Trojan horses

Results: 71



#Item
61Computer crimes / Adware / Zlob trojan / Scareware / Malware / System software / Trojan horses

June Fraud Alert 1 page.pub

Add to Reading List

Source URL: www.co.weld.co.us

Language: English - Date: 2014-04-26 02:19:51
62Cyberwarfare / Malware / Computer virus / Avira / AutoRun / Rootkits / Trojan horses / System software / Antivirus software / Computer security

Trojan-Spy.0485 And Malware-Cryptor.Win32.Inject.gen.2 Review Kupreev Oleg

Add to Reading List

Source URL: www.f-secure.com

Language: English - Date: 2010-07-15 07:46:17
63Procedural programming languages / C / ALGOL 68 / Printf format string / D / Fortran / Unix / Quine / PL/I / Computing / Computer programming / Software engineering

TURING AWARD LECTURE Reflections on Trusting Trust To what extent should one trust a statement that a program is free of Trojan horses? Perhaps it is more important to trust the people who wrote the software.

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2003-01-28 10:22:55
64Vundo / Botnets / Antivirus software / Social engineering / Rogue software / Computer virus / Browser Helper Object / Zeus / Malware / System software / Trojan horses

Malware Analysis: Trojan Kazy (Ponik and Vundo)      

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-01-28 11:37:07
65Computing / System software / Antivirus software / Malware / Computer virus / Svchost.exe / Trojan horses / Remote administration software / Email / Software

CITIZEN LAB TECHNICAL BRIEF 001 IEXPL0RE RAT BY SETH HARDY | AUGUST 2012

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2012-09-07 12:03:21
66Ransomware / Software / Rogue software / Scareware / Trojan horses / Malware / System software / Extortion

Microsoft Word - RansomwareArticle.doc

Add to Reading List

Source URL: www.europol.europa.eu

Language: English - Date: 2013-02-14 13:09:22
67Social engineering / Antivirus software / Trojan horses / Computer network security / Ransomware / Smartphone / Koobface / Computer virus / PGPCoder / Malware / System software / Software

PandaLabs annual Report 2012 Summary 01 Introduction

Add to Reading List

Source URL: press.pandasecurity.com

Language: English - Date: 2013-02-06 04:33:26
68Remote administration software / Trojan horses / Spyware / Internet protocols / NetBus / Beast / Keystroke logging / Open port / Back Orifice / Malware / System software / Software

Companion Virus Using network neighborhood Spreads over the network Backdoor on TCP port 7597

Add to Reading List

Source URL: www.mindcert.com

Language: English - Date: 2008-06-25 10:05:28
69Cyberwarfare / Trojan horses / Computer security / Rootkit / Alureon / Windows API / Unified Extensible Firmware Interface / Dropper / System software / Software / Malware

The Evolution of TDL: Conquering x64 Revision 1.1

Add to Reading List

Source URL: www.eset.com

Language: English - Date: 2011-07-01 12:26:46
70Computer security / Rootkits / Trojan horses / Antivirus software / Keystroke logging / Computer virus / Alureon / Extended Copy Protection / System software / Cyberwarfare / Malware

ZeroAccess – an advanced kernel mode rootkit Marco Giuliani

Add to Reading List

Source URL: pxnow.prevx.com

Language: English - Date: 2011-04-11 05:28:59
UPDATE