Malware analysis

Results: 349



#Item
241Privacy policy / Malware / Software / Antivirus software / Cloud clients / Comodo Internet Security / Comodo Group / Computing / Comodo

Comodo Terms of Use Malware and False Positive Scanning and Submission Services IMPORTANT-READ THESE TERMS CAREFULLY BEFORE SUBMITTING FILES TO COMODO FOR MALWARE ANALYSIS OR SCANNING FILES FOR MALWARE ANALYSIS ("SERVICE

Add to Reading List

Source URL: www.comodo.com

Language: English - Date: 2011-11-10 11:53:15
242Spamming / Botnets / Zeus / Malware / Gmail / Computing / Multi-agent systems / Computer network security

AN ANALYSIS OF A BOTNET TOOLKIT AND A FRAMEWORK FOR A DEFAMATION ATTACK T HOMAS O RMEROD A THESIS

Add to Reading List

Source URL: spectrum.library.concordia.ca

Language: English - Date: 2012-09-13 20:42:26
243Malware / Search algorithms / Cryptography / Polymorphic code / Obfuscation / Rootkit / Obfuscated code / Hash table / Computer virus / Computer programming / Computing / Software engineering

Impeding Malware Analysis Using Conditional Code Obfuscation Monirul Sharif1 1 Andrea Lanzi2

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2008-01-28 08:33:00
244Antivirus software / Rogue software / Social engineering / Scareware / Spyware / Rogue security software / Computer virus / Real-time protection / Phishing / Malware / System software / Software

Analysis of Malicious Software Infections

Add to Reading List

Source URL: www.infosecwriters.com

Language: English - Date: 2011-11-29 19:36:00
245Smartphones / Android / Embedded Linux / Virtual machines / Android software development / Google / Mobile application development / QEMU / Antivirus software / Software / Computing / System software

Rage Against the Virtual Machine: Hindering Dynamic Analysis of Android Malware Thanasis Petsas,* Giannis Voyatzis,* Elias Athanasopoulos,* Michalis Polychronakis,† Sotiris Ioannidis* *

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-04-25 08:01:32
246Electronic warfare / Hacking / Military technology / Malware / Cyberwarfare / Computer crimes

THE DIAMOND MODEL FOR INTRUSION ANALYSIS: A PRIMER Andy Pendergast © 2014 Cyber Squared Inc.

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2014-02-21 09:55:47
247Computing / Internet Systems Consortium / Root name server / Domain Name System Security Extensions / Botnet / Malware / Top-level domain / Name server / Domain name system / Internet / Network architecture

OARC Briefing OARC Briefing DNS Operations, Analysis and Research Center

Add to Reading List

Source URL: www.dns-oarc.net

Language: English - Date: 2007-03-21 10:22:28
248Software / Computer virus / Heuristic analysis / Heuristic / Dropper / Polymorphic code / Rootkit / Virus / Computer worm / System software / Malware / Antivirus software

:: Heuristic Analysis— Detecting Unknown Viruses Anti-virus does much more than reactively detect known viruses; it proactively scans for unknown ones too.

Add to Reading List

Source URL: www.eset.com

Language: English - Date: 2011-02-28 17:14:03
249Routing protocols / Internet protocols / Internet standards / Link analysis / Markov models / Border Gateway Protocol / PageRank / Routing / Malware / Internet / Network architecture / Computing

PDF Document

Add to Reading List

Source URL: circl.lu

Language: English - Date: 2014-03-28 07:10:33
250Software / Antivirus software / Computer crimes / Kaspersky Lab / Android / International Cybercrime / Malware / Symbian / Cyberwarfare / Smartphones / Computing / System software

Note on Responsible Distribution of Information This document presents an analysis of the cyber-threat landscape as it relates to Android-based mobile platforms. It is based on information about instances of Kaspersky L

Add to Reading List

Source URL: 25zbkz3k00wn2tp5092n6di7b5k.wpengine.netdna-cdn.com

Language: English - Date: 2014-10-06 02:24:44
UPDATE