PGPCoder

Results: 9



#Item
1Ransomware / Malware / Cyberwarfare / Computer security / Cybercrime / Blackmail / Trojan horses / Computer virus / Antivirus software / PGPCoder / TeslaCrypt / CryptoLocker

2016 IEEE 36th International Conference on Distributed Computing Systems CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data Nolen Scaife

Add to Reading List

Source URL: www.cise.ufl.edu

Language: English
2Cryptography / Cyberwarfare / Malware / Computer security / Cryptovirology / Ransomware / Random number generation / Computer virus / Pseudorandomness / PGPCoder / Random seed / Deniable encryption

The challenge Victim targeting using random generators Auto-protection using deniable encryption Invisibility using statistical simulability The challenge

Add to Reading List

Source URL: esec-lab.sogeti.com

Language: English - Date: 2016-07-01 12:08:46
3Trojan horses / Ransomware / Cryptovirology / Archiveus / PGPCoder / Malware / AIDS / Computer virus / Extortion / Plural form of words ending in -us

Ransomware phenomenon Extortion scheme Archetype of modern malware Conclusion Comparative analysis of various ransomware virii

Add to Reading List

Source URL: esec-lab.sogeti.com

Language: English - Date: 2016-07-01 12:08:46
4Extortion / Ransomware / PGPCoder / RSA / Encryption / Cryptography / Public-key cryptography / Malware

BofA - Example Rapid Release Report

Add to Reading List

Source URL: www.mnin.org

Language: English - Date: 2009-08-16 00:26:31
5Randomness / Malware / Ransomware / PGPCoder / Pseudorandomness / Random seed / Applied mathematics / Deniable encryption / Random number generation / Cryptography / Cryptovirology / Cyberwarfare

The challenge Victim targeting using random generators Auto-protection using deniable encryption Invisibility using statistical simulability The challenge

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2008-06-12 15:35:33
6Social engineering / Trojan horses / Computer network security / Spamming / Ransomware / Bitcoin / PGPCoder / Archiveus / Scareware / Malware / System software / Software

whitepaper: Your Money or Your Life Files Your Money or Your Life Files A Short History Of Ransomware "The year 2014 may well go down in the history books as the year that extortion attacks went mainstream.” -Brian K

Add to Reading List

Source URL: ww1.prweb.com

Language: English - Date: 2014-10-02 09:37:20
7Computing / Malware / Extortion / Ransomware / Computer virus / Kaspersky Lab / Tor / Bitcoin / PGPCoder / Software / System software / Antivirus software

New type of ransomware more sophisticated and harder to defeat

Add to Reading List

Source URL: phys.org

Language: English - Date: 2015-03-03 12:51:10
8Ransomware / Computing / Antivirus software / Internet / Computer virus / Email / Phishing / USB flash drive / PGPCoder / System software / Malware / Extortion

National Cyber Awareness System: TA13-309A: CryptoLocker Ransomware Infections[removed]:58 AM EST Original release date: November 05, 2013 | Last revised: November 06, 2013

Add to Reading List

Source URL: www.nsmithfieldri.org

Language: English - Date: 2013-11-07 15:54:07
9Social engineering / Antivirus software / Trojan horses / Computer network security / Ransomware / Smartphone / Koobface / Computer virus / PGPCoder / Malware / System software / Software

PandaLabs annual Report 2012 Summary 01 Introduction

Add to Reading List

Source URL: press.pandasecurity.com

Language: English - Date: 2013-02-06 04:33:26
UPDATE