all things security
Showing 1 - 7 of 7 RSS Feed

Files

Metamorphic Worms: Can They Remain Hidden?
Posted Feb 2, 2015
Authored by Reethi Kotti

Whitepaper that discusses types of computer worms and how metamorphic worms differ from the rest.

tags | paper, worm
MD5 | 4ae6e561c0c9dbfec13ce2965d4d8a49
To Kill A Centrifuge
Posted Nov 21, 2013
Authored by Ralph Langner | Site langner.com

Whitepaper called To Kill a Centrifuge - A Technical Analysis of What Stuxnet's Creators Tried to Achieve.

tags | paper, worm
MD5 | 378b0d6b52e08452f849a30292b24bad
How Conficker Makes Use Of MS08-067
Posted Apr 15, 2009
Authored by Bui Quang Minh, Hoang Xuan Minh

Whitepaper called How Conficker makes use of MS08-067.

tags | paper, worm
MD5 | 89a1d4338199280d5e76e4e9fa342747
Using ShoutBoxes To Control Malicious Software
Posted Apr 14, 2009
Authored by Feathers McGraw

Whitepaper called Using "ShoutBoxes" to control malicious software.

tags | paper, worm
MD5 | 551ed6acbcc96e5e1cda2bfd514bbbeb
InqTanaThroughTheEyes.txt
Posted Feb 26, 2006
Authored by Kevin Finisterre

Whitepaper written to address both FUD and rumors surrounding the release of detailed information about the InqTana proof of concept worm.

tags | paper, worm, proof of concept
MD5 | bf9d8ed44386ceecb2b2acec222a0edb
symbian.txt
Posted Dec 11, 2004
Authored by Geza

Brief analysis on the Symb/Cabir-B worm that was written specifically for the Nokia Series 60 mobile phones running the Symbian operating system.

tags | paper, worm
MD5 | f28694cfcdc0b7e360e68d2a26810386
Application_Worms.pdf
Posted Mar 30, 2004
Site imperva.com

White-paper from Imperva's Application Defense Center discussing the possibility of automated, self-propagating attacks on custom web application code. It shows that such attacks are not only feasible but that their theoretical success rate is far great than worms targeting commercial infrastructure.

tags | paper, worm, web
MD5 | c9c0bed70fb5d395c40b3e6e29eec58c
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Phishers Getting Smarter By Making Use Of User Location
Posted Oct 20, 2017

tags | headline, malware, cybercrime, fraud, phish
OSX Malware Spread Via Compromised Software Downloads
Posted Oct 20, 2017

tags | headline, malware, apple
Canadian Spooks Release Their Own Malware Detection Tool
Posted Oct 20, 2017

tags | headline, government, malware, canada, spyware
Judge: MalwareTech Is No Longer Under Curfew, GPS Monitoring
Posted Oct 20, 2017

tags | headline, hacker, government, malware, usa, conference
Microsoft Mocks Google For Failed Security Fix Deployment Methodology
Posted Oct 19, 2017

tags | headline, microsoft, flaw, google, chrome
Malicious Mineraft Apps In Google Play Enslave Your Device To A Botnet
Posted Oct 19, 2017

tags | headline, malware, microsoft, phone, botnet, google
OAIC Received 114 Voluntary Data Breach Notifications In Two Years
Posted Oct 19, 2017

tags | headline, hacker, privacy, australia, data loss
US-CERT Predicts Machine Learning To Become Security Risk
Posted Oct 19, 2017

tags | headline, flaw
ATM Malware Available Online For Online $5,000
Posted Oct 18, 2017

tags | headline, malware, bank, cybercrime, fraud
Oracle Swats 252 Bugs In Patch Update
Posted Oct 18, 2017

tags | headline, flaw, patch, oracle
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close