Botnets

Results: 408



#Item
221Malware / Spamming / Multi-agent systems / Botnets / Antivirus software / Computer worm / Spyware / Computer virus / Trojan horse / Computer network security / Computing / Cyberwarfare

INFOCOMM SECis INCOMPLETE RITY WITHOUT Be aw

Add to Reading List

Source URL: gosafeonline.sg

Language: English - Date: 2014-10-27 05:43:42
222Multi-agent systems / Spamming / Bitcoin / Peer-to-peer computing / Botnets / Malware / Cryptographic nonce / Rootkit / Mining / Computing / Internet / Computer network security

Botcoin: Monetizing Stolen Cycles Danny Yuxing Huang, Hitesh Dharmdasani† , Sarah Meiklejohn Vacha Dave, Chris Grier∗ , Damon McCoy† , Stefan Savage, Nicholas Weaver∗ Alex C. Snoeren and Kirill Levchenko UC San D

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-03 04:47:56
223Computer network security / Multi-agent systems / Spamming / Computer security / Malware / Network performance / Zeus / Proxy server / Trojan horse / Computing / Internet / Botnets

WHITE PAPER Hesperbot—A new, advanced banking Trojan in the wild By:

Add to Reading List

Source URL: static5.esetstatic.com

Language: English - Date: 2013-11-08 13:33:57
224Multi-agent systems / Botnets / Technology / Cybercrime / Malware / Automated teller machine / Shadowserver / Zeus / Password / Computer network security / Spamming / Computing

G r o u p-I B a n d F ox-I T Anunak: APT against financial institutions

Add to Reading List

Source URL: www.group-ib.com

Language: English - Date: 2014-12-19 10:32:29
225Social engineering / Computer security / Computer crimes / Malware / FireEye /  Inc. / Botnets / Phishing / Zeus / Advanced persistent threat / Cybercrime / Spamming / Computing

[TLP WHITE] C-SAWR 030 [Extract] This is an extract of the Cyber-security Information Sharing Partnership (CiSP) Situational Awareness Weekly Report (C-SAWR). CiSP members automatically receive access to the full produc

Add to Reading List

Source URL: www.cert.gov.uk

Language: English - Date: 2014-08-21 12:05:06
226Computer network security / Multi-agent systems / Botnets / Malware / Zeus / Email spam / Spam / Computer virus / Computing / Spamming / Internet

C-SAWR 027 [Extract] This is an extract of the Cyber-security Information Sharing Partnership (CiSP) Situational Awareness Weekly Report (C-SAWR). CiSP members automatically receive access to the full product as well as

Add to Reading List

Source URL: www.cert.gov.uk

Language: English - Date: 2014-08-01 08:01:36
227Computer network security / Cyberwarfare / Multi-agent systems / Spamming / Rootkits / Zeus / Malware / Trojan horse / Trusteer / Computing / Botnets / Computer security

C-SAWR 021 [Extract] This is an extract of the Cyber-security Information Sharing Partnership (CiSP) Situational Awareness Weekly Report (C-SAWR). CiSP members automatically receive access to the full product as well as

Add to Reading List

Source URL: www.cert.gov.uk

Language: English - Date: 2014-06-20 03:51:09
228Cyberwarfare / Malware / Computer network security / Botnets / Computer security / Targeted threat / Threat / Phishing / Spam / Computing / Internet / Spamming

Targeted Threat Index: Characterizing and Quantifying Politically-Motivated Targeted Malware Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, Byron Sonne, and Greg Wiseman, The Citizen Lab; Phillipa G

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-01-15 07:11:43
229Spamming / Botnets / Software / Cyberwarfare / Malware / Bitcoin / Zeus / Ransomware / Antivirus software / Computing / Multi-agent systems / Computer network security

Security Threat Report 2014 Smarter, Shadier, Stealthier Malware Security Threat Report[removed]Contents

Add to Reading List

Source URL: www.sophos.com

Language: English - Date: 2014-01-07 09:32:18
230Computer network security / Botnets / Bitcoin / Peer-to-peer computing / Peer-to-peer / Email spam / Port / Storm botnet / Srizbi botnet / Computing / Spamming / Multi-agent systems

BACK CHANNELS AND BITCOINS: ZEROACCESS’ SECRET C&C COMMUNICATIONS WYKE BACK CHANNELS AND BITCOINS: ZEROACCESS’ SECRET C&C COMMUNICATIONS James Wyke

Add to Reading List

Source URL: www.sophos.com

Language: English - Date: 2013-10-31 13:56:41
UPDATE