Mobile Malware

Results: 423



#Item
211Mobile computers / Smartphones / Classes of computers / Android / Malware / Rooting / Antivirus software / Mobile device / Bluetooth / Technology / Computing / Information appliances

MOBILE DEVICES Here are some steps you can take to safeguard your online activities and minimize the chance you will be affected by Internet fraud. When purchasing a smartphone, learn the features of the device, includin

Add to Reading List

Source URL: www.firstmidwest.com

Language: English - Date: 2013-10-04 17:41:46
212Cyberwarfare / Computer network security / Android / Android Market / Mobile software / Threat / Intent / Malware / Microsoft App-V / Computing / Software / Smartphones

Analyzing Inter-Application Communication in Android Erika Chin Adrienne Porter Felt Kate Greenwood

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
213Computing / Malware / Anti-computer forensics / Network forensics / Global Information Assurance Certification / Forensic science / Packet capture / Mobile device forensics / Department of Defense Cyber Crime Center / Digital forensics / Computer security / Cybercrime

T h e A l l F o r e n s i c s Tr a i n i n g E v e n t March 5-10, 2014 | M o n t e r e y, C A

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2013-11-08 15:24:18
214Security / Wireless / Mobile telecommunications / Magnetometer / Sensors / Malware / Steganography / Burglar alarm / IPhone / Technology / Electromagnetism / Smartphones

Sensing-Enabled Channels for Hard-to-Detect Command and Control of Mobile Devices Ragib Hasan Nitesh Saxena

Add to Reading List

Source URL: students.cis.uab.edu

Language: English - Date: 2013-04-16 15:36:56
215Computer network security / Denial-of-service attack / Malware / Yandex / SMS / Crime / International Cybercrime / Computer crimes / Technology / Mobile technology

Cybercrime in Russia: Trends and issues Robert Lipovsky, Aleksandr Matrosov and Dmitry Volkov Agenda General cybercrime trends in 2010 Most prevalent threats and incidents

Add to Reading List

Source URL: go.eset.com

Language: English - Date: 2011-05-18 11:23:20
216Health informatics / Medical technology / Mobile computers / Medical terms / Medical device / Medical equipment / Malware / Network security / Bluetooth / Medicine / Health / Technology

UNCLASSIFIED//FOR OFFICIAL USE ONLY National Cybersecurity and Communications Integration Center BULLETIN[removed]

Add to Reading List

Source URL: thielst.typepad.com

Language: English - Date: 2012-06-04 11:42:35
217Technology / Computing / INCA Internet / Malware / Denial-of-service attack / Smartphone / Internet security / Computer crime / Mobile banking / Antivirus software / Computer network security / Computer security

nProtect Discovers Malicious Mobile Applications Capable of Carrying out DDoS Attacks "Zombie" smartphones being amassed for grand attack San Jose, CA (PRWEB) February 27, [removed]nProtect, Inc., a global leader in Inter

Add to Reading List

Source URL: www.prweb.com

Language: English - Date: 2013-02-27 10:01:11
218Password / USB flash drive / Information technology management / Data Protection Act / Personal digital assistant / Computer virus / Malware / Mobile business intelligence / Telecommunications data retention / Computing / Mobile computers / Technology

Outline The use of IT equipment outside of the School, either owned by the School or personally owned by a member of staff has become an accepted part of working life. The increasing power of mobile phones, tablets, the

Add to Reading List

Source URL: slp.somerset.gov.uk

Language: English - Date: 2013-12-06 06:35:56
219Mobile technology / Computer network security / Spamming / Information appliances / Computer security / Network security / Malware / Client honeypot / Erol Gelenbe / Technology / Mobile telecommunications / Computing

Security for Smart Mobile Networks: The NEMESYS Approach Erol Gelenbe∗ , Gokce Gorbil∗ , Dimitrios Tzovaras† , Steffen Liebergeld‡ , David Garcia§ , Madalina Baltatu¶ and George Lyberopoulosk ∗ Imperial

Add to Reading List

Source URL: san.ee.ic.ac.uk

Language: English - Date: 2013-10-23 08:34:01
220Neural networks / Erol Gelenbe / Random neural network / Data security / Mobile telecommunications / Intrusion detection system / Malware / Network security / SMS / Technology / Mobile technology / Electronics

Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach Omer H. Abdelrahman, Erol Gelenbe, G¨okc¸e G¨orbil and Boris Oklander Abstract Mobile malware and mobile network attacks are becoming a significant

Add to Reading List

Source URL: san.ee.ic.ac.uk

Language: English - Date: 2013-07-02 14:44:03
UPDATE