Source |
Checkpoint |
Identifiant |
4302 |
Date de publication |
2016-07-11 09:13:18 (vue: 2016-07-11 09:13:18) |
Titre |
DIY Attribution, Classification, and In-depth Analysis of Mobile Malware (Recyclage) |
Texte |
The security research community has been dealing with malware attribution and classification for decades. The benefits of this process for PC-based malware are myriad and well known. Check Point has followed the same process for multiple malware campaigns during the last year, including Volatile Cedar, Rocket-Kitten, and the Nuclear Exploit Kit. In fact, the PC […] |
Envoyé |
Oui |
Condensat |
analysis appeared are attribution based been benefits blog campaigns cedar check classification community dealing decades depth diy during exploit fact first followed has including kit kitten known last malware mobile multiple myriad nuclear point post process research rocket same security volatile well year |
Tags |
|
Stories |
|
Notes |
|
Move |
|
Source |
Checkpoint |
Identifiant |
263907 |
Date de publication |
2014-12-31 16:47:54 (vue: 2014-12-31 16:47:54) |
Titre |
Mobile Security 2014: The Year In Review |
Texte |
The post Mobile Security 2014: The Year In Review |
Envoyé |
Oui |
Condensat |
2014: appeared blog check first mobile point post review security year |
Tags |
|
Stories |
|
Notes |
|
Move |
|