Malware research

Results: 246



#Item
141Cryptographic hash functions / SHA-1 / Phishing / Pawn / Email / Malware / Outline of chess / Budapest Gambit / Games / Chess / Spamming

A Trend Micro Research Paper Operation Pawn Storm Using Decoys to Evade Detection Loucif Kharouni

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2014-10-26 23:30:05
142Computer architecture / Cloud clients / Android / Mobile operating system / IPhone / IOS jailbreaking / Tru / IOS / Malware / Software / Computing / Smartphones

Information Security Updates Mobile Security – Best Practices for General User ccording to research figures from Business Intelligence1, the number of smartphones sold worldwide has already

Add to Reading List

Source URL: www.istf.jucc.edu.hk

Language: English - Date: 2014-12-08 20:07:16
143Bahrain / Asia / Malware / World Wide Web

Research Brief Number 15 – March 2013 The Citizen Lab You Only Click Twice:

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2013-07-31 11:39:22
144

Finding Malware on a Web Scale Ben Livshits Ben Zorn Christian Seifert Charlie Curtsinger

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2012-01-20 16:22:16
    145Computer security / McAfee / Phishing / Social engineering / Spamming / Malware / Email / Computer insecurity / Threat / Cybercrime / Computer crimes / Computing

    Executive Summary Hacking the Human Operating System Raj Samani, EMEA CTO Charles McFarland, Senior MTIS Research Engineer

    Add to Reading List

    Source URL: www.mcafee.com

    Language: English - Date: 2015-02-17 17:56:53
    146Antivirus software / Hacking / McAfee / Backup software / Norton 360 / Vulnerability / Fortinet / Malware / Software bug / Software / Computing / Computer security

    Exploring in the Wild: A Big Data Approach to Application Security Research (and Exploit Detection) Haifei Li, Chong Xu,

    Add to Reading List

    Source URL: cansecwest.com

    Language: English - Date: 2014-03-19 04:38:18
    147Computer network security / Crime prevention / National security / Public safety / Malware / Computer insecurity / Attack / International Multilateral Partnership Against Cyber Threats / Information security / Security / Computer security / Cyberwarfare

    Tackling Attack Detection and Incident Response Research and Analysis by Intel Security and ESG By Jon Oltsik, Senior Principal Analyst

    Add to Reading List

    Source URL: www.mcafee.com

    Language: English - Date: 2015-04-09 16:30:39
    148Arabic romanization / Computing / System software / Software / Arabic alphabets / Computer configuration / Environment variable

    Research Brief December 2014 The Citizen Lab Malware Attacks Targeting Syrian ISIS Critics

    Add to Reading List

    Source URL: citizenlab.org

    Language: English - Date: 2015-03-17 14:18:19
    149Windows / Computer architecture / Malware / Email / Computing

    Research Brief February 2013 The Citizen Lab APT1’s GLASSES: Watching a Human Rights Organization

    Add to Reading List

    Source URL: citizenlab.org

    Language: English - Date: 2015-03-18 16:54:40
    UPDATE