Malware analysis

Results: 349



#Item
271Software / Event Viewer / Windows / Digital forensics / Malware / Operating system / Microsoft Windows / Computer architecture / Windows NT

AN ANALYSIS OF MICROSOFT EVENT LOGS by Michelle D. Mullinix A Capstone Project Submitted to the Faculty of

Add to Reading List

Source URL: programs.online.utica.edu

Language: English - Date: 2014-03-06 22:46:27
272Apple Inc. / Cloud clients / Embedded Linux / Malware / Android / App Store / Mobile apps / Library / Google / Smartphones / Computing / Software

SECURITY RESPONSE Mobile Adware and Malware Analysis Bartlomiej Uscilowski 

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2013-10-29 07:37:23
273Code Red / Computer virus / Witty / Morris worm / Malware / SQL Slammer / Parasitic worm / Ice / Failure / Computer worms / Cyberwarfare / Computer security

Worm Evolution Tracking via Timing Analysis Moheeb Abu Rajab Fabian Monrose Andreas Terzis Computer Science Department Johns Hopkins University {moheeb,fabian,terzis}@cs.jhu.edu

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2005-12-24 13:57:41
274Sandbox / Software testing / Malware / Password / Syllabus / System software / Software / Forensic Toolkit

Sandboxing for Incident Response Intermediate • Two-Day Instructor-Led Course You’ve responded to the incident on your network. You have collected all of the critical volatile data and performed analysis. During your

Add to Reading List

Source URL: ad-pdf.s3.amazonaws.com

Language: English - Date: 2014-07-11 17:58:47
275Forensic Toolkit / Malware / Syllabus

RAM Analysis for Incident Response Intermediate • Three-Day Instructor-Led Course The analysis of volatile data from a system that has been compromised can provide some of the best artifacts during the course of an inv

Add to Reading List

Source URL: ad-pdf.s3.amazonaws.com

Language: English - Date: 2014-07-11 17:58:47
276Computer network security / Rogue software / Antivirus software / Sunbelt Software / Rogue security software / Counterspy / Spyware / Vulnerability / Threat / Computer security / Malware / Cyberwarfare

Team Cymru Partners with Sunbelt Software to Deliver Advanced Malware Intelligence Sunbelt’s advanced automated malware analysis tools power new service for the cyber security community Clearwater, FL –November 18, 2

Add to Reading List

Source URL: www.team-cymru.org

Language: English - Date: 2010-07-28 10:09:28
277Antivirus software / Computer viruses / Macro virus / Virus / Computer worm / Heuristic analysis / MSAV / System software / Malware / Software

A System Administrator’s Guide to Implementing Various Anti-Virus Mechanisms: What to do When a Virus is Suspected On a Computer Network Robert B. Fried, BS, MS Abstract This paper, presented in the form of sample guid

Add to Reading List

Source URL: www.crime-scene-investigator.net

Language: English - Date: 2003-04-25 20:05:02
278Materials science / Reliability engineering / Software quality / Survival analysis / Malware / Systems science / Backup / Antivirus software / Science / Failure / Systems engineering / Data security

Balancing Network Reliability with Cost InfoPathways, Inc. www.infopathways.com The Never Ending Struggle

Add to Reading List

Source URL: www.infopathways.com

Language: English - Date: 2012-08-20 13:23:51
279Cross-platform software / Web 2.0 / Spamming / Domain name system / Gmail / Ransomware / Domain name / Email / Malware / Computing / Internet / Internet privacy

The "Police Trojan": An In-Depth Analysis

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2012-04-15 22:40:41
UPDATE