PGPCoder

Results: 9



#Item
12016 IEEE 36th International Conference on Distributed Computing Systems  CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data Nolen Scaife

2016 IEEE 36th International Conference on Distributed Computing Systems CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data Nolen Scaife

Add to Reading List

Source URL: www.cise.ufl.edu

Language: English
2The challenge Victim targeting using random generators Auto-protection using deniable encryption Invisibility using statistical simulability  The challenge

The challenge Victim targeting using random generators Auto-protection using deniable encryption Invisibility using statistical simulability The challenge

Add to Reading List

Source URL: esec-lab.sogeti.com

Language: English - Date: 2016-07-01 12:08:46
3Ransomware phenomenon Extortion scheme Archetype of modern malware Conclusion  Comparative analysis of various ransomware virii

Ransomware phenomenon Extortion scheme Archetype of modern malware Conclusion Comparative analysis of various ransomware virii

Add to Reading List

Source URL: esec-lab.sogeti.com

Language: English - Date: 2016-07-01 12:08:46
4BofA - Example Rapid Release Report

BofA - Example Rapid Release Report

Add to Reading List

Source URL: www.mnin.org

Language: English - Date: 2009-08-16 00:26:31
5The challenge Victim targeting using random generators Auto-protection using deniable encryption Invisibility using statistical simulability  The challenge

The challenge Victim targeting using random generators Auto-protection using deniable encryption Invisibility using statistical simulability The challenge

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2008-06-12 15:35:33
6whitepaper: Your Money or Your Life Files  Your Money or Your Life Files A Short History Of Ransomware

whitepaper: Your Money or Your Life Files Your Money or Your Life Files A Short History Of Ransomware "The year 2014 may well go down in the history books as the year that extortion attacks went mainstream.” -Brian K

Add to Reading List

Source URL: ww1.prweb.com

Language: English - Date: 2014-10-02 09:37:20
7New type of ransomware more sophisticated and harder to defeat

New type of ransomware more sophisticated and harder to defeat

Add to Reading List

Source URL: phys.org

Language: English - Date: 2015-03-03 12:51:10
8National Cyber Awareness System:  TA13-309A: CryptoLocker Ransomware Infections[removed]:58 AM EST  Original release date: November 05, 2013 | Last revised: November 06, 2013

National Cyber Awareness System: TA13-309A: CryptoLocker Ransomware Infections[removed]:58 AM EST Original release date: November 05, 2013 | Last revised: November 06, 2013

Add to Reading List

Source URL: www.nsmithfieldri.org

Language: English - Date: 2013-11-07 15:54:07
9PandaLabs annual Report 2012 Summary  01 Introduction

PandaLabs annual Report 2012 Summary 01 Introduction

Add to Reading List

Source URL: press.pandasecurity.com

Language: English - Date: 2013-02-06 04:33:26