Malware

Results: 7286



#Item
911Computer security / Software / Cyberwarfare / Antivirus software / Malware / Rootkits / Computer network security / Kaspersky Lab / Duqu / Kaspersky Anti-Virus / Duke

THE DUKES 7 years of Russian cyberespionage TLP: WHITE This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the Dukes, a well-resourced, highly

Add to Reading List

Source URL: www.f-secure.com

Language: English - Date: 2015-09-17 01:34:34
912Privilege / Outlook.com / Wikipedia administrators

User guide of MISP Malware Information Sharing Platform, a Threat Sharing Platform.

Add to Reading List

Source URL: www.circl.lu

Language: English - Date: 2016-02-18 16:24:11
913

Research Brief June 2014 The Citizen Lab Police Story: Hacking Team’s Government Surveillance Malware

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2015-03-18 14:57:42
    914

    Case Study RedSocks zorgt ervoor dat Air Miles voldoet aan de Europese vereisten Air Miles is continu zeker van inzicht in de netwerkomgeving dankzij de RedSocks Malware Threat Defender

    Add to Reading List

    Source URL: www.redsocks.nl

    Language: Dutch - Date: 2016-01-25 04:02:42
      915Malware / Computer worms / Denial-of-service attacks / SQL Slammer / Warhol worm / Witty / Code Red / Transmission Control Protocol / Transport layer / Computer network security

      The Top Speed of Flash Worms Stuart Staniford∗ David Moore† Vern Paxson‡

      Add to Reading List

      Source URL: www1.icsi.berkeley.edu

      Language: English - Date: 2012-09-26 16:43:06
      916

      The silent network Denying the spam and malware chatter using free tools Peter N. M. Hansteen

      Add to Reading List

      Source URL: home.nuug.no

      Language: English - Date: 2007-05-18 16:29:18
        917Computing / Technology / Mobile technology / Text messaging / Cloud clients / Short Message Service / Malware / Android / Computer virus / Transaction authentication number

        Compact Explanation of Why Malware is Bad Speaker: Wei Chen1 Joint Work with Charles Sutton1 , David Aspinall1 , Andrew D. Gordon1,2 , Igor Muttik3 , and Qi Shen4 App Guarden Project

        Add to Reading List

        Source URL: www.ai4fm.org

        Language: English - Date: 2015-09-02 07:29:35
        918

        A Randomized High-Security Cipher Combining Deniability with Pencil-and-Paper Decryption Grant D. Schultz Abstract: With key logging trojans and other malware in the wild, and operating systems being too complex to prote

        Add to Reading List

        Source URL: cryptome.org

        Language: English - Date: 2015-09-04 06:14:52
          919

          Semantics-Aware Malware Detection Mihai Christodorescu∗ Somesh Jha∗ University of Wisconsin, Madison {mihai, jha}@cs.wisc.edu Sanjit A. Seshia† Dawn Song Randal E. Bryant†

          Add to Reading List

          Source URL: uclid.eecs.berkeley.edu

          Language: English - Date: 2011-01-27 21:52:26
            920

            The Socio-monetary Incentives of Online Social Network Malware Campaigns Ting-Kai Huang Bruno Ribeiro

            Add to Reading List

            Source URL: cosn.acm.org

            Language: English - Date: 2014-09-11 04:02:22
              UPDATE