Malware analysis

Results: 349



#Item
231Computer network security / Espionage / Malware / Computer virus / Heuristic analysis / Computer security / Virtual machine / Spyware / Internet privacy / System software / Antivirus software / Software

Twister Antivirus 8 Technology Author: Filseclab Corporation Website: http://www.filseclab.com Email: [removed] October 8, 2012

Add to Reading List

Source URL: www.filseclab.com

Language: English - Date: 2012-10-11 03:22:28
232Computer security / Malware / Rootkit / Spyware / Computer virus / Clam AntiVirus / Norton AntiVirus / Trend Micro / Cluster analysis / System software / Antivirus software / Software

Automated Classification and Analysis of Internet Malware Michael Bailey,* Jon Oberheide,* Jon Andersen,* Z. Morley Mao,* Farnam Jahanian,*† Jose Nazario † * Electrical Engineering and Computer Science Department

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2007-04-27 10:06:14
233Multi-agent systems / Botnets / Cyberwarfare / Malware / Srizbi botnet / Storm botnet / Torpig / Mebroot / Fast flux / Computing / Spamming / Computer network security

Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Department of Computer S

Add to Reading List

Source URL: www.catonmat.net

Language: English - Date: 2010-04-12 16:52:45
234Computer network security / Spamming / Social engineering / Cybercrime / Malware / Botnet / Trojan horse / Carnegie Mellon University / Software Engineering Institute / Computing / Internet / Cyberwarfare

Artifact Analysis R&D September 5, 2005 © 2005 by Carnegie Mellon University Internet Security

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-21 01:39:54
235Malware / Heuristic analysis / Polymorphic code / Antivirus software / Computer virus / Virus

CHAPTER 1 INTRODUCTION 1.1

Add to Reading List

Source URL: eprints.utm.my

Language: English - Date: 2012-07-03 03:57:07
236C programming language / International Obfuscated C Code Contest / Classical cipher / Computer programming / Computing / Software engineering

TLP:WHITE Malware analysis report of a Backdoor.Snifula variant CIRCL - Computer Incident Response Center Luxembourg and National CERT of Luxembourg 41, avenue de la gare, 1611 Luxembourg, Luxembourg⇤ (Dated: [removed]-

Add to Reading List

Source URL: circl.lu

Language: English - Date: 2014-03-28 07:10:33
237Network security / Computing / Malware / Electronic engineering / Computer network security / Technology / Cisco Career Certifications / Network performance / Cisco Security Monitoring /  Analysis /  and Response System / Cisco Systems / Deep packet inspection / Videotelephony

At-A-Glance Cisco FirePOWER Next-Generation Intrusion Prevention System (NGIPS) Solution Safeguarding your network assets and data from today’s threats isn’t easy. You need detailed visibility into all your network

Add to Reading List

Source URL: www.cisco.com

Language: English
238Malware / Microsoft Office / Microsoft Excel / Software / Shellcode / Microsoft PowerPoint

Microsoft PowerPoint - New advances in Ms Office malware analysis.pptx

Add to Reading List

Source URL: www.reconstructer.org

Language: English - Date: 2010-06-24 04:10:45
239Computer virus / Antivirus software / Malware / Targeted threat

White paper : Multidimensional Analysis of Malware - The Answer to Advanced, Targeted Threats

Add to Reading List

Source URL: sqnetworks.com

Language: English - Date: 2013-05-07 08:33:42
240McAfee VirusScan / Computing / SHA-1 / MD5 / Malware

Analysis Report (TLP:WHITE) Analysis of a PlugX variant (PlugX version 7.0) Conducted by CIRCL - Computer Incident Response Center Luxembourg Team CIRCL March 29, 2013 Document version: 1.0

Add to Reading List

Source URL: circl.lu

Language: English - Date: 2014-03-28 07:10:33
UPDATE