Malware research

Results: 246



#Item
171Internet / Malware / Proxy server / Windows / Keystroke logging / Trojan horse / Cache / World Wide Web / Spyware / Computing / Espionage

POINT OF SALE MALWARE: THE FULL STORY OF THE BACKOFF TROJAN OPERATION December 2014 RSA® Research Group

Add to Reading List

Source URL: blogs.rsa.com

Language: English - Date: 2014-12-22 11:04:24
172Merchant services / Credit cards / Economics / Radio-frequency identification / EMV / Payment Card Industry Data Security Standard / Payment card / Acquiring bank / Magnetic stripe card / Payment systems / Electronic commerce / Business

A Trend Micro Research Paper PoS RAM Scraper Malware Past, Present, and Future Numaan Huq

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2014-09-10 22:42:47
173Computer network security / Cyberwarfare / Data breach / Information security / Malware / Internet privacy / Threat / Remote data deletion / Computer security / Security / Data security

2011 Cost of Data Breach Study: United States Benchmark Research sponsored by Symantec Independently Conducted by Ponemon Institute LLC March 2012

Add to Reading List

Source URL: www.ponemon.org

Language: English - Date: 2012-12-06 09:58:51
174Computer security / Access control / Identity management / Operating system / Kernel / Ring / Android / Google Chrome / Malware / Software / Computing / Cloud clients

User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems Franziska Roesner, Tadayoshi Kohno {franzi, yoshi}@cs.washington.edu University of Washington

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2011-12-01 14:52:23
175Ethics / Cryptography / Malware / Computer security / Cloud computing / Network security / Internet privacy / Cyberwarfare / Smart grid / Security / Crime prevention / National security

ERCIM White paper on Cyber-security and privacy research Version v0.91, Oct[removed]

Add to Reading List

Source URL: www.ercim.eu

Language: English - Date: 2014-10-22 07:51:30
176Antivirus software / Spyware / Trojan horses / Norton AntiVirus / Proprietary software / PKZIP / FidoNet / Computer virus / Bulletin board system / Malware / System software / Software

Attitude Adjustment: Trojans and Malware on the Internet An Update Sarah Gordon and David Chess IBM Thomas J. Watson Research Center Yorktown Heights, NY

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
177Malware / Ransomware / Food and Drug Administration / Food Safety and Inspection Service / Health / Pharmaceutical sciences / Clinical research / Extortion

Department of Homeland Security Daily Open Source Infrastructure Report

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2014-11-18 08:02:45
178Ethics / Cryptography / Malware / Computer security / Cloud computing / Network security / Internet privacy / Cyberwarfare / Smart grid / Security / Crime prevention / National security

ERCIM White paper on Cyber-security and privacy research Version v0.91, Oct[removed]

Add to Reading List

Source URL: www.ercim.eu

Language: English - Date: 2014-10-22 07:51:30
179Computer configuration / Control Panel / Malware / Windows Vista / Windows / Dynamic-link library / Applet / Microsoft Windows / System software / Software

A Trend Micro Research Paper CPL Malware Malicious Control Panel Items Fernando Mercês

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2014-01-26 22:37:22
180Computer network security / Anti-worm / Worms / Code Red / Nimda / Warhol worm / Buffer overflow / Morris worm / Computer virus / Malware / System software / Computer worms

Large Scale Malicious Code: A Research Agenda ∗† Nicholas Weaver Vern Paxson Silicon Defense & ICSI Center for UC Berkeley Internet Research

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2003-05-05 13:14:30
UPDATE