<--- Back to Details
First PageDocument Content
Spyware / System software / Cryptography / Advanced persistent threat / Trojan horse / Dropper / Computer insecurity / Backdoor / Denial-of-service attack / Espionage / Malware / Cyberwarfare
Date: 2014-01-10 01:07:59
Spyware
System software
Cryptography
Advanced persistent threat
Trojan horse
Dropper
Computer insecurity
Backdoor
Denial-of-service attack
Espionage
Malware
Cyberwarfare

White Paper Dissecting Operation Troy:

Add to Reading List

Source URL: www.mcafee.com

Download Document from Source Website

File Size: 2,05 MB

Share Document on Facebook

Similar Documents

APC AVIRA PROTECTION CLOUD Zero-Day and Advanced Persistent Threat detection and prevention API

DocID: 1tBLk - View Document

training.keywcorp.com This two-week course teaches students to perform the fast and efficient digital forensics required to discover and investigate an Advanced Persistent Threat. Students learn the types of tactics and

DocID: 1rQkc - View Document

Advanced persistent threat in the form of binary code, 3D illustration

DocID: 1rde8 - View Document

Computer security / Cyberwarfare / Security / Computer network security / Hacking / Cybercrime / Advanced persistent threat / Espionage / Trend Micro / Zero-day / Targeted threat / Internet security

Detecting the Enemy Inside the Network: How tough is it to Deal with APTs?

DocID: 1r9LS - View Document

Cyberwarfare / Cybercrime / Computer network security / Computer security / Security / Identity theft / Phishing / Spamming / Threat / Targeted threat / Advanced persistent threat

PhishLabs_Logo_CMYK_notag.eps

DocID: 1r5cD - View Document