Mobile Malware

Results: 423



#Item
41Mobile Malware / Mobile security / Malware / DroidKungFu / Android / Botnet / GingerMaster / Google Play / Norton / Computer virus / Lookout / Antivirus software

Dissecting Android Malware: Characterization and Evolution Yajin Zhou Department of Computer Science North Carolina State University yajin

Add to Reading List

Source URL: yajin.org

Language: English
42Check Point / Deep packet inspection / Server appliance / Mobile device management / Computer security / Malware / Zscaler / Trusteer

Samsung_Research_America2줄_기본형

Add to Reading List

Source URL: www.compugraf.com.br

Language: English - Date: 2016-05-13 14:45:31
43Crime prevention / National security / Cyberwarfare / Computer network security / Malware / Computer security / Mobile security

MAIK MORGENSTERN / CTO AV-TEST AVAR CONFRENCE 2015 YOU ARE THE TARGET IN THE IOT

Add to Reading List

Source URL: www.av-test.org

Language: English - Date: 2016-04-18 07:40:14
44Smartphones / ITunes / IOS / Computer security / Mobile security / Arxan Technologies / Android / IOS jailbreaking / Mobile app / App store / Malware / IPhone

Table of Contents 7 8 Table of Contents

Add to Reading List

Source URL: www.arxan.com

Language: English - Date: 2016-08-01 23:58:34
45Computing / Computer security / Technology / Content-control software / Webroot / MicroAge / Malware / Intel / Internet of things

WEBROOT CUSTOMER CASE STUDY » MICROAGE MicroAge Partners with Webroot to Deliver Cloud-based Mobile Security BACKGROUND

Add to Reading List

Source URL: webroot-cms-cdn.s3.amazonaws.com

Language: English - Date: 2016-02-25 11:51:21
46Security / Cyberwarfare / Computer security / National security / Crime prevention / Computer network security / Hacking / Malware / Vulnerability / Kill chain / Mobile malware / Mobile security

Mobile Exploit Intelligence Project   Dan  Guido,  Trail  of  Bits   Mike  Arpaia,  iSEC  Partners     Blackberry,    

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
47Computing / Cyberwarfare / Computer security / Mobile Malware / Malware / Android / Shedun

Mobile Exploit Intelligence Project   Dan  Guido,  Trail  of  Bits   Mike  Arpaia,  iSEC  Partners     ShakaCon,    

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
48

Evaluating the threat of epidemic mobile malware Christian Szongott, Benjamin Henne, Matthew Smith Distributed Computing & Security Group Gottfried Wilhelm Leibniz University of Hannover Email: {szongott,henne,smith}@dcs

Add to Reading List

Source URL: www.dcsec.uni-hannover.de

Language: English - Date: 2012-10-22 10:03:52
    49Smartphones / Alphabet Inc. / Android / Advertising / IOS / Online advertising / Google Play / Targeted advertising / Rooting / Software widget / Mobile malware / IPhone

    AdDroid: Privilege Separation for Applications and Advertisers in Android Paul Pearce, Adrienne Porter Felt Computer Science Division University of California Berkeley

    Add to Reading List

    Source URL: www.cs.berkeley.edu

    Language: English - Date: 2014-02-17 17:32:41
    50Computing / Technology / Mobile technology / Text messaging / Cloud clients / Short Message Service / Malware / Android / Computer virus / Transaction authentication number

    Compact Explanation of Why Malware is Bad Speaker: Wei Chen1 Joint Work with Charles Sutton1 , David Aspinall1 , Andrew D. Gordon1,2 , Igor Muttik3 , and Qi Shen4 App Guarden Project

    Add to Reading List

    Source URL: www.ai4fm.org

    Language: English - Date: 2015-09-02 07:29:35
    UPDATE