
BACKGROUND IMAGE: iSTOCK/GETTY IMAGES
Antimalware tools and techniques security pros need right now
-
Article
The fundamentals of antimalware products
Learn about antimalware protection and how endpoint security technology prevents malware from infecting end-user computers and corporate networks. Read Now
-
Article
Making the business case
All organizations need to protect their endpoints from outside malware with antimalware products, which are essential to an enterprise-wide security strategy. Read Now
-
Article
Comparing antimalware protection products
Compare endpoint antimalware software products for organizations based on features, level of protection and vendor offerings. Read Now
-
Article
Procuring antimalware protection
Expert contributor Ed Tittel explores key criteria for evaluating endpoint security products to determine the best option for antimalware protection for your organization. Read Now
Editor's note
Even as attacks become more targeted and sophisticated, the delivery mechanism for the vast majority of outsider attacks comes in some form of malware. So detecting and mitigating malware remains a top priority, which means new and better antimalware tools are essential.
This guide reviews the latest malware attacks -- where they’re coming from and how they work -- and then delves into the specifics of malware defenses. It reviews the basics of how antimalware tools work, discusses the strategic decisions that need to be made to fight malware now and even provides a handy glossary so you can be sure you’re up to date on the latest terminology.
With this guide, you can begin to fight back against the malware already attempting to assault your enterprise systems.
1Learn how the latest malware attacks work
Malware is an ongoing battle; we can be certain that attackers will continue to develop new malicious code to try to evade your antimalware systems. Here's a look at how some of the latest attacks work.
-
Article
How does the OneSoftPerDay adware hide from antimalware systems?
OneSoftPerDay, an adware program can install backdoors on PCs, is able to avoid detection from antimalware tools. Expert Nick Lewis explains how to mitigate its effects. Read Now
-
Article
How can Vonteera adware be prevented from disabling antimalware?
Vonteera adware has the ability to disable antimalware software on endpoint devices. Expert Nick Lewis explains how enterprises can prevent this attack. Read Now
-
Article
How can enterprises protect against Rombertik malware?
Rombertik malware is a new advanced malware that can trigger a system to self-destruct if it's detected. Expert Nick Lewis explains Rombertik and how to keep it from crippling your system. Read Now
-
Article
How does GreenDispenser self-deleting malware work?
A new type of self-deleting malware, known as GreenDispenser, allows attackers to rob ATMs of cash. Expert Nick Lewis explains how this threat works and how to prevent it. Read Now
-
Article
ProxyBack malware: How does it affect Internet proxies?
ProxyBack malware turns infected user systems into Internet proxies, which can obfuscate the attack source. Expert Nick Lewis explains how the malware works, and its purpose. Read Now
-
Article
How does the Mazar malware take control of Android devices?
The Mazar malware can wipe an entire Android device once it has been installed. Expert Nick Lewis explains how this malware works, and how attacks can be prevented. Read Now
2Malware today requires improved strategies
Security pros continue to fight increasingly clever attacks taking aim at lower-hanging fruit: smartphones, mobile apps, social media and other cloud services. These rich targets require new antimalware tools and protection strategies. Learn how to mitigate these multifaceted malware threats.
-
Resource
Antimalware technologies and techniques to the rescue
This ISM Insider Edition provides fresh thinking and new information on what antimalware detection and prevention is available to meet the modern malware threat. To best protect your organization and its unique assets, read on. Read Now
-
Article
The rise of fileless malware attacks
New malware threats can infect systems without leaving any files behind. Expert Nick Lewis explains how fileless malware operates and the best ways for security programs to stop it. Read Now
-
Article
Malware-free attacks: How can enterprises stop them?
New research shows that threat actors are "living off the land" and infiltrating corporate networks using malware-free attacks. Expert Nick Lewis explains how this is done. Read Now
-
Article
De-anonymizing malware: Can a new tactic help?
Researchers have discovered a new technique for de-anonymizing software that could help infosec teams attribute malware attacks. Expert Nick Lewis explains how it works. Read Now
3Key antimalware terms
To talk defense strategy and antimalware tools, you need to know the lingo first. Here are the key terms used when speaking about malware threats and antimalware techniques.
-
Definition
honeypot (computing)
A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts in order to gain unauthorized access to information systems. Read Now
-
Definition
man-in-the-middle attack (MitM)
A man-in-the-middle attack is one in which the attacker secretly intercepts and relays messages between two parties who think they are communicating directly with each other. Read Now
-
Definition
active man-in-the-middle attack (MitM)
Active man-in-the-middle (MitM) is an attack method that allows an intruder to access sensitive information by intercepting and altering communications between the user of a public network and a requested website. Read Now
-
Definition
Trojan horse (computing)
In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious. Read Now
-
Definition
zero-day exploit
A zero-day exploit is one that takes advantage of a security vulnerability on the same day that the vulnerability becomes generally known...(Continued) Read Now
-
Definition
keylogger (keystroke logger or system monitor)
A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard. Read Now
-
Article
Analysis: Windows 8 security features improve on Windows 7 security
Expert Michael Cobb says Windows 8's security features, like Windows Defender and Secure Boot, are a step forward for desktop and BYOD security. Read Now
-
Definition
anti-spyware software
Anti-spyware software is a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed. Read Now
-
Definition
SEO poisoning (search poisoning)
Search poisoning, also known as search engine poisoning, is an attack involving malicious websites that are designed to show up prominently in search results. The sites associated with the links may infect visitors with malware or fraudulently access sensitive information to be used for identity theft. Read Now
-
Definition
Rançongiciel
Un rançongiciel, ou ransomware, est un logiciel malveillant qui kidnappe les données. Le pirate exploite une faille pour chiffrer les données de sa victime, puis lui demande de verser une somme d'argent en échange de la clé qui permettra de les déchiffrer. Read Now