Mobile malware

Results: 423



#Item
61Mobile Application Monitoring Mobile computing is exploding globally. Internet access via smartphones and tablets is expected to dwarf all other access methods within a few years, potentially putting more than half the w

Mobile Application Monitoring Mobile computing is exploding globally. Internet access via smartphones and tablets is expected to dwarf all other access methods within a few years, potentially putting more than half the w

Add to Reading List

Source URL: info.cyveillance.com

Language: English - Date: 2015-07-18 11:22:15
62Poster: StuxMob: A Situational-Aware Malware for Targeted Attack on Smart Mobile Devices Shams Zawoad (Student)  University of Alabama at Birmingham

Poster: StuxMob: A Situational-Aware Malware for Targeted Attack on Smart Mobile Devices Shams Zawoad (Student) University of Alabama at Birmingham

Add to Reading List

Source URL: www.ieee-security.org

- Date: 2013-05-17 10:01:50
    63January 2015 Feature Article: Mobile Malware: Should I Keep Taking The Tablets? Table of Contents Mobile Malware: Should I Keep Taking The Tablets? .......................................................................

    January 2015 Feature Article: Mobile Malware: Should I Keep Taking The Tablets? Table of Contents Mobile Malware: Should I Keep Taking The Tablets? .......................................................................

    Add to Reading List

    Source URL: www.virus-radar.com

    Language: English - Date: 2015-03-17 04:49:56
      64Enter Sandbox: Android Sandbox Comparison Sebastian Neuner∗ , Victor van der Veen† , Martina Lindorfer‡ , Markus Huber∗ , Georg Merzdovnik∗ , Martin Mulazzani∗ and Edgar Weippl∗ ∗ SBA  Research

      Enter Sandbox: Android Sandbox Comparison Sebastian Neuner∗ , Victor van der Veen† , Martina Lindorfer‡ , Markus Huber∗ , Georg Merzdovnik∗ , Martin Mulazzani∗ and Edgar Weippl∗ ∗ SBA Research

      Add to Reading List

      Source URL: www.mostconf.org

      Language: English - Date: 2014-07-18 15:43:17
      65Practical Attacks against Mobile Device Management (MDM) Solutions Michael Shaulov, CEO and co-founder, Lacoon Mobile Security  Daniel Brodie, Sr. Security Researcher, Lacoon Mobile Security danielb@lac

      Practical Attacks against Mobile Device Management (MDM) Solutions Michael Shaulov, CEO and co-founder, Lacoon Mobile Security Daniel Brodie, Sr. Security Researcher, Lacoon Mobile Security danielb@lac

      Add to Reading List

      Source URL: media.blackhat.com

      Language: English - Date: 2013-07-31 03:53:44
      66THREAT DATASHEET  Mobile Threats | NotCompatible.C | Research by Tim Strazzere NOTCOMPATIBLE.C A Sophisticated Mobile Threat that

      THREAT DATASHEET Mobile Threats | NotCompatible.C | Research by Tim Strazzere NOTCOMPATIBLE.C A Sophisticated Mobile Threat that

      Add to Reading List

      Source URL: www.lookout.com

      Language: English - Date: 2015-06-17 19:35:01
      67Cloud-based Push-Styled Mobile Botnets: A Case Study of Exploiting the Cloud to Device Messaging Service Shuang Zhao Patrick P.C. Lee John C.S. Lui Xiaohong Guan Xiaobo Ma Jing Tao

      Cloud-based Push-Styled Mobile Botnets: A Case Study of Exploiting the Cloud to Device Messaging Service Shuang Zhao Patrick P.C. Lee John C.S. Lui Xiaohong Guan Xiaobo Ma Jing Tao

      Add to Reading List

      Source URL: www.cs.cuhk.hk

      Language: English - Date: 2012-08-15 23:52:07
      68On Lightweight Mobile Phone Application Certification∗ † William Enck, Machigar Ongtang, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The

      On Lightweight Mobile Phone Application Certification∗ † William Enck, Machigar Ongtang, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The

      Add to Reading List

      Source URL: www.enck.org

      Language: English
      69Lecture 32: Security Vulnerabilities of Mobile Devices Lecture Notes on “Computer and Network Security” by Avi Kak () April 24, :47am c

      Lecture 32: Security Vulnerabilities of Mobile Devices Lecture Notes on “Computer and Network Security” by Avi Kak () April 24, :47am c

      Add to Reading List

      Source URL: engineering.purdue.edu

      Language: English - Date: 2015-04-24 10:53:50
      70DATA SHEET INPUT GUARDTM MODELS VM606 AND VM606E EIGHT CHANNEL INPUT MONITOR AND AUTODIALER General Description The Input Guard is a complete eight channel input

      DATA SHEET INPUT GUARDTM MODELS VM606 AND VM606E EIGHT CHANNEL INPUT MONITOR AND AUTODIALER General Description The Input Guard is a complete eight channel input

      Add to Reading List

      Source URL: www.temperatureguard.com

      Language: English - Date: 2013-05-24 10:07:26