Malware research

Results: 246



#Item
231Internet / Windows / Computer architecture / Spamming / Malware / Email / Computing

Research Brief Number 14 – February 2013 The Citizen Lab APT1’s GLASSES : Watching a Human Rights Organization

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2013-03-01 19:14:24
232Money / Boleto / Malware / Social engineering / Cheque / Payment systems / Business / Economics

RSA® Research Group RSA DISCOVERS MASSIVE BOLETO FRAUD RING IN BRAZIL July 2014

Add to Reading List

Source URL: blogs.rsa.com

Language: English - Date: 2014-07-02 12:19:55
233Computing / Whitelist / SCADA / Malware / Cloud computing / DriveSentry / Symantec Endpoint Protection / Antivirus software / Software / System software

Stay sane. Do something different. As computing paradigms change, so must protection paradigms. Richard Stiennon Chief Research Analyst

Add to Reading List

Source URL: www.threatchaos.com

Language: English - Date: 2011-03-14 16:56:06
234Free software / Clam AntiVirus / Sourcefire / Malware / Computer virus / Sourcefire Vulnerability Research Team / Software / System software / Antivirus software

What’s New ClamAV[removed]Sourcefire is pleased to announce upcoming availability of the interim release of ClamAV rd[removed], which is scheduled to become available on 3 November 2008.

Add to Reading List

Source URL: www.clamav.net

Language: English - Date: 2008-10-14 10:23:22
235National security / Espionage / Data security / Spyware / Malware / Phishing / Security engineering / Information security / Internet privacy / Security / Computer network security / Crime prevention

The Foundation for Information Policy Research Consultation response on Personal Internet Security The Foundation for Information Policy Research (FIPR) is an independent body that studies the interaction between informa

Add to Reading List

Source URL: www.fipr.org

Language: English - Date: 2006-11-03 08:53:13
236Computer network security / Computer networking / Network performance / Proxy server / Malware / Anonymizer / Tor / Botnet / SOCKS / Computing / Internet privacy / Internet

Trend Micro Incorporated Research Paper 2012

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2012-12-17 20:41:33
237Cybercrime / Spamming / Antivirus software / MD5 / Phishing / Kaspersky Lab / Targeted threat / Vulnerability / Rootkit / Computer security / Cyberwarfare / Malware

The NetTraveler (aka ‘Travnet’) Author Global Research and Analysis Team

Add to Reading List

Source URL: www.securelist.com

Language: English - Date: 2013-11-01 07:38:47
238Technology / Malware / Phishing / Anti-spam techniques / Spam / Botnet / Transaction authentication number / Classifier / CAPTCHA / Spamming / Computing / Internet

Facebook Immune System Tao Stein

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2011-03-31 17:41:56
239Antivirus software / Computer viruses / Macro virus / Computer worm / Melissa / Norton AntiVirus / Happy99 / CTX / Malware / System software / Software

Symantec AntiVirus Research Center Learn More About Viruses and Worms

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2000-10-25 13:11:57
240Computer network security / Trusted Computing Group / Password / Trusted Computing / Security token / Digital rights management / Malware / Next-Generation Secure Computing Base / Computer security / Copyright law / Security

The Need for TCPA David Safford, IBM Research, October, 2002

Add to Reading List

Source URL: www.research.ibm.com

Language: English - Date: 2003-04-16 11:17:28
UPDATE