Malicious

Results: 683



#Item
51UNCLASSIFIED//FOR OFFICIAL USE ONLY  (U) June 2, 2017; 1200 EDT (U) RANSOMWARE: GOALS OF MALICIOUS ACTORS AND CURRENT SYSTEM VULNERABILITIES

UNCLASSIFIED//FOR OFFICIAL USE ONLY (U) June 2, 2017; 1200 EDT (U) RANSOMWARE: GOALS OF MALICIOUS ACTORS AND CURRENT SYSTEM VULNERABILITIES

Add to Reading List

Source URL: info.publicintelligence.net

- Date: 2017-06-18 21:47:47
    52National Protection and Programs Directorate Office of Cyber and Infrastructure Analysis (OCIA) Critical Infrastructure Security and Resilience Note CONSEQUENCES TO SEAPORT OPERATIONS FROM MALICIOUS CYBER ACTIVITY

    National Protection and Programs Directorate Office of Cyber and Infrastructure Analysis (OCIA) Critical Infrastructure Security and Resilience Note CONSEQUENCES TO SEAPORT OPERATIONS FROM MALICIOUS CYBER ACTIVITY

    Add to Reading List

    Source URL: info.publicintelligence.net

    - Date: 2016-09-11 19:09:27
      53An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries∗ Yehuda Lindell† Benny Pinkas‡

      An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries∗ Yehuda Lindell† Benny Pinkas‡

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2008-01-30 02:51:31
        54Combining Static and Dynamic Analysis for the Detection of Malicious Documents Zacharias Tzermias,* Giorgos Sykiotakis,† Michalis Polychronakis,‡ Evangelos P. Markatos* *  Institute of Computer Science, Foundation fo

        Combining Static and Dynamic Analysis for the Detection of Malicious Documents Zacharias Tzermias,* Giorgos Sykiotakis,† Michalis Polychronakis,‡ Evangelos P. Markatos* * Institute of Computer Science, Foundation fo

        Add to Reading List

        Source URL: www.ics.forth.gr

        - Date: 2012-03-22 09:27:59
          55Demo: Using Malicious Media Files to Compromise the Security and Privacy of Smart TVs Benjamin Michéle Andrew Karpow

          Demo: Using Malicious Media Files to Compromise the Security and Privacy of Smart TVs Benjamin Michéle Andrew Karpow

          Add to Reading List

          Source URL: www.isti.tu-berlin.de

          - Date: 2014-02-06 14:25:05
            56CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers Antonio Nappa∗‡ , Zhaoyan Xu† , M. Zubair Rafique∗ , Juan Caballero∗ , Guofei Gu† ∗ IMDEA  Software Institute ‡ Universidad Polit´

            CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers Antonio Nappa∗‡ , Zhaoyan Xu† , M. Zubair Rafique∗ , Juan Caballero∗ , Guofei Gu† ∗ IMDEA Software Institute ‡ Universidad Polit´

            Add to Reading List

            Source URL: faculty.cse.tamu.edu

            - Date: 2013-12-18 10:56:16
              57Impact of Malicious TCP Retransmission on Cellular Traffic Accounting Younghwan Go, Denis Foo Kune† , Shinae Woo, KyoungSoo Park, and Yongdae Kim KAIST  University of Michigan†

              Impact of Malicious TCP Retransmission on Cellular Traffic Accounting Younghwan Go, Denis Foo Kune† , Shinae Woo, KyoungSoo Park, and Yongdae Kim KAIST University of Michigan†

              Add to Reading List

              Source URL: www.ndsl.kaist.edu

              - Date: 2013-10-03 11:10:54
                58The 5 Stages of a Web Malware Attack From website to infection in You don’t even need to click to start a malicious

                The 5 Stages of a Web Malware Attack From website to infection in You don’t even need to click to start a malicious

                Add to Reading List

                Source URL: sophos.files.wordpress.com

                - Date: 2014-03-26 15:55:28
                  59WHAT IS RANSOMWARE? Ransomware is a type of malicious software cyber actors use to deny access to systems or data. The malicious cyber actor holds systems or data hostage until the ransom is paid. After the initial inf

                  WHAT IS RANSOMWARE? Ransomware is a type of malicious software cyber actors use to deny access to systems or data. The malicious cyber actor holds systems or data hostage until the ransom is paid. After the initial inf

                  Add to Reading List

                  Source URL: www.aha.org

                  - Date: 2016-06-24 15:29:56