Malware analysis

Results: 349



#Item
221Computer network security / Crime prevention / National security / Public safety / Malware / Computer insecurity / Attack / International Multilateral Partnership Against Cyber Threats / Information security / Security / Computer security / Cyberwarfare

Tackling Attack Detection and Incident Response Research and Analysis by Intel Security and ESG By Jon Oltsik, Senior Principal Analyst

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-04-09 16:30:39
222Computer network security / Rogue software / Proprietary software / Browser Helper Object / Internet Explorer / Spyware / Malware / Privacy-invasive software / Mirar Toolbar / Espionage / Software / System software

Dynamic Spyware Analysis Manuel Egele, Christopher Kruegel, Engin Kirda Secure Systems Lab Technical University Vienna {pizzaman,chris,ek}@seclab.tuwien.ac.at Heng Yin

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:29
223Computer file formats / Dynamic-link library / Hooking / XTEA / Tiny Encryption Algorithm / Portable Executable / Library / Computer virus / Malware / Computing / Software / System software

Analysis of Banking Trojan Vawtrak White Paper AVG Technologies, Virus Lab

Add to Reading List

Source URL: now.avg.com

Language: English - Date: 2015-03-24 07:51:14
224Computer network security / Crime prevention / National security / Public safety / Malware / Computer insecurity / Attack / International Multilateral Partnership Against Cyber Threats / Information security / Security / Computer security / Cyberwarfare

Tackling Attack Detection and Incident Response Research and Analysis by Intel Security and ESG By Jon Oltsik, Senior Principal Analyst

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-04-09 16:30:39
225Computer network security / Crime prevention / National security / Public safety / Malware / Computer insecurity / Attack / International Multilateral Partnership Against Cyber Threats / Information security / Security / Computer security / Cyberwarfare

Tackling Attack Detection and Incident Response Research and Analysis by Intel Security and ESG By Jon Oltsik, Senior Principal Analyst

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-04-09 16:30:39
226Computer network security / Crime prevention / National security / Public safety / Malware / Computer insecurity / Attack / International Multilateral Partnership Against Cyber Threats / Information security / Security / Computer security / Cyberwarfare

Tackling Attack Detection and Incident Response Research and Analysis by Intel Security and ESG By Jon Oltsik, Senior Principal Analyst

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-04-09 16:30:39
227Computer security / Malware / Computer network security / Rootkit / Intrusion prevention system / Computer virus / Microsoft Security Essentials / Targeted threat / Crimeware / System software / Antivirus software / Software

F-Secure DeepGuard Proactive on-host protection against new and emerging threats 1. The case for proactive behavioral analysis One of the most demanding challenges security programs have had to address in the last few ye

Add to Reading List

Source URL: www.f-secure.com

Language: English - Date: 2014-08-28 23:24:01
228Malware / Rootkit / Portable Executable / Pin / Trampoline / Subroutine / Application programming interface / Computing / Computer programming / Computer security

Analysis of W32/Regin, stage #1

Add to Reading List

Source URL: www.f-secure.com

Language: English - Date: 2014-12-08 18:38:39
229Malware / Dynamic-link library / Portable Executable / Extensible Storage Engine / Antivirus software / System software / Software / Computing

F-Secure Labs Malware Analysis Report: W64/Regin, Stage #1

Add to Reading List

Source URL: www.f-secure.com

Language: English - Date: 2014-12-08 18:37:32
230Videotelephony / Computer network security / Multi-agent systems / Spamming / Malware / Batch file / Skype / Botnet / Command Prompt / Software / Computing / Scripting languages

CERT.at Technical Report CERT.at Technical Report An  Analysis  of  the  Skype  IMBot  Logic  and  Functionality   Release Date: [removed]Last Updated: [removed], public version 1.2

Add to Reading List

Source URL: www.cert.at

Language: English - Date: 2015-03-06 12:17:44
UPDATE