Malware research

Results: 246



#Item
191Payment systems / Malware / Point of sale / Security / Technology / Trend Micro / Computer security / IBM 4690 OS / Computer insecurity / Electronic commerce / Business / Computer network security

A Trend Micro Research Paper Point-of-Sale System Breaches Threats to the Retail and Hospitality Industries Trend Micro Incorporated

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2014-02-16 22:48:27
192Spamming / Phishing / Trojan horse / Pharming / Cyberwarfare / Social engineering / Cybercrime / Malware

Energetic Bear — Crouching Yeti Kaspersky Lab Global Research and Analysis Team 2 1. Executive Summary

Add to Reading List

Source URL: 25zbkz3k00wn2tp5092n6di7b5k.wpengine.netdna-cdn.com

Language: English - Date: 2014-07-31 12:09:19
193Computer security / Crime prevention / National security / Data security / Malware / Threat / Vulnerability / Information security / Network security / Security / Computer network security / Cyberwarfare

Research Conducted by 2014 INSIDER THREAT

Add to Reading List

Source URL: enterprise-encryption.vormetric.com

Language: English - Date: 2014-10-20 02:41:20
194System software / Smartphones / Embedded Linux / APK / Dalvik / Malware / Computer virus / Binary XML / Mobile application development / Android / Software / Computing

APK File Infection on Android System Bob Pan Mobile Security Research Engineer July 27, 2012

Add to Reading List

Source URL: korben.info

Language: English - Date: 2014-05-30 10:22:41
195Telemarketing / Computing / Dialer / Malware / Call centre / Predictive dialer / Toronto / Hewlett-Packard / Acme / Telephony / Electronic engineering / Electronics

ACME Research Inc. 5 ACME Research Inc.

Add to Reading List

Source URL: mria-arim.ca

Language: English - Date: 2013-06-28 15:13:41
196Malware / Software testing / Microsoft Windows / Computer network security / DLL injection / Code injection / Vulnerability / SQL injection / Dynamic-link library / Cyberwarfare / Computing / Computer security

Trace: Tennessee Research and Creative Exchange Masters Theses University of Tennessee 

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2010-08-19 15:52:37
197Spamming / Botnets / Storm botnet / Kraken botnet / Storm Worm / Spam / Malware / Business ethics / Institutional review board / Computing / Computer network security / Multi-agent systems

Towards Community Standards for Ethical Behavior in Computer Security Research David Dittrich University of Washington Michael Bailey

Add to Reading List

Source URL: www.cs.stevens.edu

Language: English - Date: 2010-02-18 20:21:51
198Espionage / Cryptography / Malware / Data security / Backdoor / Port / Firewall / Distributed firewall / Cracking of wireless networks / Computer network security / Cyberwarfare / Computer security

A Trend Micro Research Paper Backdoor Use in Targeted Attacks Dove Chiu, Shih-Hao Weng, and Joseph Chiu Targeted Attack Defense Research Team

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2014-07-31 03:59:19
199Crime prevention / National security / Computer network security / Identity management / Password / Malware / Cloud computing / Internet privacy / Identity theft / Security / Cyberwarfare / Computer security

Intel Science and Technology Center for Secure Computing University of California at Berkeley: Secure Computing Research for User Benefit Overview

Add to Reading List

Source URL: scrub.cs.berkeley.edu

Language: English - Date: 2013-01-10 02:42:05
200National security / Public safety / Computer network security / Data security / Information security / Application security / Cloud computing / Digital preservation / Malware / Security / Computer security / Crime prevention

Firmenfolder_englisch.indd

Add to Reading List

Source URL: www.sba-research.org

Language: English - Date: 2012-03-20 12:03:12
UPDATE