Rootkit

Results: 605



#Item
391Computer network security / Crime prevention / National security / Information security / Threat / Vulnerability / Security awareness / Rootkit / Attack / Computer security / Cyberwarfare / Security

Policy Summary No. 29 Malicious Code Information Security Branch, Office of the Chief Information Officer Ministry of Citizens’ Services, Province of British Columbia http://www.cio.gov.bc.ca/cio/informationsecurity/in

Add to Reading List

Source URL: www.cio.gov.bc.ca

Language: English - Date: 2013-03-28 18:16:10
392Unified Extensible Firmware Interface / Software / Windows 8 / Code signing / Rootkit / Personal computer hardware / Malware / BIOS / System software / Computing

presented by Microsoft UEFI Certification Authority UEFI PlugFest – September 19-20, 2013 Presented by Jeremiah Cox (Microsoft Corp.)

Add to Reading List

Source URL: www.uefi.org

Language: English - Date: 2013-09-26 17:15:45
393Cyberwarfare / Rootkit / Computer virus / Security / Antivirus software / Malware / Computer security

The Concepts of the Malware Attribute Enumeration and Characterization (MAEC) Effort Ivan A. Kirillov, [removed] Desiree A. Beck, [removed] Melissa P. Chase, [removed]

Add to Reading List

Source URL: maec.mitre.org

Language: English - Date: 2009-11-06 13:53:57
394Computing / Unified Extensible Firmware Interface / Unified EFI Forum / Rootkit / Windows 8 / Booting / TrueCrypt / Disk encryption / Trusted Platform Module / BIOS / System software / Software

UEFI SECURE BOOT IN MODERN COMPUTER SECURITY SOLUTIONS September[removed]Authors:

Add to Reading List

Source URL: www.uefi.org

Language: English - Date: 2013-09-23 19:43:48
395Software / McAfee VirusScan / McAfee / Computer virus / Microsoft Security Essentials / Rootkit / Conficker / Spyware / Hitman Pro / Malware / Antivirus software / System software

Data Sheet McAfee 5600 Scan Engine and .DATs Malware protection for embedded systems The primary function of any anti-virus product is to find and remove viruses, worms,

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:52:35
396Windows Registry / Windows API / Portable Executable / Rootkit / Native API / Dynamic-link library / Malware / Windows NT architecture / Windows NT startup process / System software / Software / Computing

Hodprot: Hot to Bot Eugene Rodionov, Malware Researcher, ESET Aleksandr Matrosov, Senior Malware Researcher, ESET Dmitry Volkov, Cyber crimes investigation division leader, Group-IB

Add to Reading List

Source URL: www.eset.com

Language: English - Date: 2011-08-03 11:47:11
397Computer security / ESET / Avira / Malware / Spyware / Rootkit / Panda Pro / Hitman Pro / Antivirus software / System software / Software

ESETNA-5501-EAV-Solutions-Overview-V5[removed]indd

Add to Reading List

Source URL: static3.esetstatic.com

Language: English - Date: 2013-10-14 16:06:38
398Software / Malware / McAfee / Rootkit / Microsoft Security Essentials / System software / Antivirus software / Computer security

McAFEE LABS THREATS REPORT June 2014 The Total Malware March Continues In Q1 2014, the total malware sample count in the McAfee Labs “zoo” broke the 200 million

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-06-23 14:48:03
399System software / Computer security / McAfee VirusScan / Rootkit / Malware / McAfee / Antivirus software / Software

Executive Summary Root Out Rootkits By Barbara Kay, CISSP Principal Analyst

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:08:26
400Computer crimes / Malware / Computer security / Computer network security / Antivirus software / Phishing / Rootkit / Advanced persistent threat / Near field communication / Cybercrime / Espionage / Cyberwarfare

Monthly Security Tips NEWSLETTER January 2013 Volume 8, Issue 1

Add to Reading List

Source URL: www.cio.ne.gov

Language: English - Date: 2013-05-09 10:42:41
UPDATE