Malware research

Results: 246



#Item
41Computer security / Android / Malware / Embedded Linux / Rootkit / Rooting / Ptrace / Privilege escalation / Linux Security Modules / Computing / Smartphones / Software

Yet Another Android Rootkit /protecting/system/is/not/enough/ Tsukasa OI – Research Engineer Fourteenforty Research Institute, Inc.

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:41
42Malware / Computer crimes / Social engineering / Computing / Botnet / Phishing / Mebroot / Web threat / Spamming / Cybercrime / Computer network security

System  Security  Research  @   University  of  Birmingham,  UK   Marco  Cova     Security  group  

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:32:20
43Antivirus software / Spamming / Shellcode / Wombat / Malware / Honeypot / Email / Computer virus / Symantec / Computing / Computer security / Cyberwarfare

WOMBAT:  a  Worldwide  Observatory     of  Malicious  Behaviors  and  A;ack  Threats   Corrado  Leita   Symantec  Research  Labs   WOMBAT  

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:43:51
44Exploit / Computer crimes / Identity theft / Anti-computer forensics / Hacker / Organized crime / Computer virus / Malware / Crime / Crimeware

Crimeware on the Net The “Behind the scenes” of the new web economy Iftach Ian Amit Director, Security Research – Finjan

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:30
45Cybercrime / Malware / Attack / Botnet / Computer worm / Vulnerability / Computer crime / Shadowserver / Computer network security / Cyberwarfare / Computer security

European Cyber-Security Research and Innovation by Federico Maggi, Stefano Zanero, and Evangelos Markatos Looking back at the evolution of cyber criminal activities, from the nineties to the present day, we

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2015-01-22 10:52:19
46Nuclear program of Iran / Rootkits / Stuxnet / Malware / Duqu / Microsoft Security Essentials / Framework Programmes for Research and Technological Development / Cyberwarfare / System software / Software

SEVENTH FRAMEWORK PROGRAMME Information & Communication Technologies Trustworthy ICT NETWORK OF EXCELLENCE

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2013-01-30 16:47:51
47Cyberwarfare / Software testing / Hacking / Crime prevention / National security / Exploit / Vulnerability / Malware / Threat / Computer security / Computer network security / Computing

OPINION Why Offensive Security Needs Engineering Textbooks Or, How to Avoid a Replay of “Crypto Wars” in Security Research

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-09-11 05:58:33
48Cyberwarfare / Hacking / Vulnerability / Malware / Social vulnerability / Software bug / Twitter / Exploit / Software testing / World Wide Web / Computer security

Washington DC – FebA 0-day’s life “Offense as Defense” Panel Discussion – Offensive Markets for Vulnerability Research – Pros and Cons

Add to Reading List

Source URL: revuln.com

Language: English - Date: 2013-04-04 19:34:02
49Computer virus / Cluster analysis / Hierarchical clustering / Statistics / Antivirus software / Malware

Kizzle: A Signature Compiler for Exploit Kits MSR-TRBen Stock Benjamin Livshits and Benjamin Zorn

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2015-02-13 19:37:17
50States of Germany / Honeypot / North Rhine-Westphalia / Ruhr University Bochum / Malware / Honeynet Project / Botnet / Geography of Germany / Computer network security / Spamming / Bochum

Embedded Malware Ruhr-University Bochum Systems Security Research at Thorsten Holz

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:36:05
UPDATE