Listing 1 - 10 of 34 | << page >> |
Sort by
|
Choose an application
Malware (Computer software) --- Computer code, Malicious --- Malevolent software --- Malicious computer code --- Malicious software --- Software, Malevolent --- Software, Malicious --- Computer software
Choose an application
Malware (Computer software) --- Computer software --- Computer code, Malicious --- Malevolent software --- Malicious computer code --- Malicious software --- Software, Malevolent --- Software, Malicious
Choose an application
As increasingly sophisticated and evasive malware attacks continue to emerge, more effective detection solutions to tackle the problem are being sought through the application of advanced machine learning techniques. This reprint presents several advances in the field including: a new method of generating adversarial samples through byte sequence feature extraction using deep learning; a state-of-the-art comparative evaluation of deep learning approaches for mobile botnet detection; a novel visualization-based approach that utilizes images for Android botnet detection; a study on the detection of drive-by exploits in images using deep learning; etc. Furthermore, this reprint presents state-of-the-art reviews about machine learning-based detection techniques that will increase researchers' knowledge in the field and enable them to identify future research and development directions.
Malware (Computer software) --- Computer code, Malicious --- Malevolent software --- Malicious computer code --- Malicious software --- Software, Malevolent --- Software, Malicious --- Computer software
Choose an application
The Focus of the conference this year is twofold (1) Security architectures & reformulated solutions, and (2) The demise of traditional end point protection The topics are described in the paragraphs below In the past, the security protection model that most organizations applied to protect their infrastructure was simply the Everything but the Kitchen Sink model meaning, add devices that protect the enterprise network perimeter (Trusted Zone), add devices that protect your mobile device, add devices that protect your data base, and on, and on In essence, this model simply amounted to the accumulation of security devices Given the increased number, scope, and frequency of breaches in the last few years, it is clear that this model has failed Security products are no longer about single or even multiple independent security devices each providing close as we can get to perfect standalone protection MALCON will explore alternative architectures and solutions.
Malware (Computer software) --- Computer networks --- Computer software --- Security measures --- Computer code, Malicious --- Malevolent software --- Malicious computer code --- Malicious software --- Software, Malevolent --- Software, Malicious
Choose an application
Malware (Computer software) --- Computer networks --- Computer software --- Security measures --- Computer code, Malicious --- Malevolent software --- Malicious computer code --- Malicious software --- Software, Malevolent --- Software, Malicious
Choose an application
Analyze malware using Cuckoo Sandbox Learn how to analyze malware in a straightforward way with minimum technical skills Understand the risk of the rise of document-based malware Enhance your malware analysis concepts through illustrations, tips and tricks, step-by-step instructions, and practical real-world scenarios In Detail Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of seconds, Cuckoo will provide you with some detailed results outlining what said file did when executed inside an isolated environment. Cuckoo Malware Analysis is a hands-on guide that will provide you with everything you need to know to use Cuckoo Sandbox with added tools like Volatility, Yara, Cuckooforcanari, Cuckoomx, Radare, and Bokken, which will help you to learn malware analysis in an easier and more efficient way. Cuckoo Malware Analysis will cover basic theories in sandboxing, automating malware analysis, and how to prepare a safe environment lab for malware analysis. You will get acquainted with Cuckoo Sandbox architecture and learn how to install Cuckoo Sandbox, troubleshoot the problems after installation, submit malware samples, and also analyze PDF files, URLs, and binary files. This book also covers memory forensics – using the memory dump feature, additional memory forensics using Volatility, viewing result analyses using the Cuckoo analysis package, and analyzing APT attacks using Cuckoo Sandbox, Volatility, and Yara. Finally, you will also learn how to screen Cuckoo Sandbox against VM detection and how to automate the scanning of e-mail attachments with Cuckoo.
Malware (Computer software) --- Computer viruses. --- Software viruses --- Viruses, Computer --- Computer crimes --- Computer code, Malicious --- Malevolent software --- Malicious computer code --- Malicious software --- Software, Malevolent --- Software, Malicious --- Computer software
Choose an application
Malware (Computer software) --- Computer security --- Prevention. --- Standards. --- Computer code, Malicious --- Malevolent software --- Malicious computer code --- Malicious software --- Software, Malevolent --- Software, Malicious --- Computer software
Choose an application
How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed fo
Computer networks --- Malware (Computer software) --- Security measures. --- Computer code, Malicious --- Malevolent software --- Malicious computer code --- Malicious software --- Software, Malevolent --- Software, Malicious --- Computer software --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security
Choose an application
Phishing --- Malware (Computer software) --- Brand spoofing (Internet fraud) --- Carding (Internet fraud) --- Spoofing, Brand (Internet fraud) --- Identity theft --- Internet fraud --- Computer code, Malicious --- Malevolent software --- Malicious computer code --- Malicious software --- Software, Malevolent --- Software, Malicious --- Computer software --- Prevention
Choose an application
Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, recovery methods, and legal issues related to reporting ransomware incidents to authorities and other affected parties. This book also teaches you how to develop a ransomware incident response plan to minimize ransomware damage and recover normal operations quickly. Ransomware is a category of malware that can encrypt your computer and mobile device files until you pay a ransom to unlock them. Ransomware attacks are considered the most prevalent cybersecurity threats today—the number of new ransomware variants has grown 30-fold since 2015 and they currently account for roughly 40% of all spam messages. Attacks have increased in occurrence from one every 40 seconds to one every 14 seconds. Government and private corporations are targets. Despite the security controls set by organizations to protect their digital assets, ransomware is still dominating the world of security and will continue to do so in the future. Ransomware Revealed discusses the steps to follow if a ransomware infection occurs, such as how to pay the ransom through anonymous payment methods, perform a backup and restore your affected files, and search online to find a decryption tool to unlock (decrypt) your files for free. Mitigation steps are discussed in depth for both endpoint devices and network systems. You will: Be aware of how ransomware infects your system Comprehend ransomware components in simple terms Recognize the different types of ransomware families Identify the attack vectors employed by ransomware to infect computer systems Know how to prevent ransomware attacks from successfully comprising your system and network (i.e., mitigation strategies) Know what to do if a successful ransomware infection takes place Understand how to pay the ransom as well as the pros and cons of paying Set up a ransomware response plan to recover from such attacks.
Data protection. --- Security. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Malware (Computer software) --- Computer code, Malicious --- Malevolent software --- Malicious computer code --- Malicious software --- Software, Malevolent --- Software, Malicious --- Computer software
Listing 1 - 10 of 34 | << page >> |
Sort by
|