Backdoor

Results: 134



#Item
61Cryptography / Dropper / Backdoor / RC4 / Malware / Espionage / Cyberwarfare

Arbor Threat Intelligence Brief[removed]ASERT Threat Intelligence Brief[removed]Illuminating the Etumbot APT Backdoor ASERT Threat Intelligence, June 2014

Add to Reading List

Source URL: www.arbornetworks.com

Language: English
62C programming language / International Obfuscated C Code Contest / Classical cipher / Computer programming / Computing / Software engineering

TLP:WHITE Malware analysis report of a Backdoor.Snifula variant CIRCL - Computer Incident Response Center Luxembourg and National CERT of Luxembourg 41, avenue de la gare, 1611 Luxembourg, Luxembourg⇤ (Dated: [removed]-

Add to Reading List

Source URL: circl.lu

Language: English - Date: 2014-03-28 07:10:33
63Computer security / Panda Security / Malware / Computer virus / Backdoor / International Computer Security Association / Norton AntiVirus / Antivirus software / System software / Software

• ICSA Labs 2005 • ICSA Labs Premier Services

Add to Reading List

Source URL: www.icsalabs.com

Language: English - Date: 2010-08-10 09:58:59
64System software / Computer security / Rootkit / Spyware / Secure Shell / Duqu / Backdoor / Espionage / Malware / Cyberwarfare

 Unveiling “Careto” - The Masked APT Version 1.0 TLP: GREEN

Add to Reading List

Source URL: kasperskycontenthub.com

Language: English - Date: 2014-03-27 15:13:52
65Web 2.0 / Cross-platform software / Internet privacy / Gears / Gmail / JavaScript / Backdoor / Cross-site scripting / Google Chrome / Software / Computing / World Wide Web

PDF Document

Add to Reading List

Source URL: www.andlabs.org

Language: English - Date: 2010-03-02 05:56:28
66Trojan horses / Rootkits / Computer worms / Backdoor / Conficker / Operation Aurora / Mydoom / Password / Dropper / Malware / System software / Spyware

White Paper Global Energy Cyberattacks: “Night Dragon” By McAfee® Foundstone® Professional Services and McAfee Labs™ February 10, 2011

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:08:06
67Computer network security / Software testing / BackTrack / KDE / Cryptography / Malware / Penetration test / Metasploit Project / Backdoor / Computer security / Cyberwarfare / Software

P a g e |1 BackTrack 5 guide 4: How to perform stealth actions Karthik R, Contributor You can read the original story here, on SearchSecurity.in.

Add to Reading List

Source URL: media.techtarget.com

Language: English - Date: 2012-02-07 06:47:51
68Business / Investment / Stock market / Private equity / Securities / Reverse takeover / Special-purpose acquisition company / Initial public offering / David N. Feldman / Corporate finance / Mergers and acquisitions / Financial economics

Erik P.M. Vermeulen Department of Business Law, Tilburg University The Netherlands Rules on Backdoor Listings: a Global Survey

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-12-10 04:30:01
69Spyware / System software / Cryptography / Advanced persistent threat / Trojan horse / Dropper / Computer insecurity / Backdoor / Denial-of-service attack / Espionage / Malware / Cyberwarfare

White Paper Dissecting Operation Troy: Cyberespionage in South Korea By Ryan Sherstobitoff and Itai Liba, McAfee® Labs

Add to Reading List

Source URL: www.mcafee.com

Language: English
70Malware / National security / Standards organizations / Cyberwarfare / International nongovernmental organizations / Institute of Electrical and Electronics Engineers / Computer security / Computer insecurity / National Security Agency / Security / Espionage / Cryptography

A WHITE PAPER Risking It All: Unlocking the Backdoor to the Nation’s Cybersecurity

Add to Reading List

Source URL: ieeeusa.org

Language: English - Date: 2014-06-25 11:49:01
UPDATE