Malware

Results: 7286



#Item
921Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of California

Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of California

Add to Reading List

Source URL: seclab.cs.ucsb.edu

Language: English - Date: 2010-12-20 14:49:07
922WWPass® PassKey™ Strong Authentication The First Line of Defense infected with malware that intercepts your text messages.

WWPass® PassKey™ Strong Authentication The First Line of Defense infected with malware that intercepts your text messages.

Add to Reading List

Source URL: www.wwpass.com

Language: English - Date: 2015-01-20 15:27:18
    923Windows 10 and the Anti-malware Ecosystem Dennis Batchelder Director, Antimalware strategy

    Windows 10 and the Anti-malware Ecosystem Dennis Batchelder Director, Antimalware strategy

    Add to Reading List

    Source URL: www.virusbtn.com

    Language: English
      924A large number of servers by HFS are exploited to spread malware  A LARGE NUMBER OF SERVERS BY HFS ARE EXPLOITED TO SPREAD MALWARE Antiy CERT

      A large number of servers by HFS are exploited to spread malware A LARGE NUMBER OF SERVERS BY HFS ARE EXPLOITED TO SPREAD MALWARE Antiy CERT

      Add to Reading List

      Source URL: www.antiy.net

      Language: English - Date: 2015-09-17 23:17:15
        925Report  McAfee Labs Threats Report August 2015

        Report McAfee Labs Threats Report August 2015

        Add to Reading List

        Source URL: www.mcafee.com

        Language: English - Date: 2015-08-28 16:54:27
        926Fileless Malware: An Evolving Threat on the Horizon By: Ian Muller, Senior Security Writer Yonatan Striem-Amit, CTO

        Fileless Malware: An Evolving Threat on the Horizon By: Ian Muller, Senior Security Writer Yonatan Striem-Amit, CTO

        Add to Reading List

        Source URL: go.cybereason.com

        Language: English - Date: 2016-02-18 23:46:57
          927Economics of Malware: Epidemic Risk Model, Network Externalities and Incentives. Marc Lelarge (INRIA-ENS) WEIS, University College London, June 2009.

          Economics of Malware: Epidemic Risk Model, Network Externalities and Incentives. Marc Lelarge (INRIA-ENS) WEIS, University College London, June 2009.

          Add to Reading List

          Source URL: weis09.infosecon.net

          Language: English - Date: 2013-09-01 23:23:37
            928Rage Against The Virtual Machine: Hindering Dynamic Analysis of Android Malware Thanasis Petsas, Giannis Voyatzis, Elias Athanasopoulos, Sotiris Ioannidis,

            Rage Against The Virtual Machine: Hindering Dynamic Analysis of Android Malware Thanasis Petsas, Giannis Voyatzis, Elias Athanasopoulos, Sotiris Ioannidis,

            Add to Reading List

            Source URL: www.syssec-project.eu

            Language: English - Date: 2014-07-07 09:14:35
              929Rage Against the Virtual Machine: Hindering Dynamic Analysis of Android Malware Thanasis Petsas,* Giannis Voyatzis,* Elias Athanasopoulos,* Michalis Polychronakis,† Sotiris Ioannidis* *

              Rage Against the Virtual Machine: Hindering Dynamic Analysis of Android Malware Thanasis Petsas,* Giannis Voyatzis,* Elias Athanasopoulos,* Michalis Polychronakis,† Sotiris Ioannidis* *

              Add to Reading List

              Source URL: users.ics.forth.gr

              Language: English - Date: 2014-04-24 09:36:10
                930New advances in Ms Office malware analysis

                New advances in Ms Office malware analysis

                Add to Reading List

                Source URL: archive.hack.lu

                Language: English - Date: 2009-10-31 16:26:07