Malware research

Results: 246



#Item
151Computing / MD5 / SHA-2 / Computer virus / Filename extension / SHA-1 / Data / Information / Cryptographic hash functions / Antivirus software / Malware

          Research Brief

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2015-01-17 07:02:56
152Computer network security / Crime prevention / National security / Public safety / Malware / Computer insecurity / Attack / International Multilateral Partnership Against Cyber Threats / Information security / Security / Computer security / Cyberwarfare

Tackling Attack Detection and Incident Response Research and Analysis by Intel Security and ESG By Jon Oltsik, Senior Principal Analyst

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-04-09 16:30:39
153Computer network security / Crime prevention / National security / Public safety / Malware / Computer insecurity / Attack / International Multilateral Partnership Against Cyber Threats / Information security / Security / Computer security / Cyberwarfare

Tackling Attack Detection and Incident Response Research and Analysis by Intel Security and ESG By Jon Oltsik, Senior Principal Analyst

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-04-09 16:30:39
154Computer network security / Crime prevention / National security / Public safety / Malware / Computer insecurity / Attack / International Multilateral Partnership Against Cyber Threats / Information security / Security / Computer security / Cyberwarfare

Tackling Attack Detection and Incident Response Research and Analysis by Intel Security and ESG By Jon Oltsik, Senior Principal Analyst

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-04-09 16:30:39
155Computing / Internet censorship / Psiphon / Citizen Lab / Malware / Google Chrome / Start menu / MD5 / Windows Explorer / Software / System software / University of Toronto

          Research Brief

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2014-11-15 03:46:07
156Computer security / McAfee / Phishing / Social engineering / Spamming / Malware / Email / Computer insecurity / Threat / Cybercrime / Computer crimes / Computing

Executive Summary Hacking the Human Operating System Raj Samani, EMEA CTO Charles McFarland, Senior MTIS Research Engineer

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-02-17 17:56:53
157Spyware / Cyberwarfare / Massachusetts Institute of Technology / Research In Motion / Economy of Canada / Technology / Computer network security / Malware / Rogue software

Information Technology Steering Committee November 9, 2004, 11:00 a.m. Library Conference Room Present: Bill Nass, Karen Rohr, Peg Ferber, Mike Lawrence, Jim Feuerstein, Scott Smith, David, Drollette, Dennis Silva

Add to Reading List

Source URL: www.naz.edu

Language: English - Date: 2012-01-11 09:59:15
158Spyware / Cyberwarfare / Massachusetts Institute of Technology / Research In Motion / Economy of Canada / Technology / Computer network security / Malware / Rogue software

Information Technology Steering Committee November 9, 2004, 11:00 a.m. Library Conference Room Present: Bill Nass, Karen Rohr, Peg Ferber, Mike Lawrence, Jim Feuerstein, Scott Smith, David, Drollette, Dennis Silva

Add to Reading List

Source URL: www.naz.edu

Language: English - Date: 2012-01-11 09:59:15
159Spyware / Cyberwarfare / Massachusetts Institute of Technology / Research In Motion / Economy of Canada / Technology / Computer network security / Malware / Rogue software

Information Technology Steering Committee November 9, 2004, 11:00 a.m. Library Conference Room Present: Bill Nass, Karen Rohr, Peg Ferber, Mike Lawrence, Jim Feuerstein, Scott Smith, David, Drollette, Dennis Silva

Add to Reading List

Source URL: www.naz.edu

Language: English - Date: 2012-01-11 09:59:15
160Security / Intrusion detection system / Anomaly detection / Anomaly-based intrusion detection system / Snort / Network intrusion detection system / Burglar alarm / Network security / Malware / Computer network security / System software / Software

CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection DAY, David and FLORES, Denys Available from Sheffield Hallam University Research Archive (SHURA) at: http://shura.shu.ac.uk/5246/

Add to Reading List

Source URL: shura.shu.ac.uk

Language: English - Date: 2013-08-01 09:17:33
UPDATE