<--- Back to Details
First PageDocument Content
Cyberwarfare / Trojan horses / Spyware / Computer access control / Surveillance / Hacking Team / Exploit / Citizen Lab / Vupen / Morgan Marquis-Boire / FinFisher / Proxy server
Date: 2015-03-18 14:57:35
Cyberwarfare
Trojan horses
Spyware
Computer access control
Surveillance
Hacking Team
Exploit
Citizen Lab
Vupen
Morgan Marquis-Boire
FinFisher
Proxy server

The Citizen Lab Research Brief FebruaryMapping Hacking Team’s “Untraceable” Spyware

Add to Reading List

Source URL: citizenlab.org

Download Document from Source Website

File Size: 1,15 MB

Share Document on Facebook

Similar Documents

Malware / Cyberwarfare / Trojan horses / Computing / Computer network security / Botnets / Rootkits / Zeus / SpyEye / Cybercrime / Computer security

FROM RUSSIA TO HOLLYWOOD: TURNING THE TABLES ON A SPYEYE CYBERCRIME RING

DocID: 1qXAr - View Document

Ransomware / Malware / Cyberwarfare / Computer security / Cybercrime / Blackmail / Trojan horses / Computer virus / Antivirus software / PGPCoder / TeslaCrypt / CryptoLocker

2016 IEEE 36th International Conference on Distributed Computing Systems CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data Nolen Scaife

DocID: 1qOOI - View Document

Malware / Cyberwarfare / Computer security / Trojan horses / Cybercrime / Computer network security / Social engineering / Zeus / Man-in-the-browser / International cybercrime / Identity theft / Transaction authentication number

RSA 2012 CYBERCRIME TRENDS REPORT The Current State of Cybercrime and What to Expect in 2012 Cybercrime continues to show no signs of slowing down. In fact, 2011 marked a year of new advanced threats and an increased lev

DocID: 1qFoK - View Document

Trojan horses / Ransomware / Cryptovirology / Archiveus / PGPCoder / Malware / AIDS / Computer virus / Extortion / Plural form of words ending in -us

Ransomware phenomenon Extortion scheme Archetype of modern malware Conclusion Comparative analysis of various ransomware virii

DocID: 1p8IG - View Document

Antivirus software / ESET / Malware / Computer virus / David Harley / Rootkit / Trojan horses / ESET NOD32 / Malware analysis

April 2015 Feature Article: Emerging Malware Table of Contents Emerging Malware ...........................................................................................................................................

DocID: 1p177 - View Document