<--- Back to Details
First PageDocument Content
World Wide Web / Computer network security / Multi-agent systems / Web 2.0 / Social engineering / Botnet / Malware / Phishing / Zynga / Computing / Spamming / Software
Date: 2013-02-12 13:00:54
World Wide Web
Computer network security
Multi-agent systems
Web 2.0
Social engineering
Botnet
Malware
Phishing
Zynga
Computing
Spamming
Software

‘PokerAgent’ Stealing overFacebook Credentials PokerAgent

Add to Reading List

Source URL: www.welivesecurity.com

Download Document from Source Website

File Size: 1,21 MB

Share Document on Facebook

Similar Documents

Computer network security / Computing / Security engineering / Computer security / Cyberwarfare / Cybercrime / Spamming / Multi-agent systems / Botnet / Complex event processing / Zeek / Blacklist

POSTER: BotFlex: A Community-driven Tool for Botnet Detection Sheharbano Khattak Independent Researcher

DocID: 1xW2K - View Document

Botnets / Cybercrime / Computing / Cyberwarfare / Torpig / Srizbi botnet / Festi / Fast flux / Domain generation algorithm / Bot herder / The Spamhaus Project / Conficker

Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of California

DocID: 1xVzK - View Document

Computer network security / Computing / Cyberwarfare / Multi-agent systems / Spamming / Cybercrime / Botnet / Influence diagram / Bayesian network / Computer security

Poster: Bottleneck: A Generalized, Flexible, and Extensible Framework for Botnet Defense Naurin Rasheed Ramay∗ , Sheharbano Khattak† , Affan A. Syed‡ Syed Ali Khayam§

DocID: 1xUUW - View Document

Botnets / Cybercrime / Computing / Cyberwarfare / Denial-of-service attacks / Linux malware / Computer network security / Mirai / BASHLITE / Internet of things / TR-069 / Denial-of-service attack

Understanding the Mirai Botnet Manos Antonakakis⇧ Tim April‡ Michael Bailey† Matthew Bernhard/ Elie Bursztein Jaime Cochran. Zakir Durumeric/ J. Alex Halderman/ Luca Invernizzi Michalis Kallitsis§ Deepak Kumar†

DocID: 1xUSE - View Document

Concurrent computing / Computer network security / Multi-agent systems / Spamming / Computing / Cybercrime / Distributed computing / Malware / Botnet / Peer-to-peer / Social peer-to-peer processes

Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

DocID: 1xUGX - View Document