Malware analysis

Results: 349



#Item
101Computing / Fast flux / Domain name / Domain / Malware / Name server / Whois / Time to live / Botnet / Domain name system / Internet / Network architecture

EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis Leyla Bilge∗, Engin Kirda∗ §, Christopher Kruegel‡, and Marco Balduzzi∗ ∗ Institute Eurecom, Sophia Antipolis

Add to Reading List

Source URL: www.iseclab.org

Language: English - Date: 2010-12-01 15:42:09
102Malware / Proprietary software / JavaScript / Trojan horse / HTTP cookie / WinZip / Antivirus software / Software / Computing / Google Chrome

What do a banking Trojan, Chrome and a government mail server have in common? Analysis of a piece of Brazilian malware What do a banking Trojan, Chrome

Add to Reading List

Source URL: www.welivesecurity.com

Language: English - Date: 2013-08-02 05:59:10
103Malicious / Social engineering / Malware / Trojan horse

CYBER THREAT INTELLIGENCE REPORT Q3 2014 Blueliv has carried out the following analysis of worldwide cyber threat activity stastistics for the third quarter 2014, comparing it with the second one.

Add to Reading List

Source URL: www.blueliv.com

Language: English - Date: 2014-12-19 15:01:54
104Computer security / Intelligence analysis / Military intelligence / Counter-intelligence / Threat / Malware / Vulnerability / Counterintelligence / Central Intelligence Agency / Cyberwarfare / Espionage / Computer network security

Rethinking Information Security for Advanced Threats CEB Information Risk Leadership Council Advanced threats differ

Add to Reading List

Source URL: www.executiveboard.com

Language: English - Date: 2015-02-12 11:43:28
105Android / Smartphones / Embedded Linux / Tiny Encryption Algorithm / Java / Malware / Computing / Software / Computer programming

Lookout Mobile Security Technical Tear Down Threat Name DroidDream, Payload One & Two Sample used in the analysis Payload One

Add to Reading List

Source URL: blog.lookout.com

Language: English - Date: 2014-05-02 03:25:32
106Computer network security / Crime prevention / National security / Public safety / Malware / Computer insecurity / Attack / International Multilateral Partnership Against Cyber Threats / Information security / Security / Computer security / Cyberwarfare

Tackling Attack Detection and Incident Response Research and Analysis by Intel Security and ESG By Jon Oltsik, Senior Principal Analyst

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-04-09 16:30:39
107Computer network security / Crime prevention / National security / Public safety / Malware / Computer insecurity / Attack / International Multilateral Partnership Against Cyber Threats / Information security / Security / Computer security / Cyberwarfare

Tackling Attack Detection and Incident Response Research and Analysis by Intel Security and ESG By Jon Oltsik, Senior Principal Analyst

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-04-09 16:30:39
108Computer network security / Crime prevention / National security / Public safety / Malware / Computer insecurity / Attack / International Multilateral Partnership Against Cyber Threats / Information security / Security / Computer security / Cyberwarfare

Tackling Attack Detection and Incident Response Research and Analysis by Intel Security and ESG By Jon Oltsik, Senior Principal Analyst

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-04-09 16:30:39
109Computer network security / Crime prevention / National security / Public safety / Malware / Computer insecurity / Attack / International Multilateral Partnership Against Cyber Threats / Information security / Security / Computer security / Cyberwarfare

Tackling Attack Detection and Incident Response Research and Analysis by Intel Security and ESG By Jon Oltsik, Senior Principal Analyst

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-04-09 16:30:39
110Cyberwarfare / Antivirus software / Social engineering / Rogue software / Computer virus / Rootkit / Computer worm / Trojan horse / Spyware / System software / Espionage / Malware

INTRODUCTION TO MALWARE & MALWARE ANALYSIS by Quick Heal R&D lab Security Simplified

Add to Reading List

Source URL: bitcast-b.bitgravity.com

Language: English - Date: 2014-11-14 00:47:33
UPDATE