Rootkits

Results: 310



#Item
81Botnets / Rootkits / Zeus

DATE SPOOFED BRAND ATTACK TYPE

Add to Reading List

Source URL: krebsonsecurity.com

Language: English - Date: 2012-07-31 01:55:00
82Hacking / Rootkits / Computer crimes / Social engineering / Stuxnet / Duqu / LulzSec / SQL injection / Operation AntiSec / Malware / Cybercrime / Cyberwarfare

Homeland Security Perspectives: Security Scenarios and Their Impact 19 September 2012 – InfraGard Special Event Columbus, Ohio

Add to Reading List

Source URL: cmhinfragard.org

Language: English - Date: 2012-11-27 16:13:18
83CANape / Rootkits / Sony / Extended Copy Protection / Vector Informatik / Data acquisition / CANoe / Plug-in / Software / System software / Statistics

XCP plug-in Table of Contents 1 Introduction ............................................................................................................................................................... 2

Add to Reading List

Source URL: www.isystem.com

Language: English - Date: 2013-02-18 08:34:50
84Malware / Rootkits / Computer security / Computer network security / Spyware / Greg Hoglund / Keystroke logging / Sony BMG copy protection rootkit scandal / The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System / Espionage / System software / Cyberwarfare

R_: The Exponential Growth of Rootkit Techniques by Jamie Butler Bill Arbaugh Nick Petroni

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
85Espionage / Rootkits / Computer security / Antivirus software / Backdoor / Computer virus / Dynamic-link library / System software / Malware / Cyberwarfare

PDF Document

Add to Reading List

Source URL: info.baesystemsdetica.com

Language: English - Date: 2015-04-24 20:24:24
86Rootkits / Sony / Computing / Pwnie Awards / Sony BMG copy protection rootkit scandal / USENIX / Cryptography / Green Dam Youth Escort / MediaMax CD-3 / Software / Edward Felten / System software

 Hayward Street Ann Arbor, mi  usa (mobile ) +    J. Alex Halderman

Add to Reading List

Source URL: jhalderm.com

Language: English - Date: 2015-04-03 18:03:06
87Rootkits / Spyware / Business / Private law / BT Group / Kent Ertugrul / Vesting / Norman Lamont /  Baron Lamont of Lerwick / Advertising / Law / Internet privacy / Phorm

Phorm Corporation Limited (Singapore) Company Registration No. 201219573K Annual Report and Financial Statements

Add to Reading List

Source URL: www.phorm.com

Language: English - Date: 2014-08-08 13:22:59
88Scheduling algorithms / System software / Software / Road transport / Max-min fairness / Rootkits / Bottleneck / Network congestion / Extended Copy Protection / Network performance / Routing algorithms / Management

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 6, DECEMBERUnderstanding XCP: Equilibrium and Fairness Lachlan L. H. Andrew, Senior Member, IEEE, Steven H. Low, Fellow, IEEE, and Bartek P. Wydrowski, Member

Add to Reading List

Source URL: users.monash.edu

Language: English - Date: 2014-01-09 20:53:18
89.NET assembly / Managed Extensions for C++ / Visual Basic .NET / Hooking / Dynamic-link library / ILAsm / Rootkit / Global Assembly Cache / Windows API / Computing / Software / .NET framework

Microsoft Word - .NET Framework rootkits - backdoors inside your framework - revised.doc

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
90Malware / Rootkits / Shellcode / Hypervisor / Hacker / Antivirus software / Backdoor / Joanna Rutkowska / The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System / System software / Cyberwarfare / Computer security

[Black Hat DCAn Uninvited Guest Black Hat DC 2010 Conference Proceedings An Uninvited Guest (Who Won’t Go Home)

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:24
UPDATE