Malware research

Results: 246



#Item
221System software / Computer crimes / Malware / Phishing / Two-factor authentication / Online banking / Trend Micro / Transaction authentication number / One-time password / Cybercrime / Computer security / Social engineering

A Trend Micro Research Paper Finding Holes Operation Emmental David Sancho, Feike Hacquebord, and Rainer Link

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2014-07-24 09:59:31
222Security / Malware / Computer crimes / Antivirus software / Electronic warfare / Hacking / Cloud computing / Computer security / Threat / Computer network security / Computing / Cyberwarfare

PROGRAM Introduction Innovative research can help illuminate the security problems facing people, businesses, and governments online as well as propose

Add to Reading List

Source URL: www.gtsecuritysummit.com

Language: English - Date: 2013-09-10 01:58:16
223Computer network security / Email / Malware / Electronic commerce / National security / Internet privacy / Password / Proxy server / Spyware / Computing / Internet / Security

Computer and Internet Use Policy Faculty, staff and students (hereinafter users) are expected to promote efficient use of network resources, consistent with the instructional, research, public service and administrative

Add to Reading List

Source URL: www.littlepriest.edu

Language: English - Date: 2013-06-10 12:46:18
224Apple Inc. / App Store / Malware / Android / Mobile apps / IOS / Antivirus software / Smartphones / Software / Computing

A Trend Micro Research Paper Fake Apps Feigning Legitimacy Symphony Luo and Peter Yan

Add to Reading List

Source URL: free.antivirus.com

Language: English - Date: 2014-07-07 04:27:20
225Installation software / Programming language implementation / VM / Installation / Disk image / Malware / Computer / National Software Reference Library / System software / Software / Virtual machines

Virtual Machines in Computer Forensics Research John Tebbutt & Doug White Disclaimer

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2008-02-25 16:05:55
226Security / Honeypot / Network security / Computer insecurity / Vulnerability / Malware / Client honeypot / HoneyMonkey / Computer network security / Cyberwarfare / Computer security

Project Partners The NoAH project involves eight partners from the academic, research and commercial sectors and represents a total investment of almost 2.5 million euro, 60% of which is funded by the Research Infrastruc

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-05-14 06:31:40
227Computer security / Security / Computer network security / National security / Secure communication / Malware / Cloud computing / Antivirus software / Vulnerability / Computer crimes / Hacking / Cyberwarfare

EUROPEAN COMMISSION MEMO Brussels, 26 November[removed]Digital Agenda: European Commission supports research

Add to Reading List

Source URL: europa.eu

Language: English
228History of East Asia / Asia / Tibetan uprising / Email / Kirti Gompa / GhostNet / Tibetan independence movement / Tibet / Malware

          Research Brief

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2012-07-13 16:13:13
229Computer network security / Crime prevention / National security / Malware / Freeware / Spyware / Citizen Lab / Computer security / Surveillance / Software / Espionage / Computing

Short Background: Citizen Lab Research on FinFisher Presence in Malaysia.docx

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2013-05-01 16:46:29
230System software / Smartphones / Malware / Android / Email / Computer virus / Avast! / Web threat / Software / Antivirus software / Computing

Research Brief Number 16 – April 2013 The Citizen Lab Permission to Spy:

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2013-04-02 14:03:58
UPDATE