Mobile malware

Results: 423



#Item
31-  Virtualized In-Cloud Security Services for Mobile Devices Jon Oberheide, Kaushik Veeraraghavan, Evan Cooke, Jason Flinn, Farnam Jahanian

- Virtualized In-Cloud Security Services for Mobile Devices Jon Oberheide, Kaushik Veeraraghavan, Evan Cooke, Jason Flinn, Farnam Jahanian

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-11 18:23:18
32ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-06 14:15:10
33C A S E S T U DY  University of Central Lancashire masters malware The University protects its mobile workforce with Malwarebytes Business profile

C A S E S T U DY University of Central Lancashire masters malware The University protects its mobile workforce with Malwarebytes Business profile

Add to Reading List

Source URL: www.malwarebytes.com

Language: English - Date: 2016-08-19 18:33:39
34An application to estimate the Cyber-risk Detection Skill of mobile device users. (Novel idea presentation) Guillaume Schaff itrust consulting (Luxembourg)  Carlo Harpes

An application to estimate the Cyber-risk Detection Skill of mobile device users. (Novel idea presentation) Guillaume Schaff itrust consulting (Luxembourg) Carlo Harpes

Add to Reading List

Source URL: iaria.org

Language: English - Date: 2013-12-10 21:37:25
35Monitoring Real Android Malware Jan-Christoph K¨ uster1,2 and Andreas Bauer3 1  NICTA? , 2 Australian National University, 3 TU M¨

Monitoring Real Android Malware Jan-Christoph K¨ uster1,2 and Andreas Bauer3 1 NICTA? , 2 Australian National University, 3 TU M¨

Add to Reading List

Source URL: www.immerundewig.at

Language: English - Date: 2015-07-05 07:06:37
36MAIK MORGENSTERN / CTO AV-TEST Internet Security Days 2015 EVERYTHING IS A TARGET YOUR HEALTH DATA IS NEXT

MAIK MORGENSTERN / CTO AV-TEST Internet Security Days 2015 EVERYTHING IS A TARGET YOUR HEALTH DATA IS NEXT

Add to Reading List

Source URL: www.av-test.org

Language: English - Date: 2015-09-21 03:31:29
37C A S E S T U DY  University of Central Lancashire masters malware The University protects its mobile workforce with Malwarebytes Business profile

C A S E S T U DY University of Central Lancashire masters malware The University protects its mobile workforce with Malwarebytes Business profile

Add to Reading List

Source URL: es.malwarebytes.com

Language: English - Date: 2016-07-07 18:34:11
38Appendix  ‘Godless’ Mobile Malware Uses Multiple Exploits to Root Devices Appendix

Appendix ‘Godless’ Mobile Malware Uses Multiple Exploits to Root Devices Appendix

Add to Reading List

Source URL: documents.trendmicro.com

Language: English - Date: 2016-06-17 03:52:29
39Android Security and the Elusive HSM Mobile Digital Wallet Security Summit Jon Oberheide Duo Security

Android Security and the Elusive HSM Mobile Digital Wallet Security Summit Jon Oberheide Duo Security

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-18 22:20:48
40C A S E S T U DY  University of Central Lancashire masters malware The University protects its mobile workforce with Malwarebytes Business profile

C A S E S T U DY University of Central Lancashire masters malware The University protects its mobile workforce with Malwarebytes Business profile

Add to Reading List

Source URL: de.malwarebytes.com

Language: English - Date: 2016-07-07 18:32:31