<--- Back to Details
First PageDocument Content
Trojan horses / Antivirus software / Windows API / Zlob trojan / False alarm / MOS Technology SID / McAfee VirusScan / Malware / Software / System software
Date: 2014-04-18 07:45:40
Trojan horses
Antivirus software
Windows API
Zlob trojan
False alarm
MOS Technology SID
McAfee VirusScan
Malware
Software
System software

Anti-Virus Comparative - Appendix – Marchwww.av-comparatives.org Details about the discovered False Alarms

Add to Reading List

Source URL: www.av-comparatives.org

Download Document from Source Website

File Size: 277,18 KB

Share Document on Facebook

Similar Documents

FROM RUSSIA TO HOLLYWOOD:  TURNING THE TABLES ON A SPYEYE CYBERCRIME RING

FROM RUSSIA TO HOLLYWOOD: TURNING THE TABLES ON A SPYEYE CYBERCRIME RING

DocID: 1qXAr - View Document

2016 IEEE 36th International Conference on Distributed Computing Systems  CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data Nolen Scaife

2016 IEEE 36th International Conference on Distributed Computing Systems CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data Nolen Scaife

DocID: 1qOOI - View Document

RSA 2012 CYBERCRIME TRENDS REPORT The Current State of Cybercrime and What to Expect in 2012 Cybercrime continues to show no signs of slowing down. In fact, 2011 marked a year of new advanced threats and an increased lev

RSA 2012 CYBERCRIME TRENDS REPORT The Current State of Cybercrime and What to Expect in 2012 Cybercrime continues to show no signs of slowing down. In fact, 2011 marked a year of new advanced threats and an increased lev

DocID: 1qFoK - View Document

Ransomware phenomenon Extortion scheme Archetype of modern malware Conclusion  Comparative analysis of various ransomware virii

Ransomware phenomenon Extortion scheme Archetype of modern malware Conclusion Comparative analysis of various ransomware virii

DocID: 1p8IG - View Document

April 2015 Feature Article: Emerging Malware Table of Contents Emerging Malware ...........................................................................................................................................

April 2015 Feature Article: Emerging Malware Table of Contents Emerging Malware ...........................................................................................................................................

DocID: 1p177 - View Document