Linux malware

Results: 177



#Item
161Report  Cyber risk report 2013  Report | HP 2013 cyber risk report

Report Cyber risk report 2013 Report | HP 2013 cyber risk report

Add to Reading List

Source URL: i.cdn.turner.com

Language: English - Date: 2014-06-11 10:28:15
162Attachment[removed]Computer Virus Reported (1) General Overview for the Year 2012 The number of the cases reported for computer viruses*1 for the year 2012 has decreased from the number for the year[removed]see Figure 1-1).

Attachment[removed]Computer Virus Reported (1) General Overview for the Year 2012 The number of the cases reported for computer viruses*1 for the year 2012 has decreased from the number for the year[removed]see Figure 1-1).

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2014-03-30 23:24:34
163Attachment 1  1.Computer Virus Reported (1) Summary for this Quarter The number of the cases reported for viruses*1 in the third quarter of 2012 decreased from that of the second quarter of[removed]See Figure[removed]By vi

Attachment 1 1.Computer Virus Reported (1) Summary for this Quarter The number of the cases reported for viruses*1 in the third quarter of 2012 decreased from that of the second quarter of[removed]See Figure[removed]By vi

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2014-03-30 23:24:34
164TrendLabs 2012 Mobile Threat and Security Roundup  Repeating History The Mobile Threat Landscape............................................................ 2 There was a significant increase in malicious and high-risk

TrendLabs 2012 Mobile Threat and Security Roundup Repeating History The Mobile Threat Landscape............................................................ 2 There was a significant increase in malicious and high-risk

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2013-01-22 01:11:26
165Sound and Precise Malware Analysis for Android via Pushdown Reachability and Entry-Point Saturation Shuying Liang, Andrew W. Keep, Matthew Might, Steven Lyde, Thomas Gilray, and Petey Aldous University of Utah

Sound and Precise Malware Analysis for Android via Pushdown Reachability and Entry-Point Saturation Shuying Liang, Andrew W. Keep, Matthew Might, Steven Lyde, Thomas Gilray, and Petey Aldous University of Utah

Add to Reading List

Source URL: matt.might.net

Language: English - Date: 2014-03-23 14:11:52
166Professional Information Security Association  MAR-2014 PISA Journal

Professional Information Security Association MAR-2014 PISA Journal

Add to Reading List

Source URL: www.pisa.org.hk

Language: English - Date: 2014-04-01 13:38:52
167Microsoft Word - AMTSO Guidelines on Mobile.docx

Microsoft Word - AMTSO Guidelines on Mobile.docx

Add to Reading List

Source URL: www.amtso.org

Language: English - Date: 2014-02-21 14:47:24
168Microsoft Word - AMTSO Guidelines on Mobile.docx

Microsoft Word - AMTSO Guidelines on Mobile.docx

Add to Reading List

Source URL: www.amtso.org

Language: English - Date: 2014-02-21 14:47:24
169STOPZILLA MOBILE The Ultimate Protection Against Mobile Malware and Viruses  KEY BENEFITS

STOPZILLA MOBILE The Ultimate Protection Against Mobile Malware and Viruses KEY BENEFITS

Add to Reading List

Source URL: www.stopzilla.com

Language: English - Date: 2013-07-26 13:29:38
170Google Android: A State-of-the-Art Review of Security Mechanisms Asaf Shabtai1,3, Yuval Fledel1,3, Uri Kanonov1,3, Yuval Elovici1,3 and Shlomi Dolev2,3

Google Android: A State-of-the-Art Review of Security Mechanisms Asaf Shabtai1,3, Yuval Fledel1,3, Uri Kanonov1,3, Yuval Elovici1,3 and Shlomi Dolev2,3

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2009-12-27 14:11:10