Torpig

Results: 22



#Item
11Multi-agent systems / Spamming / Cyberwarfare / Malware / Zeus / Zombie / Torpig / Conficker / Denial-of-service attack / Computer network security / Computing / Botnets

Microsoft PowerPoint - botnet_detection2009.ppt

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2014-06-18 01:23:21
12Multi-agent systems / Spamming / Cyberwarfare / Malware / Zeus / Zombie / Torpig / Conficker / Denial-of-service attack / Computer network security / Computing / Botnets

Microsoft PowerPoint - botnet_detection2009.ppt

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2014-06-18 01:23:20
13System software / Spyware / Social engineering / Zeus / Antivirus software / For Official Use Only / Computer virus / Trojan horse / Torpig / Malware / Botnets / Rootkits

FOUO: SECURITY 1 Executive Summary On 2012, NBNCERT logged an investigation related to a suspected infected host on the NBNCO internal network. The host was "beaconing" to a server located in

Add to Reading List

Source URL: www.nbnco.com.au

Language: English - Date: 2015-03-15 14:57:04
14Multi-agent systems / Botnets / Cyberwarfare / Malware / Srizbi botnet / Storm botnet / Torpig / Mebroot / Fast flux / Computing / Spamming / Computer network security

Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Department of Computer S

Add to Reading List

Source URL: www.catonmat.net

Language: English - Date: 2010-04-12 16:52:45
15System software / Mebroot / Torpig / Franz Melde / Dropbox / Master boot record / Software / Rootkits / Computing

Melde- und Analysestelle Informationssicherung MELANI Torpig/Mebroot Reverse Code Engineering (RCE) Andreas Greulich, MELANI

Add to Reading List

Source URL: www.csnc.ch

Language: English - Date: 2015-02-10 04:35:28
16Phishing / Social engineering / Torpig / Crimeware / Password / Form grabbing / Credit card / 99942 Apophis / Cybercrime / Malware / Spamming

Counter-Intelligence Against the Quickest Adversary Lance James Numbers

Add to Reading List

Source URL: antispywarecoalition.org

Language: English - Date: 2008-02-01 18:58:57
17Phishing / Social engineering / Torpig / Crimeware / Password / Form grabbing / Credit card / 99942 Apophis / Cybercrime / Malware / Spamming

Counter-Intelligence Against the Quickest Adversary Lance James Numbers

Add to Reading List

Source URL: www.antispywarecoalition.org

Language: English - Date: 2008-02-01 18:58:57
18Internet / Computer crimes / Social engineering / Decepticons / Border Gateway Protocol / Phishing / Request Tracker / Torpig / Megatron / Fictional technology / Predacons / Computing

Redesigning CERT.at’s incident handling capabilities – cherrypicking and learning from AH and Megatron L. Aaron Kaplan 

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2012-05-14 06:32:04
19Zeus / Torpig / Malware / Computer emergency response team / Rootkits / Botnets / Mebroot

Microsoft PowerPoint - Cert-Lexsi-DeadAngle-PRG-vs-Torpig.ppt [Mode de compatibilité]

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2009-02-05 11:24:01
20Botnets / Multi-agent systems / Malware / Cyberwarfare / Rootkits / Torpig / Srizbi botnet / Mebroot / Fast flux / Computing / Spamming / Computer network security

Malware Analysis Analysis of a

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2013-08-28 21:33:56
UPDATE