Trojan horses

Results: 71



#Item
1FROM RUSSIA TO HOLLYWOOD:  TURNING THE TABLES ON A SPYEYE CYBERCRIME RING

FROM RUSSIA TO HOLLYWOOD: TURNING THE TABLES ON A SPYEYE CYBERCRIME RING

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2012-01-26 20:15:24
22016 IEEE 36th International Conference on Distributed Computing Systems  CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data Nolen Scaife

2016 IEEE 36th International Conference on Distributed Computing Systems CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data Nolen Scaife

Add to Reading List

Source URL: www.cise.ufl.edu

Language: English
3RSA 2012 CYBERCRIME TRENDS REPORT The Current State of Cybercrime and What to Expect in 2012 Cybercrime continues to show no signs of slowing down. In fact, 2011 marked a year of new advanced threats and an increased lev

RSA 2012 CYBERCRIME TRENDS REPORT The Current State of Cybercrime and What to Expect in 2012 Cybercrime continues to show no signs of slowing down. In fact, 2011 marked a year of new advanced threats and an increased lev

Add to Reading List

Source URL: www.cs.toronto.edu

Language: English - Date: 2012-05-28 11:33:54
4Ransomware phenomenon Extortion scheme Archetype of modern malware Conclusion  Comparative analysis of various ransomware virii

Ransomware phenomenon Extortion scheme Archetype of modern malware Conclusion Comparative analysis of various ransomware virii

Add to Reading List

Source URL: esec-lab.sogeti.com

Language: English - Date: 2016-07-01 12:08:46
5April 2015 Feature Article: Emerging Malware Table of Contents Emerging Malware ...........................................................................................................................................

April 2015 Feature Article: Emerging Malware Table of Contents Emerging Malware ...........................................................................................................................................

Add to Reading List

Source URL: virusradar.com

Language: English - Date: 2015-06-02 03:02:53
6How-to guide. IMPORTANT! Make sure you remove the malware from your system first, otherwise it will repeatedly lock your system or encrypt files. Any reliable antivirus solution can do this for you. To decrypt the files:

How-to guide. IMPORTANT! Make sure you remove the malware from your system first, otherwise it will repeatedly lock your system or encrypt files. Any reliable antivirus solution can do this for you. To decrypt the files:

Add to Reading List

Source URL: www.nomoreransom.org

Language: English - Date: 2016-07-25 04:33:08
7The Citizen Lab  Research Brief FebruaryMapping Hacking Team’s “Untraceable” Spyware

The Citizen Lab Research Brief FebruaryMapping Hacking Team’s “Untraceable” Spyware

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2015-03-18 14:57:35
8TURING AWARD LECTURE  Reflections on Trusting Trust To wh:t extent sh.ou!d one tr~st a statement that a program is free of Trojan horses. Perhaps It IS more Important to trust the people who wrote the software.

TURING AWARD LECTURE Reflections on Trusting Trust To wh:t extent sh.ou!d one tr~st a statement that a program is free of Trojan horses. Perhaps It IS more Important to trust the people who wrote the software.

Add to Reading List

Source URL: informatiques-orphelines.fr

Language: English - Date: 2016-05-06 15:59:41
    9Research Brief March 2013 The Citizen Lab  You Only Click Twice:

    Research Brief March 2013 The Citizen Lab You Only Click Twice:

    Add to Reading List

    Source URL: citizenlab.org

    Language: English - Date: 2015-06-02 11:36:57
    10TURING AWARD LECTURE  Reflections on Trusting Trust To what extent should one trust a statement that a program is free of Trojan horses? Perhaps it is more important to trust the people who wrote the software.

    TURING AWARD LECTURE Reflections on Trusting Trust To what extent should one trust a statement that a program is free of Trojan horses? Perhaps it is more important to trust the people who wrote the software.

    Add to Reading List

    Source URL: www.ece.cmu.edu

    Language: English - Date: 2002-10-03 01:20:59