Mobile malware

Results: 423



#Item
71Antivirus software / Computer network security / Malware / Cyberwarfare / Software / Cloud clients / Threat / Android / Computer virus / Smartphones / Computing / Computer security

AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context Wei Yang∗ , Xusheng Xiao† , Benjamin Andow‡ , Sihan Li∗ , Tao Xie∗ , William Enck‡ ∗ Department of Computer Science, Univ

Add to Reading List

Source URL: www.enck.org

Language: English
72Antivirus software / Cloud computing / Malware / Android Market / Android / Threat / BitDefender / Nexus One / Software / Smartphones / Computing

MAST: Triage for Market-scale Mobile Malware Analysis Saurabh Chakradeo, Bradley Reaves, Patrick Traynor School of Computer Science Georgia Institute of Technology Atlanta, GA, USA

Add to Reading List

Source URL: www.enck.org

Language: English
73Software / Information appliances / Rogue software / Malware / Cloud clients / Mobile security / Antivirus software / Android / Mobile Web / Computing / Smartphones / System software

NQ Mobile’s 2012 Security Report is based on insights from NQ Mobile’s Security Lab, a team of over 250 mobile security professionals, scientists and developers around the world who proactively monitor the mobile lan

Add to Reading List

Source URL: en.nq.com

Language: English - Date: 2013-05-28 17:21:32
74Computing / Android / Malware / Antivirus software / Mobile operating system / App Store / Dalvik / Mobile apps / Sandbox / Software / System software / Smartphones

ANDRUBIS - 1,000,000 Apps Later: A View on Current Android Malware Behaviors Martina Lindorfer* , Matthias Neugschwandtner* , Lukas Weichselbaum* , Yanick Fratantonio+ ,Victor van der Veen† , Christian Platzer* *

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-11-07 13:39:54
75Computer architecture / Android software development / Android / Mobile operating system / Malware / Symbian / Linear temporal logic / Motorola Droid / Smartphones / Software / Computing

Runtime Verification meets Android Security Andreas Bauer1,2 , Jan-Christoph K¨uster1,2 , and Gil Vegliach1 1 NICTA Software Systems Research Group · 2 The Australian National University

Add to Reading List

Source URL: www.gilvegliach.it

Language: English - Date: 2014-02-20 13:15:14
76Software / McAfee VirusScan / Computer security / Malware / Mobile security / Host Based Security System / Microsoft Security Essentials / Antivirus software / McAfee / System software

McAfee_ThreatEffectiveness_Final

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-05-28 11:20:20
77Computer network security / Software / Cloud clients / Software testing / Malware / Mobile application development / IPhone / Rooting / Proprietary software / Computing / Smartphones / Computer security

Android / iPhone Risks and Solutions Part of the Reverse Engineering and Code Modification Prevention OWASP Project

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-01-29 15:31:05
78Security / Network Access Control / Cloud computing / Network security / Unified threat management / Computer network / Malware / Computer security / Mobile data offloading / Computer network security / Computing / Electronic engineering

Microsoft Word - eChallenges2014_paper_final.docx

Add to Reading List

Source URL: security.polito.it

Language: English - Date: 2015-02-17 18:21:59
79Computer architecture / Android software development / Android / Mobile operating system / Malware / Symbian / Linear temporal logic / Motorola Droid / Smartphones / Software / Computing

Runtime Verification meets Android Security Andreas Bauer1,2 , Jan-Christoph K¨uster1,2 , and Gil Vegliach1 1 NICTA Software Systems Research Group · 2 The Australian National University

Add to Reading List

Source URL: kuester.multics.org

Language: English - Date: 2015-05-08 04:15:01
80Espionage / Computer network security / Malware / Lookout Mobile Security / Network security / Spyware / Android / Smartphones / Software / Computing

PDF Document

Add to Reading List

Source URL: www.lookout.com

Language: English - Date: 2015-05-14 19:29:13
UPDATE