Mobile Malware

Results: 423



#Item
61Technology / Mobile apps / Malware / Android / Mobile application development / Application software / App Store / IOS / Ovi / Smartphones / Computing / Software

Mobile Application Monitoring Mobile computing is exploding globally. Internet access via smartphones and tablets is expected to dwarf all other access methods within a few years, potentially putting more than half the w

Add to Reading List

Source URL: info.cyveillance.com

Language: English - Date: 2015-07-18 11:22:15
62

Poster: StuxMob: A Situational-Aware Malware for Targeted Attack on Smart Mobile Devices Shams Zawoad (Student) University of Alabama at Birmingham

Add to Reading List

Source URL: www.ieee-security.org

- Date: 2013-05-17 10:01:50
    63

    January 2015 Feature Article: Mobile Malware: Should I Keep Taking The Tablets? Table of Contents Mobile Malware: Should I Keep Taking The Tablets? .......................................................................

    Add to Reading List

    Source URL: www.virus-radar.com

    Language: English - Date: 2015-03-17 04:49:56
      64Computing / Smartphones / Embedded Linux / Computer security / Malware / Sandbox / Dalvik / Mobile operating system / Antivirus software / Software / System software / Android

      Enter Sandbox: Android Sandbox Comparison Sebastian Neuner∗ , Victor van der Veen† , Martina Lindorfer‡ , Markus Huber∗ , Georg Merzdovnik∗ , Martin Mulazzani∗ and Edgar Weippl∗ ∗ SBA Research

      Add to Reading List

      Source URL: www.mostconf.org

      Language: English - Date: 2014-07-18 15:43:17
      65Technology / IOS jailbreaking / Android / Mobile device management / IPhone / IOS / Privilege escalation / Mobile operating system / Malware / Computing / Smartphones / Software

      Practical Attacks against Mobile Device Management (MDM) Solutions Michael Shaulov, CEO and co-founder, Lacoon Mobile Security Daniel Brodie, Sr. Security Researcher, Lacoon Mobile Security danielb@lac

      Add to Reading List

      Source URL: media.blackhat.com

      Language: English - Date: 2013-07-31 03:53:44
      66Peer-to-peer / Internet / Email / Spamming / Computer network security / Computing / Malware

      THREAT DATASHEET Mobile Threats | NotCompatible.C | Research by Tim Strazzere NOTCOMPATIBLE.C A Sophisticated Mobile Threat that

      Add to Reading List

      Source URL: www.lookout.com

      Language: English - Date: 2015-06-17 19:35:01
      67Spamming / Botnets / Denial-of-service attacks / Internet Relay Chat / Android Cloud to Device Messaging Service / Denial-of-service attack / Push technology / Malware / Windows Mobile / Computing / Computer network security / Multi-agent systems

      Cloud-based Push-Styled Mobile Botnets: A Case Study of Exploiting the Cloud to Device Messaging Service Shuang Zhao Patrick P.C. Lee John C.S. Lui Xiaohong Guan Xiaobo Ma Jing Tao

      Add to Reading List

      Source URL: www.cs.cuhk.hk

      Language: English - Date: 2012-08-15 23:52:07
      68Computer architecture / Android / Antivirus software / Embedded Linux / Cloud clients / Android Market / Malware / Microsoft Security Essentials / Mobile virus / Software / Smartphones / Computing

      On Lightweight Mobile Phone Application Certification∗ † William Enck, Machigar Ongtang, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The

      Add to Reading List

      Source URL: www.enck.org

      Language: English
      69Smartphones / Electronics / Mobile telecommunications / Mobile operating system / Malware / Mobile phone / Mobile device / Mobile / Android / Technology / Computing / Information appliances

      Lecture 32: Security Vulnerabilities of Mobile Devices Lecture Notes on “Computer and Network Security” by Avi Kak () April 24, :47am c

      Add to Reading List

      Source URL: engineering.purdue.edu

      Language: English - Date: 2015-04-24 10:53:50
      70Dialer / Malware / Pager / Auto dialer / Ethernet over twisted pair / SMS / Technology / Mobile technology / Radio paging

      DATA SHEET INPUT GUARDTM MODELS VM606 AND VM606E EIGHT CHANNEL INPUT MONITOR AND AUTODIALER General Description The Input Guard is a complete eight channel input

      Add to Reading List

      Source URL: www.temperatureguard.com

      Language: English - Date: 2013-05-24 10:07:26
      UPDATE