Rootkit

Results: 605



#Item
191Botnets / Spamming / Malware / Cyberwarfare / Storm botnet / Zeus / Rustock botnet / Storm Worm / Rootkit / Computing / Computer network security / Multi-agent systems

On the Analysis of the Zeus Botnet Crimeware Toolkit H. Binsalleeh †‡, T. Ormerod †‡, A. Boukhtouta †‡, P. Sinha †‡, A. Youssef †‡, M. Debbabi †‡, and L. Wang †‡ † National Cyber Forensics a

Add to Reading List

Source URL: www.ncfta.ca

Language: English
192Hacker / Rootkit / Phreaking / Domain Name System Security Extensions / Computing / Hacking / Computer security

BLACK HAT US 2006 TRAINING CLASS CHANGE REQUEST FORM Use one form per registrant. Complete this form in its entirety and return it NO LATER than June 30 to Email: [removed] Fax +[removed]Tel: +[removed]

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:13
193Espionage / Backdoor / Rootkit / Code injection / Veracode / Loadable kernel module / Hooking / Eval / Self-modifying code / Malware / System software / Cyberwarfare

Static Detection of Application Backdoors Chris Wysopal, Chris Eng Veracode, Inc. Burlington, MA USA [removed], [removed] Abstract— This paper describes a high level classification of

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2014-02-11 00:25:06
194Rootkit / Advanced Micro Devices / Technology / ARM Holdings / Computer hardware / Computing / Intel

HotChips  Security  Tutorial   Ruby  B.  Lee,  Vikas  Chandra,  Leendert   vanDoorn  and  David  Durham   HotChips,  August  10,  2014   CuperFno,  California  

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2014-08-10 23:55:58
195Malware / Computer network security / Multi-agent systems / Spamming / Botnets / Computer virus / Antivirus software / Zeus / Rootkit / Computing / System software / Cyberwarfare

security_shield_white_trans_4c

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-04-09 11:57:01
196Linux / Computer security / Malware / Rootkit / Ring / Kernel / Integrity / Linux kernel / Hypervisor / System software / Software / Computer architecture

S PROBES: Enforcing Kernel Code Integrity on the TrustZone Architecture Xinyang Ge, Hayawardh Vijayakumar, and Trent Jaeger System and Internet Infrastructure Security Laboratory The Pennsylvania State University {xxg113

Add to Reading List

Source URL: mostconf.org

Language: English - Date: 2014-05-17 09:17:54
197Computer security / Payment systems / Computer network security / Credit cards / Payment Card Industry Data Security Standard / Malware / PA-DSS / Rootkit / Information security / Security / Cyberwarfare / Electronic commerce

What to Do If Compromised

Add to Reading List

Source URL: usa.visa.com

Language: English - Date: 2014-01-29 01:43:37
198Malware / Computer network security / Multi-agent systems / Spamming / Botnets / Computer virus / Antivirus software / Zeus / Rootkit / Computing / System software / Cyberwarfare

security_shield_white_trans_4c

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-04-09 11:57:01
199Computer security / Malware / Spamming / Email / Industrial espionage / Microsoft Security Essentials / Rootkit / Phishing / Web threat / Cyberwarfare / Antivirus software / Computing

The snooping dragon: social-malware surveillance of the Tibetan movement

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2009-03-31 13:18:47
200Malware / Cyberwarfare / Computer network security / Multi-agent systems / Spamming / Rootkit / Computer virus / Computer worm / Botnet / Antivirus software / System software / Computer security

Malware Trend Report, Q1 2014 January | February | March 22 April 2014 Copyright RedSocks B.V. © 2014. All Rights Reserved.

Add to Reading List

Source URL: redsocks.nl

Language: English - Date: 2015-04-14 02:38:12
UPDATE