Malware analysis

Results: 349



#Item
211Cyberwarfare / Multi-agent systems / Computer security / Denial-of-service attacks / Botnet / Malware / Conficker / Denial-of-service attack / Computer worm / Computer network security / Spamming / Computing

2-3 n  icter Report —Transition Analysis of Cyber Attacks Based on Long-term Observation— NAKAZATO Junji and OHTAKA Kazuhiro

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 21:04:32
212Computer programming / Computer virus / Eval / Virus / Anonymous function / Variable / Mutator method / String / Malware / Computing / Software engineering / Data types

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS 1 READ THE TRANSCRIPT Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2013-06-03 16:19:55
213Antivirus software / Microsoft Windows / AutoRun / Computer security / Windows Registry / Computer virus / Environment variable / RC4 / Spyware / System software / Software / Computing

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS 2 FANS LIKE PRO, TOO Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2013-10-02 18:57:06
214Computing / COM file / Malware / Jerusalem / Simile / System software / Software / Computer virus

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS 1 Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 16:13:20
215Computer virus / Dynamic-link library / Portable Executable / COM file / Windows Vista / Simile / Portable Executable Automatic Protection / Computing / System software / Software

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS PRESCRIPTION MEDICINE Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 17:18:26
216Computer network security / Multi-agent systems / Botnets / Malware / Computer virus / Svchost.exe / Spam / Email spam / Antivirus software / Computing / Spamming / Internet

Pushdo / Cutwail - An Indepth Analysis

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2012-03-06 22:13:46
217Computer file formats / Cyberwarfare / Graphics file formats / Archive formats / File shortcut / Stuxnet / Windows Explorer / Computer file / File format / System software / Computing / Software

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS 1 THE MISSING LNK LNK LAYER

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 17:18:26
218Computer virus / COM file / Dynamic-link library / 4K / Portable Executable / Executable / Simile / Computing / System software / Software

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS 3 When we think of decoding, we think of a block of encoded data, and a decoder. There are multiple ways to hide the

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2012-09-02 23:35:52
219Security / Antivirus software / Malware / Rootkit / Computer virus / Attack / Cyberwarfare / Computer network security / Computer security

Datasheet Bromium LAVA Live Attack Visualization and Analysis Key Benefits STRATEGIC INTELLIGENCE

Add to Reading List

Source URL: www.bromium.com

Language: English - Date: 2015-04-01 16:51:58
220Nimda / Sircam / Simple Mail Transfer Protocol / Windows Registry / Computer worms / Here you have / Sobig / Malware / System software / Email

8 • VIRUS BULLETIN FEBRUARY[removed]VIRUS ANALYSIS 3 Bad Transfer Peter Ferrie and Péter Ször Symantec Security Response, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 16:13:20
UPDATE