Malware analysis

Results: 349



#Item
251Malware / Threat / Espionage / Tibet / Targeted threat / Surveillance / Security / Computer security / Cyberwarfare

EXTENDED ANALYSIS: 2.1 Summary, Methodology, and Data Overview Communities @ Risk

Add to Reading List

Source URL: targetedthreats.net

Language: English - Date: 2014-11-18 13:36:26
252Malware / UPX / Antivirus software / Ransomware / Computer virus / Trojan horse / System software / Software / EXE packers

Public document Malware analysis Rannoh/Matsnu

Add to Reading List

Source URL: www.malware.lu

Language: English - Date: 2014-11-17 10:01:25
253System software / JQuery / Malware / Crimeware / Filename extension / HTTP cookie / COM file / Computer virus / Computing / Software / Ajax

  jQuery.com Drive-by Download Incident Analysis On September 18, 2014 RiskIQ detected modifications to the homepage of

Add to Reading List

Source URL: www.riskiq.com

Language: English - Date: 2014-09-23 20:01:25
254Malware / Ransomware / Advanced Encryption Standard / Antivirus software / Encryption software / ANts P2P / Public-key cryptography / Known-plaintext attack / Cryptography / Cryptographic software / Extortion

Report Understanding Crypto-Ransomware In-Depth Analysis of the Most Popular Malware Families

Add to Reading List

Source URL: www.bromium.com

Language: English - Date: 2014-12-18 20:37:23
255Vulnerability / Failure / Computer security / Cyberwarfare / Malware

Threat Analysis: Blackhole Exploit Kit 2.0 ! ! ! !

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2012-10-11 12:48:09
256Antivirus software / Computer network security / Multi-agent systems / Spamming / Rootkit / Computer virus / Rogue security software / Botnet / Storm botnet / Malware / System software / Software

Threat Analysis: Zero Access Trojan ! ! ! !

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2012-10-11 12:48:11
257Vundo / Botnets / Antivirus software / Social engineering / Rogue software / Computer virus / Browser Helper Object / Zeus / Malware / System software / Trojan horses

Malware Analysis: Trojan Kazy (Ponik and Vundo)      

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-01-28 11:37:07
258McAfee VirusScan / Computing / SHA-1 / MD5 / Malware

Analysis Report (TLP:WHITE) Analysis of a PlugX variant (PlugX version 7.0) Conducted by CIRCL - Computer Incident Response Center Luxembourg Team CIRCL March 29, 2013 Document version: 1.0

Add to Reading List

Source URL: www.circl.lu

Language: English - Date: 2014-03-28 07:10:33
259C programming language / International Obfuscated C Code Contest / Classical cipher / Computer programming / Computing / Software engineering

TLP:WHITE Malware analysis report of a Backdoor.Snifula variant CIRCL - Computer Incident Response Center Luxembourg and National CERT of Luxembourg 41, avenue de la gare, 1611 Luxembourg, Luxembourg⇤ (Dated: [removed]-

Add to Reading List

Source URL: www.circl.lu

Language: English - Date: 2014-03-28 07:10:33
260Cyberwarfare / Antivirus software / Computer worms / Malware / Configuration files / Conficker / AutoRun / ESET NOD32 / Autorun.inf / System software / Software / Computer security

Global Threat Trends – June 2009 Figure 1: The Top Ten Threats for June 2009 at a Glance Analysis of ESET’s ThreatSense.Net®, a sophisticated malware reporting and tracking system, shows that the highest number of d

Add to Reading List

Source URL: www.eset.com

Language: English - Date: 2011-02-28 17:09:52
UPDATE