First Page | Document Content | |
---|---|---|
Date: 2008-02-01 18:58:57Phishing Social engineering Torpig Crimeware Password Form grabbing Credit card 99942 Apophis Cybercrime Malware Spamming | Counter-Intelligence Against the Quickest Adversary Lance James NumbersAdd to Reading ListSource URL: www.antispywarecoalition.orgDownload Document from Source WebsiteFile Size: 3,75 MBShare Document on Facebook |
Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of CaliforniaDocID: 1l2Sv - View Document | |
Microsoft Word - iDefense_RRT_Torpig_20070703.docDocID: 1jMKO - View Document | |
The Torpig/Anserin/Sinowal family of Trojans detect virtual machine monitors and abort infection when presentDocID: 19NoP - View Document | |
– Survey and Taxonomy of Botnet Research through Life-cycle ´ RAFAEL A. RODR´IGUEZ-GOMEZ , University of Granada ´DocID: 17AJO - View Document | |
Microsoft PowerPoint - botnet_detection2009.pptDocID: 11hlY - View Document |