Search results

Page title matches

  • .../Security-Field-Advisory-Dexter-POS-Malware_20121227.pdf |title=Dexter POS Malware Threat ...rminals |url=https://arstechnica.com/information-technology/2012/12/dexter-malware-steals-credit-card-data-from-point-of-sale-terminals/ |access-date=2022-04-
    7 KB (876 words) - 00:10, 26 September 2023
  • {{Short description|Computer malware}} ...security/iot-malware-clashes-in-a-botnet-territory-battle.html | title=IoT malware clashes in a botnet territory battle | publisher=[[PC World]] | date=April
    8 KB (946 words) - 00:11, 26 September 2023
  • {{Short description|Malware that turns computer systems running Linux into remotely controlled "bots"}} ...6 | url-status=dead }}</ref> a [[White hat (computer security)|white hat]] malware research group, and has been used in some of the largest and most disruptiv
    38 KB (4,639 words) - 00:13, 26 September 2023
  • {{Short description|Sophisticated malware}} ...</ref> ''The Intercept'' provided samples of Regin for download, including malware discovered at a Belgian telecommunications provider, [[Belgacom]].<ref name
    12 KB (1,574 words) - 00:15, 26 September 2023
  • {{short description|Malware package}} ==Malware==
    4 KB (568 words) - 00:18, 26 September 2023
  • | type = [[Malware]] ...ttack-ukraine-russia-code-crashed-the-world/ |url-status=live }}</ref> The malware targets [[Microsoft Windows]]–based systems, infecting the [[master boot
    51 KB (6,024 words) - 00:15, 26 September 2023
  • {{short description|Cyberespionage malware}} ...2012 and uncovered in January 2013 by Russian firm [[Kaspersky Lab]]. The malware was reportedly operating worldwide for up to five years prior to discovery,
    9 KB (1,250 words) - 00:15, 26 September 2023

Page text matches

  • {{Short description|Distributor of malware}} The '''Necurs botnet''' is a distributor of many pieces of malware, most notably [[Locky]].
    2 KB (246 words) - 00:13, 26 September 2023
  • {{Short description|Android Malware, discovered in February 2016}} '''HummingBad''' is [[Linux malware|Android malware]], discovered by [[Check Point]] in February 2016.<ref>{{cite web|url=http:
    3 KB (383 words) - 00:11, 26 September 2023
  • {{short description|Malware package}} ==Malware==
    4 KB (568 words) - 00:18, 26 September 2023
  • {{Short description|Computer malware}} ...security/iot-malware-clashes-in-a-botnet-territory-battle.html | title=IoT malware clashes in a botnet territory battle | publisher=[[PC World]] | date=April
    8 KB (946 words) - 00:11, 26 September 2023
  • .../Security-Field-Advisory-Dexter-POS-Malware_20121227.pdf |title=Dexter POS Malware Threat ...rminals |url=https://arstechnica.com/information-technology/2012/12/dexter-malware-steals-credit-card-data-from-point-of-sale-terminals/ |access-date=2022-04-
    7 KB (876 words) - 00:10, 26 September 2023
  • {{Short description|Cybercrime malware botnet}} ...[botnet]], operating at least since 2006, and one of the major botnets and malware distributors on the Internet. In January 2013, its operations were disrupte
    5 KB (652 words) - 00:18, 26 September 2023
  • '''''Code Shikara''''' is a [[computer worm]], related to the [[Dorkbot (malware)|Dorkbot family]], that attacks through [[Social engineering attack|social ...ling usernames and passwords, the [[bot herder]] may also order additional malware downloads.
    5 KB (723 words) - 00:09, 26 September 2023
  • .../17/spam_botnet_trends/ |title=Undead botnets blamed for big rise in email malware; Grave concern over reanimated cyber-corpses |first=John |last=Leyden |work *[[Malware]]
    3 KB (468 words) - 00:12, 26 September 2023
  • {{short description|Destructive malware targeting IoT devices}} '''BrickerBot''' was [[malware]] that attempted to [[Denial-of-service_attack#Permanent_denial-of-service_
    4 KB (520 words) - 00:08, 26 September 2023
  • The name of this malware is based on the fact that early versions of it contained the string "NetTra ...f countries.<ref>{{Cite news|url=https://www.csoonline.com/article/2131350/malware-cybercrime/cyberespionage-campaign---39-nettraveler--39--siphoned-data-from
    4 KB (544 words) - 00:13, 26 September 2023
  • {{Short description|Android based malware}} ...re/|title=DIY Attribution, Classification, and In-depth Analysis of Mobile Malware|date=2016-07-11|website=Check Point Blog|access-date=2016-10-09}}</ref>
    20 KB (2,441 words) - 00:16, 26 September 2023
  • {{short description|Cyberespionage malware}} ...2012 and uncovered in January 2013 by Russian firm [[Kaspersky Lab]]. The malware was reportedly operating worldwide for up to five years prior to discovery,
    9 KB (1,250 words) - 00:15, 26 September 2023
  • {{Short description|Sophisticated malware}} ...</ref> ''The Intercept'' provided samples of Regin for download, including malware discovered at a Belgian telecommunications provider, [[Belgacom]].<ref name
    12 KB (1,574 words) - 00:15, 26 September 2023
  • ...V0UP/Malware-caused-Indias-biggest-debit-card-fraud-Audit-repor.html|title=Malware caused India's biggest debit card data breach: Audit report|last=Gopakumar| ...erformed by SISA Information Security reports that the breach was due to [[malware]] injected into the [[payment gateway]] network of [[Hitachi]] Payment Syst
    3 KB (434 words) - 00:06, 26 September 2023
  • ...V0UP/Malware-caused-Indias-biggest-debit-card-fraud-Audit-repor.html|title=Malware caused India's biggest debit card data breach: Audit report|last=Gopakumar| ...erformed by SISA Information Security reports that the breach was due to [[malware]] injected into the [[payment gateway]] network of [[Hitachi]] Payment Syst
    3 KB (443 words) - 22:39, 13 August 2023
  • .../security/portal/Threat/Encyclopedia/Search.aspx?query=Bredolab Search the malware encyclopedia: Bredolab], Microsoft.com</ref> was a Russian<ref name=autogen ...form of propagation was through sending malicious e-mails that included [[malware]] attachments which would infect a computer when opened, effectively turnin
    9 KB (1,258 words) - 00:08, 26 September 2023
  • {{Short description|Windows-platform based malware}} ...ties, Sality is considered one of the most complex and formidable forms of malware to date.
    25 KB (3,771 words) - 00:16, 26 September 2023
  • ...'''Waledpak''', was a [[botnet]] mostly involved in [[e-mail spam]] and [[malware]]. In March 2010 the botnet was taken down by [[Microsoft]].<ref name="ther *[[Command and control (malware)]]
    4 KB (612 words) - 00:18, 26 September 2023
  • * [[Mirai (malware)]] * [[Hajime (malware)]]
    7 KB (971 words) - 00:09, 26 September 2023
  • ...nk credentials and credit cards.<ref name=washingtontimes/> After that the malware would attempt to self-propagate to other connectible systems using various After completing its initial infection routine the malware would contact a [[Botnet#Command_and_control|command-and-control server]] w
    11 KB (1,517 words) - 00:12, 26 September 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)