Malware research

Results: 246



#Item
131Computer virus / Malware / Targeted threat / Tibetan Uprising Day

Research Brief March 2015 The Citizen Lab Tibetan Uprising Day Malware Attacks

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2015-03-17 14:13:43
132Computer architecture / Android software development / Android / Mobile operating system / Malware / Symbian / Linear temporal logic / Motorola Droid / Smartphones / Software / Computing

Runtime Verification meets Android Security Andreas Bauer1,2 , Jan-Christoph K¨uster1,2 , and Gil Vegliach1 1 NICTA Software Systems Research Group · 2 The Australian National University

Add to Reading List

Source URL: www.immerundewig.at

Language: English - Date: 2012-01-30 19:46:28
133Fairfax County /  Virginia / Steganography / Research In Motion / Canada / S&P/TSX Composite Index / Malware / Economy of Canada

10400 Eaton Place, Suite 450 ● Fairfax, VA[removed] ● tel: 866-HQ Allen[removed]) ● fax: [removed]FOR IMMEDIATE RELEASE JANUARY 8, 2007

Add to Reading List

Source URL: www.wetstonetech.com

Language: English - Date: 2010-09-02 14:45:21
134Computer security / McAfee / Phishing / Social engineering / Spamming / Malware / Email / Computer insecurity / Threat / Cybercrime / Computer crimes / Computing

Executive Summary Hacking the Human Operating System Raj Samani, EMEA CTO Charles McFarland, Senior MTIS Research Engineer

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-02-17 17:56:53
135Computing / Base / Computer programming / JavaScript / Value at risk / Constructor / Software engineering / Cross-platform software / Scripting languages

Zozzle: Finding Malware on a Web Scale Ben Livshits Microsoft Research Redmond, WA

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2011-09-01 18:38:16
136Computer security / McAfee / Phishing / Social engineering / Spamming / Malware / Email / Computer insecurity / Threat / Cybercrime / Computer crimes / Computing

Executive Summary Hacking the Human Operating System Raj Samani, EMEA CTO Charles McFarland, Senior MTIS Research Engineer

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-02-17 17:56:53
137Computer network security / Multi-agent systems / Botnets / Email / Email spam / Anti-spam techniques / Malware / Spam / Asprox botnet / Spamming / Computing / Internet

Trend Micro Incorporated Research Paper 2013 Asprox Reborn

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2013-03-18 06:52:20
138Crime prevention / National security / Human rights / Malware / Cryptography / Computer security / DARPA / Privacy / Science / Ethics / Security / Computer network security

•  Name
of
Organiza.on:
Palo
Alto
Research
Center
(PARC)
 •  Lead
Inves.gator:
Diana
SmeAers
 •  Current
Team
Members:

 –  –  – 

Add to Reading List

Source URL: www.iarpa.gov

Language: English - Date: 2014-03-06 18:49:04
139Espionage / Computer network security / Malware / Spyware / Proxy server / IP address / Internet privacy / Phishing / World Wide Web / Spamming / Computing / Internet

Safe A TARGETED THREAT By: Nart Villeneuve and Kyle Wilhoit Forward-Looking Threat Research Team

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2013-05-19 22:33:15
UPDATE