Malware research

Results: 246



#Item
201Computing / Malware / Electronic voting / DNS spoofing / Denial-of-service attack / Computer worm / Computer virus / Exploit / Botnet / Computer network security / Cyberwarfare / Computer security

Security Considerations for Remote Electronic Voting over the Internet Avi Rubin AT&T Labs – Research Florham Park, NJ [removed]

Add to Reading List

Source URL: www.electioncenter.org

Language: English - Date: 2007-03-13 00:00:00
202Cyberwarfare / Computing / Advanced persistent threat / Data security / Evasion / Network security / Firewall / Malware / Computer security / Security / Computer network security

DON’T BE FOOLED A new study by market research firm Vanson Bourne reveals that businesses confuse advanced evasion techniques (AETs) with advanced persistent threats (APTs)—leaving themselves vulnerable, at great co

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-03-27 19:37:50
203Computer crimes / Social engineering / Computer network security / Rogue software / Crimeware / Phishing / Symantec / Zeus / Social networking service / Cybercrime / System software / Malware

Prepared Testimony and Statement for the Record of Joseph Pasqua Vice President of Research Symantec Corporation

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2010-08-05 13:18:59
204Computing / Malware / Internet security / Antivirus software / Cyberwarfare / Spamming / Multi-agent systems / Computer security / Computer network security / FireEye /  Inc.

WhatWorks in Detecting and Blocking Advanced Threats: A Real Case Study at a Large Research Organization with WhatWorks is a user-to-user program in which security managers who have implemented effective internet securit

Add to Reading List

Source URL: www.meritalk.com

Language: English - Date: 2013-09-27 14:56:25
205Antivirus software / Computing / Backup / Spyware / Email / Phishing / Computer virus / Adware / Defensive computing / Internet / Espionage / Malware

University of Manitoba Research Suggested Practices for IT Written by Trevor Mazak September 10, 2013 Last Revised September 16, 2013 Notice: The contents of this document are highly time sensitive. Best practices today

Add to Reading List

Source URL: www.umanitoba.ca

Language: English - Date: 2014-09-04 10:16:43
206Computer network security / Multi-agent systems / Spamming / Malware / Botnet / Adware / Opera / Trend Micro / Software / Computing / Antivirus software

A Trend Micro Research Paper On the Actors Behind MEVADE/SEFNIT Forward-Looking Threat Research Team

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2014-07-07 15:51:43
207Computer security / Malware / Computer network / Information security / Virtual private network / Firewall / Network security / Internet security / Computer network security / Security / Computing

MARKETBRIEF Helping to Protect the Open Campus To fulfill their functions of educating students and promoting research, college and university campuses must be open to the flow of people

Add to Reading List

Source URL: www.corp.att.com

Language: English - Date: 2008-05-29 11:07:24
208System software / Computer crimes / Malware / Phishing / Two-factor authentication / Online banking / Trend Micro / Transaction authentication number / One-time password / Cybercrime / Computer security / Social engineering

A Trend Micro Research Paper Finding Holes Operation Emmental David Sancho, Feike Hacquebord, and Rainer Link

Add to Reading List

Source URL: www.securecloud.com

Language: English - Date: 2014-07-24 09:59:31
209Computer network security / Electronic commerce / Malware / Cloud computing / Computer security / Cisco Systems / SCADA / Georgia Tech Research Institute / USB flash drive / Technology / Computing / Computer crimes

GTCSS_2013_ETR_Front_Cover

Add to Reading List

Source URL: www.gtsecuritysummit.com

Language: English - Date: 2013-11-15 09:46:50
210Security / Malware / Computer crimes / Antivirus software / Electronic warfare / Hacking / Cloud computing / Computer security / Threat / Computer network security / Computing / Cyberwarfare

PROGRAM Introduction Innovative research can help illuminate the security problems facing people, businesses, and governments online as well as propose

Add to Reading List

Source URL: www.gtcybersecuritysummit.com

Language: English - Date: 2013-09-10 01:58:16
UPDATE