Rootkits

Results: 310



#Item
91Cyberwarfare / Rootkits / Stuxnet / Iran / Internet censorship / Ali Khamenei / Asia / Nuclear program of Iran / Iran–United States relations

Iranian Internet Infrastructure and Policy Report Special Edition The Rouhani Review (2013–15) February 2015 smallmedia.org.uk

Add to Reading List

Source URL: smallmedia.org.uk

Language: English - Date: 2015-03-19 13:05:36
92Malware / Cryptography / Backdoor / Rootkits / Spyware / Password / One-time password / SecurID / Security / Cyberwarfare / Computer security

A Framework to Eliminate Backdoors from Response-Computable Authentication Shuaifu Dai1 , Tao Wei1,2∗ , Chao Zhang1 , Tielei Wang3 , Yu Ding1 , Zhenkai Liang4 , Wei Zou1 1 Beijing Key Lab of Internet Security Technolo

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:27
93Malware / Rootkits / Computer security / Trojan horses / Alureon / Parallel ATA / Computer virus / File system / NTFS / System software / Computing / Software

PDF Document

Add to Reading List

Source URL: www.drweb.com

Language: English - Date: 2009-11-24 08:29:07
94Malware / Computer security / Rootkits / NTFS / File system / Virtual file system / Operating system / Computer file / Extended Copy Protection / System software / Software / Computing

G Data Red Paper 2014 Uroburos Highly complex espionage software with Russian roots G Data discovers alleged intelligence agency software

Add to Reading List

Source URL: public.gdatasoftware.com

Language: English - Date: 2014-02-28 11:05:40
95Software bugs / X86 architecture / Trusted Execution Technology / Trusted computing / Rootkit / Malware / X86 virtualization / Buffer overflow / Intel / System software / Computer security / Computing

Mitigating Exploits, Rootkits and Advanced Persistent Threats David Durham, Senior Principal Engineer Intel Corporation

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2014-08-10 23:56:01
96Hacking / Cyberwarfare / Hacker groups / Computer crimes / Rootkits / Wicked Rose / Network Crack Program Hacker (NCPH) Group / Hacker / Honker Union / Computing / Malware / Computer security

"Wicked Rose" and the NCPH Hacking Group by Ken Dunham & Jim Melnick Zero-day attacks, where an attack occurs before public knowledge of a vulnerability is known, is a growing cause of concern for security professionals

Add to Reading List

Source URL: krebsonsecurity.com

Language: English - Date: 2012-11-13 21:25:30
97Spyware / Malware / Cryptography / Payment systems / Backdoor / Rootkits / Payment Card Industry Data Security Standard / Dynamic-link library / Dumper / Espionage / System software / Computing

Visa Data Security Bulletin

Add to Reading List

Source URL: www.visa-asia.com

Language: English - Date: 2010-01-14 04:54:45
98Botnets / Rootkits / Zeus / Malware / Web threat / Online banking / JavaScript / Two-factor authentication / Bank / Computing / Cybercrime / Software

Automating Online Banking Fraud—Automatic Transfer System: The Latest Cybercrime Toolkit Feature

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2012-06-18 01:14:18
99Spamming / Internet / Rootkits / Phishing / Social engineering / Backdoor / Infrastructure / Email / Computer virus / Espionage / Cybercrime / Malware

Department of Homeland Security Daily Open Source Infrastructure Report

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2015-04-08 19:14:18
100Malware / Antivirus software / Rootkits / System Service Dispatch Table / Loadable kernel module / Kernel / Avira / Computer virus / The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System / System software / Computer security / Cyberwarfare

Microsoft Word - ARES[removed]FINALisimo corregido & new graphics Pablo.doc

Add to Reading List

Source URL: www.pablobravo.com

Language: English
UPDATE