Malware

Results: 7286



#Item
931Internet / Computing / Internet Standards / Internet protocols / Domain name system / Network architecture / Radio-frequency identification / Verisign / WHOIS

Metadata-driven Threat Classification of Network Endpoints Appearing in Malware Andrew G. West and Aziz Mohaisen (Verisign Labs) July 11, 2014 – DIMVA – Egham, United Kingdom PRELIMINARY OBSERVATIONS

Add to Reading List

Source URL: www.andrew-g-west.com

Language: English - Date: 2014-07-27 21:24:28
932

simpliFiRE.IDAscope An IDA Pro extension for easier (malware) reverse engineering Daniel Plohmann, Alexander Hanel

Add to Reading List

Source URL: archive.hack.lu

Language: English - Date: 2012-10-24 08:11:38
    933

    RedSocks Malware Threat Defender Endpoint threat detection When it comes to Malware and Advanced Persistent Threat (APT) protection, many organizations have a false sense of security. They believe they have secured their

    Add to Reading List

    Source URL: www.redsocks.nl

    Language: English - Date: 2016-01-25 04:02:34
      934

      Concurrent Architecture for Automated Malware Classification

      Add to Reading List

      Source URL: daly.axiom-developer.org

      Language: English - Date: 2011-03-02 21:54:27
        935Computing / Software / Graphics file formats / Cross-platform software / Adobe Flash / Adobe software / Archive formats / SWF / JavaScript / Malware / JAR / Portable Document Format

        Lightweight Approach to Detect Drive-by Download Attacks Based on File Type Transition Yasutaka Shindo Akihiro Satoh

        Add to Reading List

        Source URL: conferences2.sigcomm.org

        Language: English - Date: 2014-12-01 17:07:18
        936

        Malware Trend Report, Q1 2015 January | February | March April 2015 Copyright RedSocks B.V. © All Rights Reserved.

        Add to Reading List

        Source URL: www.redsocks.nl

        Language: English - Date: 2016-01-25 04:02:43
          937

          D&D of malware with exotic C&C D&D = Description & Detection C&C = Command & Control Automotive

          Add to Reading List

          Source URL: archive.hack.lu

          Language: English - Date: 2014-10-23 09:41:47
            938

            Powerful anti-malware defense Because your current antivirus solution alone can’t protect your network As cyber attacks increase in frequency and sophistication, IT managers are starting to realize that relying on onl

            Add to Reading List

            Source URL: es.malwarebytes.org

            Language: English
              939

              Powerful multi-layered defense delivers smart endpoint protection. Protects against new and exploit-based malware Get Malwarebytes Anti-Malware for Business and Malwarebytes Anti-Exploit for Business together in one pow

              Add to Reading List

              Source URL: ru.malwarebytes.org

              Language: English
                940

                Systematic Mining of Associated Server Herds for Malware Campaign Discovery Jialong Zhang Sabyasachi Saha∗ Guofei Gu Sung-Ju Lee∗ Marco Mellia

                Add to Reading List

                Source URL: faculty.cs.tamu.edu

                Language: English - Date: 2015-07-01 22:09:28
                  UPDATE