Malware

Results: 7286



#Item
981The Home and Cdorked campaigns Widespread malicious modification of webservers for mass malware distribution $ whoami Sébastien Duquette

The Home and Cdorked campaigns Widespread malicious modification of webservers for mass malware distribution $ whoami Sébastien Duquette

Add to Reading List

Source URL: www.botconf.eu

Language: English - Date: 2014-12-07 18:23:12
    982The Need for a Coherent Web Security Policy Framework Jeff Hodges and Andy Steingruebl PayPal, Inc. {Jeff.Hodges,asteingruebl}@PayPal.com Abstract Web-based malware and attacks are proliferating

    The Need for a Coherent Web Security Policy Framework Jeff Hodges and Andy Steingruebl PayPal, Inc. {Jeff.Hodges,asteingruebl}@PayPal.com Abstract Web-based malware and attacks are proliferating

    Add to Reading List

    Source URL: kingsmountain.com

    Language: English - Date: 2011-06-07 10:44:29
      983Endpoint Protection  ESET Endpoint Antivirus for OS X delivers award-winning cross-platform protection for multi-platform environments. It protects against malware and spyware

      Endpoint Protection ESET Endpoint Antivirus for OS X delivers award-winning cross-platform protection for multi-platform environments. It protects against malware and spyware

      Add to Reading List

      Source URL: d1q82mpda228xr.cloudfront.net

      Language: English - Date: 2015-09-10 09:33:17
        984On Challenges in Evaluating Malware Clustering Peng Li1 , Limin Liu2 , Debin Gao3 , and Michael K. Reiter1 1 2  Department of Computer Science, University of North Carolina, Chapel Hill, NC, USA

        On Challenges in Evaluating Malware Clustering Peng Li1 , Limin Liu2 , Debin Gao3 , and Michael K. Reiter1 1 2 Department of Computer Science, University of North Carolina, Chapel Hill, NC, USA

        Add to Reading List

        Source URL: flyer.sis.smu.edu.sg

        Language: English - Date: 2014-12-17 01:40:50
          985Keeping Secrets: Good Password Practice Everyone knows that passwords are important, but how do you keep them safe? David Harley, BA CISSP FBCS CITP Director of Malware Intelligence

          Keeping Secrets: Good Password Practice Everyone knows that passwords are important, but how do you keep them safe? David Harley, BA CISSP FBCS CITP Director of Malware Intelligence

          Add to Reading List

          Source URL: go.eset.com

          Language: English - Date: 2011-02-28 17:14:04
            986Anti-Virus Comparative Detection of widely spreading malware Date: OctoberLast revision: 15th October 2006

            Anti-Virus Comparative Detection of widely spreading malware Date: OctoberLast revision: 15th October 2006

            Add to Reading List

            Source URL: www.av-comparatives.org

            Language: English - Date: 2013-04-16 06:56:25
              987Trends for 2013 Astounding growth of mobile malware ESET Latin America’s Lab

              Trends for 2013 Astounding growth of mobile malware ESET Latin America’s Lab

              Add to Reading List

              Source URL: go.eset.com

              Language: English - Date: 2013-01-24 11:01:38
                988Endpoint Protection  ESET Endpoint Antivirus for OS X delivers award-winning cross-platform protection for multi-platform environments. It protects against malware and spyware

                Endpoint Protection ESET Endpoint Antivirus for OS X delivers award-winning cross-platform protection for multi-platform environments. It protects against malware and spyware

                Add to Reading List

                Source URL: www.eset.it

                Language: English - Date: 2015-09-08 07:07:59
                  989Sound and Precise Malware Analysis for Android via Pushdown Reachability and Entry-Point Saturation Shuying Liang, Andrew W. Keep, Matthew Might, Steven Lyde, Thomas Gilray, and Petey Aldous University of Utah

                  Sound and Precise Malware Analysis for Android via Pushdown Reachability and Entry-Point Saturation Shuying Liang, Andrew W. Keep, Matthew Might, Steven Lyde, Thomas Gilray, and Petey Aldous University of Utah

                  Add to Reading List

                  Source URL: shuying.me

                  Language: English
                    990Automatic Reverse Engineering of Malware Emulators Monirul Sharif Andrea Lanzi Jonathon Giffin Wenke Lee School of Computer Science, Georgia Institute of Technology {msharif, andrea, giffin, wenke}@cc.gatech.edu  Abstrac

                    Automatic Reverse Engineering of Malware Emulators Monirul Sharif Andrea Lanzi Jonathon Giffin Wenke Lee School of Computer Science, Georgia Institute of Technology {msharif, andrea, giffin, wenke}@cc.gatech.edu Abstrac

                    Add to Reading List

                    Source URL: www.iseclab.org

                    Language: English