Mebroot

Results: 7



#Item
1Malware / Computer crimes / Social engineering / Computing / Botnet / Phishing / Mebroot / Web threat / Spamming / Cybercrime / Computer network security

System  Security  Research  @   University  of  Birmingham,  UK   Marco  Cova     Security  group  

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:32:20
2Multi-agent systems / Botnets / Cyberwarfare / Malware / Srizbi botnet / Storm botnet / Torpig / Mebroot / Fast flux / Computing / Spamming / Computer network security

Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Department of Computer S

Add to Reading List

Source URL: www.catonmat.net

Language: English - Date: 2010-04-12 16:52:45
3System software / Mebroot / Torpig / Franz Melde / Dropbox / Master boot record / Software / Rootkits / Computing

Melde- und Analysestelle Informationssicherung MELANI Torpig/Mebroot Reverse Code Engineering (RCE) Andreas Greulich, MELANI

Add to Reading List

Source URL: www.csnc.ch

Language: English - Date: 2015-02-10 04:35:28
4Zeus / Torpig / Malware / Computer emergency response team / Rootkits / Botnets / Mebroot

Microsoft PowerPoint - Cert-Lexsi-DeadAngle-PRG-vs-Torpig.ppt [Mode de compatibilité]

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2009-02-05 11:24:01
5Rootkits / Antivirus software / Computer security / Hypervisor / Blue Pill / Mebroot / Unified Extensible Firmware Interface / BIOS / TrueCrypt / System software / Software / Malware

PDF Document

Add to Reading List

Source URL: www.aisp.sg

Language: English - Date: 2012-06-25 23:12:04
6Botnets / Multi-agent systems / Malware / Cyberwarfare / Rootkits / Torpig / Srizbi botnet / Mebroot / Fast flux / Computing / Spamming / Computer network security

Malware Analysis Analysis of a

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2013-08-28 21:33:56
7Botnets / Malware / Multi-agent systems / Cyberwarfare / Rootkits / Torpig / Srizbi botnet / Mebroot / Fast flux / Computing / Spamming / Computer network security

Malware Analysis Analysis of a Botnet Takeover

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2011-02-11 11:42:37
UPDATE