The Trojan Horse

Results: 88



#Item
41Cyberwarfare / Hacking / Hackers: Heroes of the Computer Revolution / Hacker / Advanced persistent threat / Malware / Trojan horse / Trend Micro / Computing / Cybercrime / Computer crimes

Peter the Great vs Sun Tzu - A Trend Micro Opinion Paper

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2013-03-12 23:50:27
42Espionage / Computer network security / Antivirus software / Trojan horse / Computer worm / Botnet / Computer virus / Spyware / Rootkit / Malware / System software / Cyberwarfare

DSTI/ICCP/REG[removed]FINAL FOREWORD Addressed primarily to policy makers, this report has been developed in the course of 2007, by the OECD Working Party on Information Security and Privacy (WPISP) in partnership with t

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-21 04:20:17
43Cybercrime / Social engineering / Email / Electronic commerce / Computer crimes / Phishing / Malware / Email spam / Trojan horse / Internet / Computing / Spamming

Security News Digest December 09, 2014 ‘Tis the Season for Fraud – Stay Safe Online and In Person Go to the Information Security Awareness page for the December Quiz and More. Data Loss Up 400%, Businesses Remain Un

Add to Reading List

Source URL: www.cio.gov.bc.ca

Language: English - Date: 2014-12-10 11:26:07
44Computer network security / Multi-agent systems / Spamming / Computer security / Malware / Network performance / Zeus / Proxy server / Trojan horse / Computing / Internet / Botnets

WHITE PAPER Hesperbot—A new, advanced banking Trojan in the wild By:

Add to Reading List

Source URL: static5.esetstatic.com

Language: English - Date: 2013-11-08 13:33:57
45Antivirus software / Rogue software / Cloud clients / Google Chrome / Portable software / Spyware / Trojan horse / Control key / Computer virus / Software / System software / Malware

VOLUME 5 | ISSUE 1 | 2013 Malicious Software And Your Business Malicious software, or “malware”, costs businesses around the world billions every year.

Add to Reading List

Source URL: www.accsyssolutions.com

Language: English - Date: 2013-11-21 15:36:31
46Internet / Malware / Proxy server / Windows / Keystroke logging / Trojan horse / Cache / World Wide Web / Spyware / Computing / Espionage

POINT OF SALE MALWARE: THE FULL STORY OF THE BACKOFF TROJAN OPERATION December 2014 RSA® Research Group

Add to Reading List

Source URL: blogs.rsa.com

Language: English - Date: 2014-12-22 11:04:24
47Computer network security / Cyberwarfare / Multi-agent systems / Spamming / Rootkits / Zeus / Malware / Trojan horse / Trusteer / Computing / Botnets / Computer security

C-SAWR 021 [Extract] This is an extract of the Cyber-security Information Sharing Partnership (CiSP) Situational Awareness Weekly Report (C-SAWR). CiSP members automatically receive access to the full product as well as

Add to Reading List

Source URL: www.cert.gov.uk

Language: English - Date: 2014-06-20 03:51:09
48Cyberwarfare / Rogue software / Spyware / Social engineering / Dasient / StopBadware / Trojan horse / Computer worm / Microsoft Security Essentials / Espionage / System software / Malware

A Broader Look at Web-Based Malware: Mapping the Threat to Better Fight It The Chain of Trust Initiative May 2010

Add to Reading List

Source URL: www.stopbadware.org

Language: English - Date: 2014-12-04 14:30:00
49Computing / Malware / Norton AntiVirus / Symantec / Internet privacy / Webcam / Trojan horse / Microsoft Security Essentials / Antivirus software / System software / Software

Security News Digest November 25, 2014 Have you tried our November Security Awareness Quiz? “Security – Making It Real” Go to the Information Security Awareness page for the Quiz and More.

Add to Reading List

Source URL: www.cio.gov.bc.ca

Language: English - Date: 2014-11-26 12:14:10
50Antivirus software / Spyware / Computer virus / Computer worm / Rogue software / Trojan horse / Macro virus / Back Orifice / Linux malware / System software / Malware / Software

From AntiVirus to AntiMalware Software and Beyond: Another Approach to the Protection of Customers from Dysfunctional System Behaviour Dr. Klaus Brunnstein Professor for Appplication of Informatics Faculty for Informatic

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
UPDATE