Ghost Rat

Results: 4



#Item
1Hacking / Social engineering / Electronic warfare / Computer crimes / United States Cyber Command / Cyber spying / Byzantine Foothold / Phishing / Ghost Rat / Cybercrime / Cyberwarfare / Security

special report REUTERS/Rick Wilking In Cyberspy vs. cyberspy, China has the edge

Add to Reading List

Source URL: graphics.thomsonreuters.com

Language: English - Date: 2011-04-13 17:29:44
2Espionage / Computing / Trojan horse / Malware / Ghost Rat / Email / Computer virus / Cyber spying / Antivirus software / Spyware / Social engineering / Security

Lecture 30: Mounting Targeted Attacks with Trojans and Social Engineering — Cyber Espionage Lecture Notes on “Computer and Network Security” by Avi Kak ([removed]) April 22, 2014

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2014-04-22 16:08:25
3Computer network security / System software / Malware / Spamming / Advanced persistent threat / Botnet / Ghost Rat / GhostNet / SecurID / Espionage / Cyberwarfare / Spyware

Detecting APT Activity with Network Traffic Analysis

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2012-10-24 22:35:52
4Cybercrime / Spyware / Computer network security / Hacking / Malware / Targeted threat / GhostNet / Ghost Rat / Botnet / Espionage / Cyberwarfare / Advanced persistent threat

U.S.-China Economic and Security Review Commission Hearing on “Developments in China’s Cyber and Nuclear Capabilities” Submission by Nart Villeneuve March 26, 2012 I would like to thank the members of the U.S.-Chi

Add to Reading List

Source URL: www.uscc.gov

Language: English - Date: 2013-02-13 13:42:40
UPDATE