Malicious

Results: 683



#Item
31Malicious Code Insertion Example This code has a bug that allows a hacker to take control of its execution and run evilfunc(). #include <stdio.h> // obviously it is compiler dependent // but on my system this function is

Malicious Code Insertion Example This code has a bug that allows a hacker to take control of its execution and run evilfunc(). #include // obviously it is compiler dependent // but on my system this function is

Add to Reading List

Source URL: www.technofetish.net

Language: English - Date: 2010-04-12 16:29:34
    32Cyber-Physical Security Via Geometric Control: Distributed Monitoring and Malicious Attacks

    Cyber-Physical Security Via Geometric Control: Distributed Monitoring and Malicious Attacks

    Add to Reading List

    Source URL: www.fabiopas.it

    Language: English - Date: 2017-07-12 04:52:37
      33WHAT IS MALVERTISING? Malicious advertising (Malvertising) is a malware attack that uses online ads to spread malicious code HOW MALVERTISNG WORKS You visit a website with an infected banner

      WHAT IS MALVERTISING? Malicious advertising (Malvertising) is a malware attack that uses online ads to spread malicious code HOW MALVERTISNG WORKS You visit a website with an infected banner

      Add to Reading List

      Source URL: de.malwarebytes.com

      Language: English - Date: 2016-05-10 22:43:12
        34Draft explanatory material to accompany draft Defamation and Malicious Publications (Scotland) Bill – for consultation purposes DRAFT EXPLANATORY NOTES INTRODUCTION These Explanatory Notes have been prepared by the Sco

        Draft explanatory material to accompany draft Defamation and Malicious Publications (Scotland) Bill – for consultation purposes DRAFT EXPLANATORY NOTES INTRODUCTION These Explanatory Notes have been prepared by the Sco

        Add to Reading List

        Source URL: www.scotlawcom.gov.uk

        Language: English - Date: 2017-07-28 04:28:06
          35Implicit flows in malicious and nonmalicious code Alejandro RUSSO a , Andrei SABELFELD a Keqin LI b a Chalmers University of Technology, Sweden b

          Implicit flows in malicious and nonmalicious code Alejandro RUSSO a , Andrei SABELFELD a Keqin LI b a Chalmers University of Technology, Sweden b

          Add to Reading List

          Source URL: www.cse.chalmers.se

          Language: English - Date: 2009-10-12 08:39:47
            36Technical Specifications RS Malicious Threat Detector RS v2.0 Malware Threat Defender Power

            Technical Specifications RS Malicious Threat Detector RS v2.0 Malware Threat Defender Power

            Add to Reading List

            Source URL: www.redsocks.eu

            - Date: 2018-08-06 04:35:00
              37Re: Scott Salyer’s “Operation Rotten Tomato” Website Our Website Guests: I have debated for some time whether it would be worthwhile to respond to the false statements and malicious innuendo written by “Supporter

              Re: Scott Salyer’s “Operation Rotten Tomato” Website Our Website Guests: I have debated for some time whether it would be worthwhile to respond to the false statements and malicious innuendo written by “Supporter

              Add to Reading List

              Source URL: www.morningstarco.com

              Language: English - Date: 2014-01-09 13:56:47
                38The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements Apostolis Zarras Alexandros Kapravelos

                The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements Apostolis Zarras Alexandros Kapravelos

                Add to Reading List

                Source URL: www.kapravelos.com

                Language: English
                  39The Role of Cloud Services in Malicious Software: Trends and Insights Xiao Han1,2 , Nizar Kheir1 , and Davide Balzarotti2 1  Orange Labs, Issy Les Moulineaux, France

                  The Role of Cloud Services in Malicious Software: Trends and Insights Xiao Han1,2 , Nizar Kheir1 , and Davide Balzarotti2 1 Orange Labs, Issy Les Moulineaux, France

                  Add to Reading List

                  Source URL: s3.eurecom.fr

                  Language: English - Date: 2018-08-14 16:06:29
                    40A E XPOSURE: a Passive DNS Analysis Service to Detect and Report Malicious Domains Leyla Bilge, Symantec Research, France Sevil Sen, Hacettepe University, Turkey Davide Balzarotti, Eurecom, France

                    A E XPOSURE: a Passive DNS Analysis Service to Detect and Report Malicious Domains Leyla Bilge, Symantec Research, France Sevil Sen, Hacettepe University, Turkey Davide Balzarotti, Eurecom, France

                    Add to Reading List

                    Source URL: s3.eurecom.fr

                    Language: English - Date: 2018-08-14 16:06:30