Back to Results
First PageMeta Content
Peer-to-peer / Internet / Email / Spamming / Computer network security / Computing / Malware


THREAT DATASHEET Mobile Threats | NotCompatible.C | Research by Tim Strazzere NOTCOMPATIBLE.C A Sophisticated Mobile Threat that
Add to Reading List

Document Date: 2015-06-17 19:35:01


Open Document

File Size: 2,15 MB

Share Result on Facebook

City

to network / /

Company

Craigslist / Puts Protected Networks / Infected Corporate Systems / AOL / Google / Yahoo! / StubHub / Live Nation / Comcast / Stole Data / /

Continent

Asia / Europe / /

Country

Poland / United States / Netherlands / United Kingdom / Sweden / /

Event

FDA Phase / /

Facility

SSL port / Google Play Store / /

IndustryTerm

automatic network / e-commerce anti-fraud mechanisms / distributed network / corporate networks / network-based security systems / Internet content delivery networks / network security systems / cybercrime groups / similar protocol / network security solution / secure enterprise networks / access to their network / law enforcement / cybercrime / private networks / closest server / behavioral analysis systems / weight loss solutions / internal network / /

OperatingSystem

Android / /

Person

Tim Strazzere / /

Position

administrator / social engineer / /

Product

C2 / C2s / /

ProgrammingLanguage

PHP / /

Technology

encryption / cryptography / network protocol / control network / PHP / public key / load balancing / DNS / Peer-to-peer / VPN / protocol-level encryption / peer-to-peer protocol / 2 5 THREAT DATASHEET C2 PROTOCOL STRUCTURE AND ENCRYPTION / HTTP / Android / mobile device / UDP / Peerto-peer protocols / SSL / similar protocol / Wi-Fi / mobile devices / /

URL

http /

SocialTag