Movatterモバイル変換


[0]ホーム

URL:


Emm et al., 2016 - Google Patents

IT threat evolution in Q3 2016

Emm et al., 2016

ViewPDF
Document ID
3462839863104591803
Author
Emm D
Unuchek R
Garnaeva M
Liskin A
Makrushin D
Sinitsyn F
Publication year
Publication venue
Kaspersky Labs, Moscow, Russia, Tech. Rep

External Links

Snippet

Targeted attack campaigns don't need to be technically advanced in order to be successful. In July 2016 we reported on a group called Dropping Elephant (also known as 'Chinastrats' and 'Patchwork'). Using a combination of social engineering, old exploit code and some …
Continue reading atm.a51.nl (PDF) (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/556Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs

Similar Documents

PublicationPublication DateTitle
TuleunAnalysis of cybercrimes, major cyber security attacks and the overall economic impact on Nigeria
Sabillon et al.Cybercrime and cybercriminals: A comprehensive study
Broadhurst et al.Malware trends on ‘darknet’crypto-markets: Research review
PandeIntroduction to cyber security
Ben-David et al.Computing security in the developing world: A case for multidisciplinary research
Ozkaya et al.Hands-On Cybersecurity for Finance: Identify vulnerabilities and secure your financial services from security breaches
BarrosoBotnets-the silent threat
Iovan et al.From cyber threats to cyber-crime
Emm et al.IT threat evolution in Q2 2015
BroadhurstCybercrime: Thieves, swindlers, bandits, and privateers in cyberspace
SonowalIntroduction to phishing
OmarA world of cyber attacks (a survey)
DS et al.A Systematic Study on Ransomware Attack: Types, Phases and Recent Variants
ScharfmanCrypto phishing and spoofing scams
Emm et al.IT threat evolution in Q3 2016
MacEwanA tricky situation: Deception in cyberspace
SärökaariPhishing attacks and mitigation tactics
Droppa et al.Analysis of cybersecurity in the real environment
Emm et al.It threat evolution in Q2 2016
TĂBUȘCĂ et al.CYBERSECURITY EDUCATION-THE NEW LITERACY.
SowrirajanA literature based study on cyber security vulnerabilities
MitrăThe Structure of Cyber Attacks
FurnellInternet threats to end-users: Hunting easy prey
KrishnanExploitation of Human Trust, Curiosity and Ignorance by Malware
Broadhurst et al.Cybercrime update: trends and developments

[8]
ページ先頭

©2009-2025 Movatter.jp