Malware research

Results: 246



#Item
111Software / Malware / Android Market / SMS / ESET / Android / Text messaging / Computer virus / Premium-rate telephone number / Technology / Smartphones / Mobile technology

Boxer SMS Trojan The first threat of the kind targeting Latin American countries André Goujon / ESET Awareness & Research Specialist / Pablo Ramos / ESET Security Researcher /

Add to Reading List

Source URL: www.welivesecurity.com

Language: English - Date: 2013-02-12 12:54:15
112Security / Webroot Software / Threat / Defense Intelligence Agency / Vulnerability / Central Intelligence Agency / Malware / Computer network security / Cyberwarfare / Computer security

ESG Brief Webroot Delivers Enterprise-Class Threat Intelligence to Security Technology Providers and Large Organizations Date: September 2014 Author: Jon Oltsik, Senior Principal Analyst; Kyle Prigmore, Research Associa

Add to Reading List

Source URL: www.brightcloud.com

Language: English - Date: 2014-09-10 11:07:29
113Crime prevention / Electronic commerce / National security / Secure communication / Malware / Password / FUD / Public safety / Fear /  uncertainty and doubt / Security / Computer network security / Computer security

FUD: a plea for intolerance Dinei Florêncio, Cormac Herley and Adam Shostack Microsoft Corp., Redmond, WA Even a casual observer of computer security must notice the prevalence of FUD: non-falsifiable claims that promot

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2014-05-22 14:45:21
114Cognition / Ethology / Malware / Analysis / Science

Malware Analysis, Software Obfuscation and the Ethics of Large Scale Malware Evaluation SBA Research & Vienna University of Technology Edgar R. Weippl

Add to Reading List

Source URL: www.nii.ac.jp

Language: English - Date: 2014-02-14 02:22:27
115Computer law / Password / Email / Computer Misuse Act / Software / Malware / Information security / Computer literacy / Computing / Internet / Cybercrime

The Open University Student Computing Code of Conduct 1. Our computing resources are provided for educational, training and research purposes. You must not use them for any business or significant personal purposes.

Add to Reading List

Source URL: www.open.ac.uk

Language: English - Date: 2015-03-04 09:35:44
116Battelle Memorial Institute / Electronic warfare / Hacking / Military technology / Military science / United States Cyber Command / Malware / Computer security / Threat / Computer network security / Cyberwarfare / Security

Battelle Cyber Innovations Research Areas Cyber Command and Control Technologies

Add to Reading List

Source URL: www.iarpa.gov

Language: English - Date: 2015-03-09 11:19:44
117Computing / Computer-mediated communication / Anti-spam techniques / Phishing / Web bug / Malware / Attachment theory / Spam / Spamming / Internet / Email

Research Report on IT Security Inoculation FY2009

Add to Reading List

Source URL: www.jpcert.or.jp

Language: English - Date: 2013-05-01 02:40:02
118Computing / Smartphones / Embedded Linux / Computer security / Malware / Sandbox / Dalvik / Mobile operating system / Antivirus software / Software / System software / Android

Enter Sandbox: Android Sandbox Comparison Sebastian Neuner∗ , Victor van der Veen† , Martina Lindorfer‡ , Markus Huber∗ , Georg Merzdovnik∗ , Martin Mulazzani∗ and Edgar Weippl∗ ∗ SBA Research

Add to Reading List

Source URL: mostconf.org

Language: English - Date: 2014-07-18 15:43:17
119Rogue software / Antivirus software / Scareware / Social engineering / Ransomware / Ukash / Voucher / Rogue security software / School voucher / Malware / System software / Education

Trend Micro Incorporated Research Paper 2012 Police Ransomware Update

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2012-11-15 21:39:47
120Cybercrime / Phishing / Denial-of-service attack / Web threat / Malware / Internet security / Penetration test / Prolexic Technologies / Imperva / Computer network security / Cyberwarfare / Computer security

2014 Crucial Cloud Hosting Crucial Research [WEB HOSTING SECURITY 2014]

Add to Reading List

Source URL: www.crucial.com.au

Language: English - Date: 2014-08-23 20:56:38
UPDATE