to restore your data and regain control of your computers. This white paper reveals best practices for configuring your firewall and network to protect against ransomware.
Posted: 02 Oct 2017 | Published: 02 Oct 2017


Ransomware: All Locked Up and No Place to Go
sponsored by Kaspersky Lab
WHITE PAPER: Ransomware is the digital version of extortion. It uses age-old tactics to carry out a modern day crime, but the elements behind it are as old as human criminal activity itself. Explore this white paper to discover recommendations and expert tips to protect against ransomware.
Posted: 25 Sep 2017 | Published: 31 Dec 2016

Kaspersky Lab

Protect Your Data from Malicious Ransomware Threats
sponsored by Veeam Software
WHITE PAPER: Don't find yourself forced to pay for a simple oversight. Use this white paper as your guide to creating a rock-solid data availability plan by making backup images invisible, frequently testing your environment, and more.
Posted: 20 Nov 2017 | Published: 31 Jan 2017

Veeam Software

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity

A Primer on File-Borne Malware Threats
sponsored by OPSWAT inc
WHITE PAPER: Verizon's 2017 Data Breach Investigations Report found that 66% of malware was installed via malicious email attachments. In this white paper, examine the ways attackers use files to deliver malware, the reasons these methods are effective, and the steps organizations should take to block these kinds of attacks.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Beginner's Guide to Ransomware Detection and Protection
sponsored by AlienVault
WHITE PAPER: Within hours of the outbreak of WannaCry, it had infected more than 230,000 computers in over 150 countries. Gain a deeper understanding of ransomware attacks, how they work, who is targeted, and what you can do to stop them.
Posted: 27 Sep 2017 | Published: 27 Sep 2017


Building the Best Backup Plan for Today's Storage Environment
sponsored by Iron Mountain
EGUIDE: In this expert-guide, learn about how your offline backups could be the key to keeping your data safe from the online threat of ransomware. Then, explore how dangerous over-protecting your information can be, and how a data retention policy can keep that from happening, and more.
Posted: 27 Sep 2017 | Published: 21 Sep 2017

Iron Mountain
76 - 100 of 868 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement