<--- Back to Details
First PageDocument Content
Phishing / Social engineering / Torpig / Crimeware / Password / Form grabbing / Credit card / 99942 Apophis / Cybercrime / Malware / Spamming
Date: 2008-02-01 18:58:57
Phishing
Social engineering
Torpig
Crimeware
Password
Form grabbing
Credit card
99942 Apophis
Cybercrime
Malware
Spamming

Counter-Intelligence Against the Quickest Adversary Lance James Numbers

Add to Reading List

Source URL: www.antispywarecoalition.org

Download Document from Source Website

File Size: 3,75 MB

Share Document on Facebook

Similar Documents

Botnets / Computing / Computer network security / Multi-agent systems / Spamming / Malware / Cyberwarfare / Torpig / Srizbi botnet / Command and control / Festi / Fast flux

Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of California

DocID: 1l2Sv - View Document

Microsoft Word - iDefense_RRT_Torpig_20070703.doc

DocID: 1jMKO - View Document

X86 architecture / UPX / Computing / MOV / Assembly languages / CPUID / Computer architecture / Software / X86 instructions

The Torpig/Anserin/Sinowal family of Trojans detect virtual machine monitors and abort infection when present

DocID: 19NoP - View Document

Multi-agent systems / Spamming / Cyberwarfare / Storm botnet / Storm Worm / Zombie / Waledac botnet / Torpig / Zeus / Computer network security / Computing / Botnets

– Survey and Taxonomy of Botnet Research through Life-cycle ´ RAFAEL A. RODR´IGUEZ-GOMEZ , University of Granada ´

DocID: 17AJO - View Document

Multi-agent systems / Spamming / Cyberwarfare / Malware / Zeus / Zombie / Torpig / Conficker / Denial-of-service attack / Computer network security / Computing / Botnets

Microsoft PowerPoint - botnet_detection2009.ppt

DocID: 11hlY - View Document