Even as attacks become more targeted and sophisticated, the delivery mechanism for the vast majority of outsider attacks comes in some form of malware. So detecting and mitigating malware remains a top priority, which means new and better antimalware tools are essential.
This guide reviews the latest malware attacks -- where they’re coming from and how they work -- and then delves into the specifics of malware defenses. It reviews the basics of how antimalware tools work, discusses the strategic decisions that need to be made to fight malware now and even provides a handy glossary so you can be sure you’re up to date on the latest terminology.
With this guide, you can begin to fight back against the malware already attempting to assault your enterprise systems.
The nuts and bolts of antimalware tools
Searching for products that will deliver the best antimalware protection can be complicated. How do you identify the antimalware tools suited to your organizations' needs? This collection of articles will help with your vendor and product selection process.
This guide reviews the types of endpoint antimalware tools now available and offers instruction on how to determine which best suit your organization. Continue Reading
2Latest malware attacks-
Learn how the latest malware attacks work
Malware is an ongoing battle; we can be certain that attackers will continue to develop new malicious code to try to evade your antimalware systems. Here's a look at how some of the latest attacks work.
OneSoftPerDay, an adware program can install backdoors on PCs, is able to avoid detection from antimalware tools. Expert Nick Lewis explains how to mitigate its effects. Continue Reading
Vonteera adware has the ability to disable antimalware software on endpoint devices. Expert Nick Lewis explains how enterprises can prevent this attack. Continue Reading
Rombertik malware is a new advanced malware that can trigger a system to self-destruct if it's detected. Expert Nick Lewis explains Rombertik and how to keep it from crippling your system. Continue Reading
A new type of self-deleting malware, known as GreenDispenser, allows attackers to rob ATMs of cash. Expert Nick Lewis explains how this threat works and how to prevent it. Continue Reading
ProxyBack malware turns infected user systems into Internet proxies, which can obfuscate the attack source. Expert Nick Lewis explains how the malware works, and its purpose. Continue Reading
The Mazar malware can wipe an entire Android device once it has been installed. Expert Nick Lewis explains how this malware works, and how attacks can be prevented. Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Malware today requires improved strategies
Security pros continue to fight increasingly clever attacks taking aim at lower-hanging fruit: smartphones, mobile apps, social media and other cloud services. These rich targets require new antimalware tools and protection strategies. Learn how to mitigate these multifaceted malware threats.
This ISM Insider Edition provides fresh thinking and new information on what antimalware detection and prevention is available to meet the modern malware threat. To best protect your organization and its unique assets, read on. Continue Reading
New research shows that threat actors are "living off the land" and infiltrating corporate networks using malware-free attacks. Expert Nick Lewis explains how this is done. Continue Reading
4Terms to know-
Key antimalware terms
To talk defense strategy and antimalware tools, you need to know the lingo first. Here are the key terms used when speaking about malware threats and antimalware techniques.
- honeypot (honey pot)
- man-in-the-middle attack (MitM)
- active man-in-the-middle attack (MitM)
- Trojan horse
- zero-day exploit