Malware research

Results: 246



#Item
211Money / Boleto / Malware / Cheque / Social engineering / Payment systems / Business / Economics

RSA® Research Group RSA DISCOVERS MASSIVE BOLETO FRAUD RING IN BRAZIL July 2014

Add to Reading List

Source URL: www.emc.com

Language: English
212National security / Safety / Computer network security / Computer security / Malware / Framework Programmes for Research and Technological Development / Cloud computing / Trustworthy computing / Privacy / Security / Prevention / Crime prevention

PDF Document

Add to Reading List

Source URL: www.inco-trust.eu

Language: English - Date: 2009-11-13 04:45:13
213System software / Computer crimes / Malware / Phishing / Two-factor authentication / Online banking / Trend Micro / Transaction authentication number / One-time password / Cybercrime / Computer security / Social engineering

A Trend Micro Research Paper Finding Holes Operation Emmental David Sancho, Feike Hacquebord, and Rainer Link

Add to Reading List

Source URL: housecall.trendmicro.com

Language: English - Date: 2014-07-24 09:59:31
214System software / Computer crimes / Malware / Phishing / Two-factor authentication / Online banking / Trend Micro / Transaction authentication number / One-time password / Cybercrime / Computer security / Social engineering

A Trend Micro Research Paper Finding Holes Operation Emmental David Sancho, Feike Hacquebord, and Rainer Link

Add to Reading List

Source URL: free.antivirus.com

Language: English - Date: 2014-07-24 09:59:31
215Malware / Software testing / Microsoft Windows / Computer network security / DLL injection / Code injection / Vulnerability / SQL injection / Dynamic-link library / Cyberwarfare / Computing / Computer security

Trace: Tennessee Research and Creative Exchange Masters Theses University of Tennessee 

Add to Reading List

Source URL: www.csiir.ornl.gov

Language: English - Date: 2010-08-19 15:52:37
216Computer security / Networking hardware / Server appliance / Internet privacy / Malware / Pharming / Router / DNS spoofing / Denial-of-service attack / Computing / Computer network security / Internet

Drive-By Pharming Sid Stamm1 , Zulfikar Ramzan2 , and Markus Jakobsson1 1 2

Add to Reading List

Source URL: research.sidstamm.com

Language: English - Date: 2010-02-07 16:55:27
217Phishing / Spamming / Jakobsson / Pharming / Crimeware / Internet privacy / Opera / Reihaneh Safavi-Naini / Software / Malware / Social engineering

Sid Stamm [removed] http://www.sidstamm.com/ Department of Computer Science School of Informatics, Indiana University[removed]

Add to Reading List

Source URL: research.sidstamm.com

Language: English - Date: 2010-02-07 17:31:08
218Malware / Antivirus software / Computer network security / Rootkit / Trojan horse / Computer worm / Computer virus / Attack / Cyberwarfare / System software / Computer security

THE CYBER ESPIONAGE BLUEPRINT: Understanding Commonalities In Targeted Malware Campaigns Alex Cox, Principal Research Analyst, RSA FirstWatch RSA® FirstWatch Intelligence Report

Add to Reading List

Source URL: blogs.rsa.com

Language: English - Date: 2014-06-03 12:01:37
219Computer network security / Computer networking / Network performance / Proxy server / Malware / Anonymizer / Tor / Botnet / SOCKS / Computing / Internet privacy / Internet

Trend Micro Incorporated Research Paper 2012 Russian Underground 101

Add to Reading List

Source URL: www.trendmicro.no

Language: English - Date: 2012-10-30 07:51:24
220Computer network security / Email / Malware / Electronic commerce / National security / Internet privacy / Password / Proxy server / Spyware / Computing / Internet / Security

Computer and Internet Use Policy Faculty, staff and students (hereinafter users) are expected to promote efficient use of network resources, consistent with the instructional, research, public service and administrative

Add to Reading List

Source URL: littlepriest.edu

Language: English - Date: 2013-06-10 12:46:18
UPDATE