Search results
Jump to navigation
Jump to search
- ...to-use attack application that until recently has been selling for around $1,000. Responsibility for a large-scale attack launched from thousands of hij925 bytes (134 words) - 16:29, 7 February 2015
- ...ve since seen it for sale on Russian underground forums. As seen in Figure 1, below, the ransomware crimeware kit is being sold under the name of Silenc857 bytes (127 words) - 21:49, 5 August 2015
- ...sample (MD5 “1CA4E2F3C8C327F8D823EB0E94896538″) on the following topics: (1) Encryption & tampering detection mechanism, (2) Functionalities, (3) Hooki945 bytes (131 words) - 21:26, 5 August 2015
- |Abstract=The FraudAction Research Lab has recently analyzed a ZeuS 2.1.0.1 variant downloading an additional Trojan into infected PCs by fetching a Ci ZeuS 2.1.0.1 is a commercially available upgrade[1] of the ZeuS 2.0.8.9 banking Trojan (which was the last “true” variant982 bytes (129 words) - 22:51, 5 August 2015
- |Description=The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls710 bytes (101 words) - 12:15, 19 March 2016
- ...malware encrypts data on the hard drive and displays a message (see Figure 1) in German that translates to “Your system has been infected with a Windo1,022 bytes (140 words) - 22:04, 5 August 2015
- ...summarize various aspects of the inner workings of binary variants A and B,1 which were the first in a chain of recent revisions aimed to keep this epid970 bytes (147 words) - 18:52, 7 August 2015
- ...ring its loader and the main executable file – Last MBR partition sector + 1 for loader and Last MBR partition sector + 0×19 for the main rootkit drive1 KB (153 words) - 13:04, 31 July 2015
- ...exploit against Android platform 2.3 (which was discovered in April 2011 [1]). As this is the first time such malware has been identified, it is not su1 KB (145 words) - 21:31, 5 August 2015
- |Date=1 juin 20121 KB (160 words) - 21:51, 5 August 2015
- After she told me 1,000 times she had not bought anything in that store, I decided to take a lo998 bytes (165 words) - 22:26, 5 August 2015
- Figure 1. Silent Locker Control Panel login1 KB (161 words) - 21:51, 5 August 2015
- ...1/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?_r=1 www.nytimes.com |Date=1 juin 20121 KB (162 words) - 16:26, 7 February 2015
- ...e PDF reader to download an executable from a known malicious URL (Malware 1 - From Exploit to Infection). In this post I will look at how the malware s1 KB (164 words) - 13:00, 31 July 2015
- 1) ThiefX : Version: 1.3 qui est un password grabber, il permet de récupérer les mots de passe d 2) Substitution. Version: 1.0. il permet d'éditer le fichier host des victimes.2 KB (331 words) - 18:55, 30 July 2015
- ...imes and that the current size of the botnet is somewhere in the region of 1 million machines spread throughout the world, but with the majority located1 KB (201 words) - 16:28, 7 February 2015
- |Date=1 février 20121 KB (169 words) - 22:11, 5 August 2015
- |ISBN=978-1-4244-7551-31 KB (202 words) - 16:27, 7 February 2015
- ...simply register a domain and point it to this infrastructure. Illustration 1 is a screen shot advertising the exploit kit and the actual cost to rent it1 KB (210 words) - 16:29, 7 February 2015
- ...fied four fundamental socioeconomic mechanisms offered by carding forums: (1)1 KB (186 words) - 15:15, 7 August 2015