1220:. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan. While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed. Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection.
6781:
1419:; and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts. The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land. This reduces the amount of forensic artifacts available to analyze. Recently these types of attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018. Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits.
1406:
memory. Because antivirus does not typically scan memory and only scans files on the drive, this allows the malware to evade detection. Advanced malware has the ability to transform itself into different variations, making it less likely to be detected due to the differences in its signatures. This is known as polymorphic malware. Other common techniques used to evade detection include, from common to uncommon: (1) evasion of analysis and detection by
6304:
723:, created in 1986 by the Farooq Alvi brothers in Pakistan. Malware distributors would trick the user into booting or running from an infected device or medium. For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it. Anyone who then attached the stick to another computer set to autorun from USB would in turn become infected, and also pass on the infection in the same way.
1805:(i.e. completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world. However, malware can still cross the air gap in some situations, not least due to the need to introduce software into the air-gapped network and can damage the availability or integrity of assets thereon.
867:. Malware is used broadly against government or corporate websites to gather sensitive information, or to disrupt their operation in general. Further, malware can be used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords.
1692:
Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the
Windows registry, operating system files, and installed programs on a computer and will provide
1401:
The aim of any malware is to conceal itself from detection by users or antivirus software. Detecting potential malware is difficult for two reasons. The first is that it is difficult to determine if software is malicious. The second is that malware uses technical measures to make it more difficult to
1270:
Lock-screens, or screen lockers is a type of "cyber police" ransomware that blocks screens on
Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee. Jisut and SLocker impact Android devices more than other lock-screens, with
679:
experimented with computer viruses and confirmed
Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the subject of computer viruses. The combination of cryptographic technology
1719:
and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not. Typically, when an infected file
1274:
Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine. These types of malware then display a pop-up informing the user that their files have been encrypted and that they must pay (usually in
Bitcoin) to recover them. Some examples
1554:
Some systems allow code executed by a user to access all rights of that user, which is known as over-privileged code. This was also standard operating procedure for early microcomputer and home computer systems. Malware, running as over-privileged code, can use this privilege to subvert the system.
1405:
The most commonly employed anti-detection technique involves encrypting the malware payload in order to prevent antivirus software from recognizing the signature. Tools such as crypters come with an encrypted blob of malicious code and a decryption stub. The stub decrypts the blob and loads it into
1259:
Ransomware prevents a user from accessing their files until a ransom is paid. There are two variations of ransomware, being crypto ransomware and locker ransomware. Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and
615:, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy US$ 6 trillion in 2021, and is increasing at a rate of 15% per year. Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the
1496:. Even when new patches addressing the vulnerability have been released, they may not necessarily be installed immediately, allowing malware to take advantage of systems lacking patches. Sometimes even applying patches or installing new versions does not automatically uninstall the old versions.
1244:
are a sub-type of
Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload. It is important not to confuse a dropper with a loader or stager. A loader or stager will merely load an extension of the malware
1179:
The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered
1397:
Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis. Static analysis involves studying the software code of a potentially malicious program and producing a signature of that program. This information is then used to compare
1027:
824:
and governments to steal personal, financial, or business information. Today, any device that plugs into a USB port β even lights, fans, speakers, toys, or peripherals such as a digital microscope β can be used to spread malware. Devices can be infected during manufacturing or supply if quality
1571:
A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges. Typically, the attack succeeds because the weakest form of account security is used, which is typically a short password that can be
1410:
the environment when executed; (2) confusing automated tools' detection methods. This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware; (3) timing-based evasion. This is when malware runs at certain times or
1550:
users are over-privileged by design, in the sense that they are allowed to modify internal structures of the system. In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status. This can be because users tend to demand more
1356:
as PUPs, although they frequently carry true malware in addition to their ostensible purpose. In fact, Kammerstetter et al. (2012) estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software.
1820:
Utilizing bibliometric analysis, the study of malware research trends from 2005 to 2015, considering criteria such as impact journals, highly cited articles, research areas, number of publications, keyword frequency, institutions, and authors, revealed an annual growth rate of 34.1%.
1724:
to prevent further damage with the intention to prevent irreversible system damage. Most AVs allow users to override this behaviour. This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in
1612:
have such a large share of the market that an exploited vulnerability concentrating on either operating system could subvert a large number of systems. It is estimated that approximately 83% of malware infections between
January and March 2020 were spread via systems running
1196:
A Trojan horse misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the
4208:
1744:
that confines applications within a controlled environment, restricting their operations to authorized "safe" actions and isolating them from other applications on the host. It also limits access to system resources like memory and the file system to maintain isolation.
1295:, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.
1666:
removes malicious software from the system. Additionally, several capable antivirus software programs are available for free download from the
Internet (usually restricted to non-commercial use). Tests found some free programs to be competitive with commercial ones.
1139:
Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the
1060:
A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data). They have been likened to
1398:
scanned files by an antivirus program. Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity.
1180:"targets" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses,
1097:
to infect other computers and can copy itself without infecting files. These definitions lead to the observation that a virus requires the user to run an infected software or operating system for the virus to spread, whereas a worm spreads itself.
2969:
Those deploying
Raccoon used phishing messages and other tricks to get the malware onto potentially millions of victims' computers worldwide. Once installed, the code provided access to login credentials and other data stored on the compromised
1245:(for example a collection of malicious functions through reflective dynamic link library injection) into memory. The purpose is to keep the initial stage light and undetectable. A dropper merely downloads further malware to the system.
1313:
Grayware is any unwanted application or file that can worsen the performance of computers and may cause security risks but which there is insufficient consensus or data to classify them as malware. Types of greyware typically includes
1677:
They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming
1484:
vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate from being supplied. Malware may provide data that overflows the buffer, with malicious
874:, for example, was designed to disrupt very specific industrial equipment. There have been politically motivated attacks which spread over and shut down large computer networks, including massive deletion of files and corruption of
4232:
890:
Malware can be classified in numerous ways, and certain malicious programs may fall into two or more categories simultaneously. Broadly, software can categorised into three types: (i) goodware; (ii) greyware and (iii) malware.
1788:
Structuring a network as a set of smaller networks, and limiting the flow of traffic between them to that known to be legitimate, can hinder the ability of infectious malware to replicate itself across the wider network.
1226:
In spring 2017, Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults.
3042:
3437:
1159:
is a broad term for a computer program that allows an attacker persistent unauthorised remote access to a victim's machine often without their knowledge. The attacker typically uses another attack (such as a
1748:
Browser sandboxing is a security measure that isolates web browser processes and tabs from the operating system to prevent malicious code from exploiting vulnerabilities. It helps protect against malware,
1385:. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software. The
4005:
3800:
3325:
1588:
can reduce this risk. With the latter enabled, even if an attacker can crack the password, they cannot use the account without also having the token possessed by the legitimate user of that account.
3519:
2484:
John von
Neumann, "Theory of Self-Reproducing Automata", Part 1: Transcripts of lectures given at the University of Illinois, December 1949, Editor: A. W. Burks, University of Illinois, USA, 1966.
3762:
1812:
AirHopper, BitWhisper, GSMem and
Fansmitter are four techniques introduced by researchers that can leak data from air-gapped computers using electromagnetic, thermal and acoustic emissions.
3383:
1468:) in the operating system, applications (such as browsers, e.g. older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as
4362:
3633:
1780:
Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised.
2923:
1527:
than they require, and malware can take advantage of this. For example, of 940 Android apps sampled, one third of them asked for more privileges than they required. Apps targeting the
4790:
1809:
is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data.
1499:
There are several ways the users can stay informed and protected from security vulnerabilities in software. Software providers often announce updates that address security issues.
1127:
Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves. An early example of this behavior is recorded in the
5380:
4114:
Cabaj, Krzysztof; Caviglione, Luca; Mazurczyk, Wojciech; Wendzel, Steffen; Woodward, Alan; Zander, Sebastian (May 2018). "The New Threats of Information Hiding: The Road Ahead".
2699:
1411:
following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4)
1077:
software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files.
4389:
1693:
a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match.
680:
as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid-1990s, and includes initial ransomware and evasion ideas.
1753:, and unintentional data leaks by trapping potentially harmful code within the sandbox. It involves creating separate processes, limiting access to system resources, running
3038:
3016:
5183:
Guri, Mordechai; Kedma, Gabi; Kachlon, Assaf; Elovici, Yuval (2014). "AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies".
1172:) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application. A backdoor can also be a side effect of a
4480:. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Vol. 50. Berlin, Heidelberg: Springer. pp. 20β34.
2638:
1349:(PUPs) are applications that would be considered unwanted despite often being intentionally downloaded by the user. PUPs include spyware, adware, and fraudulent dialers.
5226:
Guri, Mordechai; Monitz, Matan; Mirski, Yisroel; Elovici, Yuval (2015). "BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations".
2768:
3441:
3666:
2063:
1801:
As a last resort, computers can be protected from malware, and the risk of infected computers disseminating trusted information can be greatly reduced by imposing an
1702:
confines applications within a controlled environment, restricting their operations and isolating them from other applications on the host while limiting access to
3914:
3826:
611:'s 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016.
1531:
platform can be a major source of malware infection but one solution is to use third-party software to detect apps that have been assigned excessive privileges.
5306:
Hanspach, Michael; Goetz, Michael; Daidakulov, Andrey; Elovici, Yuval (2016). "Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers".
2669:
560:, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's
4002:
3317:
4057:
3792:
2817:
4336:
3515:
3463:
1715:
A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or
5000:
2414:
2877:
1538:
access today. This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an
234:
3766:
2729:
1216:, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by
3898:
2956:
2604:
1765:
between processes. Escaping the sandbox involves targeting vulnerabilities in the sandbox mechanism or the operating system's sandboxing features.
1389:
was intended to prevent illicit copying; but also reported on users' listening habits, and unintentionally created extra security vulnerabilities.
1223:
Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.
3375:
1507:. Tools like Secunia PSI, free for personal use, can scan a computer for outdated software with known vulnerabilities and attempt to update them.
5779:
4366:
3629:
3120:
2296:
2165:
2059:
5289:
4914:
6198:
3348:
3702:
2919:
3207:
1116:
allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful
4739:
4683:
2339:
2027:
5034:
4782:
4499:
2901:
1112:
Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as
5619:
3075:"Towards a fair comparison and realistic evaluation framework of android malware detectors based on static analysis and machine learning"
2575:
5087:
4393:
3978:
2851:
2691:
514:
3571:
6742:
4812:
Wagner, Neal; Εahin, Cem Ε.; Winterrose, Michael; Riordan, James; Pena, Jaime; Hanson, Diana; Streilein, William W. (December 2016).
4708:. In Rathore, Vijay Singh; Dey, Nilanjan; Piuri, Vincenzo; Babo, Rosalina; Polkowski, Zdzislaw; Tavares, JoΓ£o Manuel R. S. (eds.).
1386:
1335:
878:, described as "computer killing." Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as
4948:
4764:
3545:
3260:
3012:
667:
The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata.
5161:
4450:
1663:
699:, a virus causes itself to be run whenever the program is run or the disk is booted. Early computer viruses were written for the
4262:
2794:
2630:
1065:. An example of this is a portable execution infection, a technique, usually used to spread malware, that inserts extra data or
5471:
3606:
3415:
1460:
or earlier contained a vulnerability that allowed attackers to inject code into Windows. Malware can exploit security defects (
661:
2752:
1489:
code or data after the end; when this payload is accessed it does what the attacker, not the legitimate software, determines.
6719:
5283:
5253:
5210:
4890:
4833:
4725:
4677:
4590:
4545:
4493:
4305:
4035:
3874:
3183:
2762:
2545:
2520:
2112:
344:
4847:
4604:
3655:
2238:
2052:
1500:
3493:
746:, states that emails are the primary method of malware delivery, accounting for 96% of malware delivery around the world.
6750:
5772:
4041:
3902:
3822:
3234:
6191:
38:
2825:
622:
The defense strategies against malware differ according to the type of malware but most can be thwarted by installing
6682:
5736:
5427:
4098:
4419:
2661:
772:
systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (
6478:
4089:
Young, Adam; Yung, Moti (1997). "Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage".
1861:
1534:
Some systems allow all users to make changes to the core components or settings of the system, which is considered
4064:
1477:
6732:
5831:
5624:
4286:"Modern binary attacks and defences in the windows environment β Fighting against microsoft EMET in seven rounds"
1504:
55:
840:
access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread
5765:
5451:
4329:
3467:
769:
643:
507:
4978:
1492:
Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable
6811:
6545:
6184:
5814:
5690:
1959:
1643:
1213:
857:
447:
244:
127:
117:
5008:
3940:
2406:
4634:
1415:
internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely
1346:
1308:
952:
154:
142:
2990:
2873:
1772:
of common threats. Keeping browsers and operating systems updated is crucial to mitigate vulnerabilities.
1176:
in legitimate software that is exploited by an attacker to gain access to a victim's computer or network.
6737:
6658:
6458:
6062:
2721:
2265:"Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders"
1899:
1790:
1758:
1737:
1699:
1585:
655:
229:
4712:. Advances in Intelligent Systems and Computing. Vol. 1187. Singapore: Springer. pp. 339β350.
2946:
2597:
6806:
6771:
6714:
6672:
6328:
6130:
6010:
5710:
2438:"Malware propagation in smart grid networks: metrics, simulation and comparison of three malware types"
1881:
1528:
1512:
1280:
616:
466:
204:
5328:
4869:
Hemberg, Erik; Zipkin, Joseph R.; Skowyra, Richard W.; Wagner, Neal; O'Reilly, Una-May (6 July 2018).
3150:
3074:
2552:
The first PC virus is credited to two brothers, Basit Farooq Alvi and Amjad Farooq Alvi, from Pakistan
2264:
2137:
6575:
6293:
6125:
5851:
5578:
5270:
4918:
2091:
Cani, Andrea; Gaudesi, Marco; Sanchez, Ernesto; Squillero, Giovanni; Tonda, Alberto (24 March 2014).
1994:
1535:
1433:
1374:
1304:
977:
Broad consensus among antivirus software that program is malicious or obtained from flagged sources.
870:
In addition to criminal money-making, malware can be used for sabotage, often for political motives.
773:
500:
249:
5395:
Further Reading: Research Papers and Documents about Malware on IDMARCH (Int. Digital Media Archive)
5269:
Guri, Mordechai; Kachlon, Assaf; Hasson, Ofer; Kedma, Gabi; Mirsky, Yisroel; Elovici, Yuval (2015).
6560:
6438:
6333:
6035:
5512:
5502:
3691:
3352:
3199:
1365:
Some types of adware turn off anti-malware and virus protection; technical remedies are available.
1161:
1008:
792:
687:
access became widespread, viruses spread on personal computers by infecting executable programs or
577:
425:
384:
354:
304:
5399:
3490:"VIRUS-L/comp.virus Frequently Asked Questions (FAQ) v2.00 (Question B3: What is a Trojan Horse?)"
2512:
671:
showed that in theory a program could reproduce itself. This constituted a plausibility result in
6648:
6600:
6263:
6155:
5588:
4705:
2319:
2023:
1741:
1716:
1407:
1327:
1034:
844:
and worms have been designed to take control of users' computers for illicit purposes. Infected "
820:, the first internet worm, were written as experiments or pranks. Today, malware is used by both
164:
5030:
4473:
3073:
Molina-Coronado, Borja; Mori, Usue; Mendiburu, Alexander; Miguel-Alonso, Jose (1 January 2023).
1706:. Browser sandboxing isolates web processes to prevent malware and exploits, enhancing security.
1469:
5974:
5846:
5639:
5466:
2898:
2493:
Fred Cohen, "Computer Viruses", PhD Thesis, University of Southern California, ASP Press, 1988.
1969:
1465:
1412:
720:
419:
5573:
3173:
2567:
2193:"Malware-on-the-Brain: Illuminating Malware Byte Codes with Images for Malware Classification"
6689:
6423:
5994:
5836:
5788:
5420:
4814:"Towards automated cyber decision support: A case study on network segmentation for security"
1954:
1939:
1524:
1132:
796:
5185:
2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE)
5079:
4871:"Adversarial co-evolution of attack and defense in a segmented computer network environment"
3966:
2847:
2504:
6709:
6621:
6570:
6515:
6383:
6356:
6338:
6236:
6207:
6085:
5969:
5959:
5841:
5824:
5746:
5741:
5700:
5629:
5487:
5385:
5327:
Razak, Mohd Faizal Ab; Anuar, Nor Badrul; Salleh, Rosli; Firdaus, Ahmad (1 November 2016).
4521:
3567:
2318:
Razak, Mohd Faizal Ab; Anuar, Nor Badrul; Salleh, Rosli; Firdaus, Ahmad (1 November 2016).
1919:
1802:
1762:
1622:
1547:
1508:
1453:
1441:
1156:
1150:
998:
672:
627:
607:
Malware poses serious problems to individuals and businesses on the Internet. According to
437:
379:
299:
6303:
795:
of its applications, it became possible to write infectious code in the macro language of
8:
6816:
6493:
6268:
6226:
6090:
6075:
5872:
5695:
4877:. GECCO '18. New York, NY, USA: Association for Computing Machinery. pp. 1648β1655.
2505:
1378:
1121:
1117:
1070:
781:
414:
239:
149:
6677:
6605:
6510:
6150:
6140:
6095:
5809:
5680:
5517:
5497:
5307:
5231:
5188:
4944:
4896:
4839:
4760:"LNCS 3786 β Key Factors Influencing Worm Infection", U. Kanlayasiri, 2006, web (PDF):
4731:
4596:
4551:
4442:
4311:
4224:
4190:
4141:
4123:
3880:
3112:
3086:
2467:
2288:
2230:
2204:
2118:
1984:
1639:
1577:
1556:
1515:
can monitor the network traffic for suspicious activity that might indicate an attack.
875:
860:
777:
623:
553:
549:
5153:
3541:
2153:
1473:
753:-borne infectious programs, originated not on personal computers, but on multitasking
6725:
6483:
6418:
6368:
6315:
6273:
6221:
6165:
6105:
6080:
5904:
5705:
5659:
5568:
5348:
5279:
5249:
5206:
5132:
4886:
4829:
4735:
4721:
4673:
4600:
4586:
4541:
4532:. CCS '11. New York, NY, USA: Association for Computing Machinery. pp. 627β638.
4489:
4301:
4254:
4228:
4194:
4182:
4094:
4031:
3870:
3861:. CCS '12. New York, NY, USA: Association for Computing Machinery. pp. 809β820.
3744:
3179:
3116:
3104:
2790:
2758:
2541:
2516:
2471:
2459:
2387:
2280:
2234:
2222:
2157:
2108:
2099:. SAC '14. New York, NY, USA: Association for Computing Machinery. pp. 157β160.
1866:
1856:
1683:
1605:
1573:
1493:
1241:
1236:
1217:
983:
853:
821:
788:
631:
561:
409:
372:
339:
6780:
4900:
4315:
4290:
2015 IEEE 13th International Symposium on Intelligent Systems and Informatics (SISY)
4145:
2692:"Cryptomining Worm MassMiner Exploits Multiple Vulnerabilities - Security Boulevard"
2292:
2122:
6801:
6694:
6634:
6398:
6388:
6283:
5979:
5796:
5720:
5685:
5413:
5340:
5241:
5198:
5122:
4878:
4843:
4821:
4713:
4665:
4578:
4533:
4481:
4293:
4216:
4172:
4133:
3884:
3862:
3736:
3594:
3292:
3256:
3096:
2449:
2377:
2331:
2272:
2214:
2149:
2100:
1904:
1750:
1679:
1647:
1597:
1449:
1445:
1094:
988:
750:
668:
635:
557:
389:
90:
4555:
3727:
O'Kane, Philip; Sezer, Sakir; Carlin, Domhnall (2018). "Evolution of ransomware".
1551:
privileges than they need, so often end up being assigned unnecessary privileges.
1503:
are assigned unique identifiers (CVE IDs) and listed in public databases like the
6785:
6585:
6565:
6463:
6288:
6278:
6160:
6135:
6117:
5984:
5921:
5877:
5715:
5654:
5558:
5375:
5202:
4768:
4717:
4669:
4009:
3853:
Kammerstetter, Markus; Platzer, Christian; Wondracek, Gilbert (16 October 2012).
3516:"Proton Mac Trojan Has Apple Code Signing Signatures Sold to Customers for $ 50k"
2951:
2905:
2031:
1964:
1703:
1581:
1323:
1185:
1066:
845:
597:
169:
60:
29:
5109:
Al-Saleh, Mohammed Ibrahim; Espinoza, Antonio M.; Crandall, Jedediah R. (2013).
5060:
4485:
4137:
1796:
1267:
files securely, and only decrypt them on payment of a substantial sum of money.
6755:
6653:
6503:
6453:
6428:
6393:
6373:
6253:
6241:
5675:
5649:
5456:
5344:
4813:
4657:
4570:
3489:
3406:
3100:
2335:
2192:
1914:
1876:
1769:
1726:
1481:
1169:
1055:
841:
704:
608:
593:
569:
478:
309:
262:
192:
73:
50:
5127:
5110:
4825:
4530:
Proceedings of the 18th ACM conference on Computer and communications security
4297:
4177:
4160:
3859:
Proceedings of the 2012 ACM conference on Computer and communications security
3740:
3438:"Trojan Horse: [coined By MIT-hacker-turned-NSA-spook Dan Edwards] N."
2454:
2437:
2276:
1974:
1402:
detect it. An estimated 33% of malware is not detected by antivirus software.
6795:
6665:
6626:
6595:
6590:
6443:
6433:
6403:
6040:
5819:
5634:
5553:
5461:
5370:
5352:
5136:
4582:
4186:
4024:
3748:
3108:
2463:
2391:
2284:
2226:
2188:
2161:
1979:
1924:
1871:
1822:
1601:
1198:
1181:
1165:
1086:
573:
314:
209:
106:
4882:
4875:
Proceedings of the Genetic and Evolutionary Computation Conference Companion
4537:
4472:
Morales, Jose Andre; Al-Bataineh, Areej; Xu, Shouhuai; Sandhu, Ravi (2010).
4285:
3866:
3230:
2218:
2104:
646:. Malware can be designed to evade antivirus software detection algorithms.
6699:
6555:
6258:
5964:
5926:
5914:
5889:
5492:
3698:
2382:
2365:
1929:
1894:
1461:
1416:
1338:
on purchasers' computers with the intention of preventing illicit copying.
1276:
1261:
1202:
1173:
931:
692:
402:
269:
222:
77:
5394:
5061:
Guide to Malware Incident Prevention and Handling for Desktops and Laptops
4870:
4662:
Preventing Good People from doing Bad Things: Implementing Least Privilege
4656:
Mutch, John; Anderson, Brian (2011), Mutch, John; Anderson, Brian (eds.),
4525:
4524:; Chin, Erika; Hanna, Steve; Song, Dawn; Wagner, David (17 October 2011).
4415:
3854:
2092:
6639:
6473:
6448:
6413:
6248:
6145:
6070:
6020:
5884:
5644:
5563:
3286:
3072:
2187:
Zhong, Fangtian; Chen, Zekai; Xu, Minghui; Zhang, Guoming; Yu, Dongxiao;
1989:
1909:
1754:
1596:
Homogeneity can be a vulnerability. For example, when all computers in a
1437:
1292:
1128:
925:
817:
801:
758:
716:
696:
688:
531:
472:
359:
96:
5757:
5245:
3404:
1757:
in isolated processes, monitoring system calls, and memory constraints.
1670:
Typically, antivirus software can combat malware in the following ways:
1271:
Jisut making up nearly 60 percent of all Android ransomware detections.
734:
code. Users may also execute disguised malicious email attachments. The
568:. Researchers tend to classify malware into one or more sub-types (i.e.
6704:
6520:
6468:
6351:
6231:
6176:
6052:
6025:
5989:
5603:
5583:
5548:
5272:
GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies
4761:
4161:"An emerging threat Fileless malware: a survey and research challenges"
2364:
Xiao, Fei; Sun, Yi; Du, Donggao; Li, Xuelei; Luo, Min (21 March 2020).
1944:
1889:
1721:
1659:
1655:
1642:) programs block and remove some or all types of malware. For example,
1618:
1614:
1560:
1486:
1264:
1254:
1074:
1042:
1003:
849:
810:
806:
743:
731:
727:
676:
612:
601:
581:
329:
324:
101:
1559:
allow code too many privileges, usually in the sense that when a user
6580:
6535:
6530:
6378:
6346:
6100:
6047:
5943:
5931:
5593:
5543:
4783:"Windows Computers Account for 83% of All Malware Attacks in Q1 2020"
4575:
ICC 2019 - 2019 IEEE International Conference on Communications (ICC)
4363:"Updated Browsers Still Vulnerable to Attack if Plugins Are Outdated"
3910:
1651:
1038:
864:
834:
809:), but rely on the fact that macros in a Word document are a form of
349:
199:
179:
84:
45:
4220:
2436:
Eder-Neuhauser, Peter; Zseby, Tanja; Fabini, Joachim (1 June 2019).
6540:
6498:
6361:
5909:
5899:
5894:
5804:
5312:
5236:
4128:
3464:"What is the difference between viruses, worms, and Trojan horses?"
3091:
2535:
2209:
1949:
1934:
1617:. This risk is mitigated by segmenting the networks into different
1609:
1457:
1331:
1030:
1026:
993:
837:
700:
684:
545:
541:
443:
174:
122:
5193:
4970:
3296:
6550:
6525:
6030:
5936:
5598:
5507:
5405:
3936:
2920:"MiniDuke Malware Used Against European Government Organizations"
2366:"A Novel Malware Classification Method Based on Crucial Behavior"
2097:
Proceedings of the 29th Annual ACM Symposium on Applied Computing
1806:
1382:
1315:
1107:
957:
879:
871:
739:
585:
565:
431:
319:
294:
159:
4626:
4058:"Barecloud: bare-metal analysis-based evasive malware detection"
2263:
Kim, Jin-Young; Bu, Seok-Jun; Cho, Sung-Bae (1 September 2018).
1768:
While sandboxing is not foolproof, it significantly reduces the
1073:. A computer virus is software that embeds itself in some other
6408:
6323:
5867:
5538:
5533:
5389:
5329:"The rise of "malware": Bibliometric analysis of malware study"
4818:
2016 IEEE Symposium Series on Computational Intelligence (SSCI)
4113:
3967:"Challenge of Malware Analysis: Malware obfuscation Techniques"
2407:"Cybercrime To Cost The World $ 10.5 Trillion Annually By 2025"
2320:"The rise of "malware": Bibliometric analysis of malware study"
1851:
1830:
1353:
1319:
962:
712:
708:
639:
589:
485:
334:
274:
112:
5305:
4571:"Overprivileged Permission Detection for Android Applications"
4390:"Kaspersky: 12 different vulnerabilities detected on every PC"
4026:
Barecloud: bare-metal analysis-based evasive malware detection
4022:
Kirat, Dhilung; Vigna, Giovanni; Kruegel, Christopher (2014).
1555:
Almost all currently popular operating systems, and also many
4443:"Secunia Personal Software Inspector 3.0 Review & Rating"
3852:
3405:
Landwehr, C. E; A. R Bull; J. P McDermott; W. S Choi (1993).
3039:"Computer-killing malware used in Sony attack a wake-up call"
2538:
Computer system security: basic concepts and solved exercises
2036:
International Journal of Education and Management Engineering
1838:
1834:
1062:
762:
4811:
3408:
A taxonomy of computer program security flaws, with examples
707:, but they became more widespread with the dominance of the
3793:"Sony, Rootkits and Digital Rights Management Gone Too Far"
3763:"Another way Microsoft is disrupting the malware ecosystem"
3662:
3142:
2982:
2090:
1826:
1563:
code, the system allows that code all rights of that user.
1206:
754:
5111:"Antivirus performance characterisation: system-wide view"
4868:
4471:
2631:"Top cybersecurity facts, figures and statistics for 2018"
1373:
Programs designed to monitor users' web browsing, display
5063:(Report). National Institute of Standards and Technology.
2435:
805:
infect documents and templates rather than applications (
766:
5154:"What is browser sandboxing? How to escape the sandbox?"
5108:
2938:
2536:
Avoine, Gildas; Pascal Junod; Philippe Oechslin (2007).
1600:
run the same operating system, upon exploiting one, one
691:
of floppy disks. By inserting a copy of itself into the
5326:
5225:
5182:
4474:"Analyzing and Exploiting Network Behaviors of Malware"
4255:"Malware Dynamic Analysis Evasion Techniques: A Survey"
4003:
The Four Most Common Evasive Techniques Used by Malware
2317:
784:. This same behavior is used by today's worms as well.
5268:
5228:
2015 IEEE 28th Computer Security Foundations Symposium
4706:"Revisiting Cloud Security Attacks: Credential Attack"
3965:
SiΜngh, Jagsir; SiΜngh, Jaswinder (1 September 2018).
3630:"The 5 biggest ransomware attacks of the last 5 years"
3376:"Shopping for Spy Gear:Catalog Advertises NSA Toolbox"
2053:"An Undirected Attack Against Critical Infrastructure"
6769:
3971:
International Journal of Information Security Science
3726:
2947:"Ukrainian indicted by US govt on cybercrime charges"
2603:(Report) (11th ed.). Verizon. 2018. p. 18.
1546:, and a regular user of the system. In some systems,
1341:
1260:
encrypts its contents. For example, programs such as
5059:
Souppaya, Murugiah; Scarfone, Karen (22 July 2013).
4627:"Malware, viruses, worms, Trojan horses and spyware"
3231:"Understanding Hidden Threats: Rootkits and Botnets"
2138:"Ransomware attacks: detection, prevention and cure"
1633:
1480:. For example, a common method is exploitation of a
4710:
Rising Threats in Expert Applications and Solutions
3318:"Inside TAO: Documents Reveal Top NSA Hacking Unit"
3013:"Shamoon is latest malware to target energy sector"
2442:
Journal of Computer Virology and Hacking Techniques
2024:
A study on malware and malware detection techniques
1591:
1452:that is exploited by malware to bypass defences or
1212:Trojan horses are generally spread by some form of
4023:
3595:"Ransomware: Evolution, Mitigation and Prevention"
2818:"Microsoft Vows to Combat Government Cyber-Spying"
2793:. FEDERAL TRADE COMMISSION- CONSUMER INFORMATION.
882:or W32.Disttrack) and Saudi Aramco (August 2012).
780:programs and started itself running as a separate
4520:
4021:
2659:
897:Data sourced from: Molina-Coronado et al. (2023)
6793:
5058:
3593:Richardson, Ronny; North, Max (1 January 2017).
2507:Malicious cryptography - exposing cryptovirology
2186:
1793:provides techniques to implement such controls.
895:Classification of potentially malicious software
544:intentionally designed to cause disruption to a
3592:
2975:
2622:
2060:United States Computer Emergency Readiness Team
1720:is found, execution is stopped and the file is
4478:Security and Privacy in Communication Networks
3786:
3784:
3175:The Art of Computer Virus Research and Defense
816:Many early infectious programs, including the
726:Older email software would automatically open
6192:
5773:
5421:
5001:"Quickly identify malware running on your PC"
4655:
4476:. In Jajodia, Sushil; Zhou, Jianying (eds.).
4158:
3143:"What are viruses, worms, and Trojan horses?"
2899:PC World β Zombie PCs: Silent, Growing Threat
1352:Many security products classify unauthorised
1131:tale of a pair of programs infesting a Xerox
508:
5333:Journal of Network and Computer Applications
3964:
3288:Malware: Types, Analysis and Classifications
2324:Journal of Network and Computer Applications
4703:
4159:Sudhakar; Kumar, Sushil (14 January 2020).
3903:"Latest adware disables antivirus software"
3790:
3781:
2363:
1646:(for Windows XP, Vista, and Windows 7) and
1120:from being visible in the system's list of
757:systems. The first well-known worm was the
715:. The first IBM PC virus in the wild was a
6199:
6185:
5780:
5766:
5428:
5414:
4664:, Berkeley, CA: Apress, pp. 163β175,
3627:
3349:"Top Zombie, Trojan Horse and Bot Threats"
3200:"computer virus β EncyclopΓ¦dia Britannica"
3171:
2628:
1841:were identified as emerging contributors.
1291:Some malware is used to generate money by
515:
501:
6743:Security information and event management
5787:
5311:
5235:
5192:
5126:
4942:
4416:"Adobe Security bulletins and advisories"
4176:
4127:
4088:
3373:
3090:
2562:
2560:
2502:
2453:
2381:
2208:
1797:"Air gap" isolation or "parallel network"
1775:
6206:
5379:) is being considered for deletion. See
4938:
4936:
3823:"Rating the best anti-malware solutions"
3165:
2848:"Malware Revolution: A Change in Target"
2754:Information Security Management Handbook
2262:
1523:Users and programs can be assigned more
1025:
791:platform in the 1990s, and the flexible
5148:
5146:
5074:
5072:
5070:
4704:Singh, Vaishali; Pandey, S. K. (2021).
4387:
4361:Rashid, Fahmida Y. (27 November 2012).
4330:"Global Web Browser... Security Trends"
2944:
1710:
1664:Windows Malicious Software Removal Tool
1518:
1089:is a stand-alone malware software that
6794:
5472:Timeline of computer viruses and worms
4360:
4283:
3656:"Rise of Android Ransomware, research"
3496:from the original on 24 September 2015
3466:. Symantec Corporation. Archived from
3149:. The Trustees of Indiana University.
3019:from the original on 23 September 2015
2917:
2751:Tipton, Harold F. (26 December 2002).
2750:
2732:from the original on 26 September 2017
2660:William A Hendric (4 September 2014).
2598:2018 Data Breach Investigations Report
2578:from the original on 24 September 2015
2557:
2529:
2404:
2135:
1783:
1427:
946:Insufficient consensus and/or metrics
736:2018 Data Breach Investigations Report
662:Timeline of computer viruses and worms
6720:Host-based intrusion detection system
6180:
5761:
5409:
5054:
5052:
4943:Rubenking, Neil J. (8 January 2014).
4933:
4780:
4686:from the original on 27 February 2023
4568:
4440:
4422:from the original on 15 November 2013
3998:
3996:
3960:
3958:
3917:from the original on 27 November 2015
3897:
3891:
3848:
3846:
3844:
3791:Russinovich, Mark (31 October 2005).
3374:Appelbaum, Jacob (29 December 2013).
3315:
3280:
3278:
3153:from the original on 4 September 2016
3068:
3066:
3064:
3062:
3060:
2993:from the original on 27 February 2023
2874:"Child Porn: Malware's Ultimate Evil"
2815:
2771:from the original on 27 February 2023
2398:
2241:from the original on 2 September 2022
2069:from the original on 24 December 2016
1662:) provides real-time protection. The
1604:can exploit them all: In particular,
1124:, or keep its files from being read.
5219:
5176:
5143:
5067:
5037:from the original on 12 January 2017
4850:from the original on 2 December 2021
4793:from the original on 2 December 2021
4754:
4637:from the original on 5 February 2021
4607:from the original on 21 January 2022
4502:from the original on 2 December 2021
4453:from the original on 16 January 2013
4342:from the original on 2 February 2013
3981:from the original on 10 January 2023
3829:from the original on 2 February 2014
3720:
3672:from the original on 19 October 2017
3574:from the original on 31 October 2022
3548:from the original on 20 October 2017
3522:from the original on 19 October 2017
3284:
3263:from the original on 13 October 2016
3228:
3123:from the original on 10 January 2023
3045:from the original on 7 December 2017
2959:from the original on 26 October 2022
2926:from the original on 11 October 2016
2880:from the original on 22 October 2013
2854:from the original on 16 October 2008
2629:Fruhlinger, Josh (10 October 2018).
2610:from the original on 16 October 2021
2370:Mathematical Problems in Engineering
2359:
2357:
2258:
2256:
2093:"Towards automated malware creation"
2086:
2084:
2018:
2016:
2014:
2012:
2010:
1825:led in research output, followed by
1638:Anti-malware (sometimes also called
6751:Runtime application self-protection
4981:from the original on 10 August 2018
4951:from the original on 30 August 2017
4209:"Penn State WebAccess Secure Login"
3939:. NORTH CAROLINA STATE UNIVERSITY.
3609:from the original on 5 October 2022
3346:
3316:Staff, SPIEGEL (29 December 2013).
2945:Claburn, Thomas (26 October 2022).
2918:Kovacs, Eduard (27 February 2013).
1275:of encryption-based ransomware are
235:forensics-focused operating systems
13:
6302:
5435:
5295:from the original on 1 March 2024.
5164:from the original on 24 April 2024
5049:
4945:"The Best Free Antivirus for 2014"
4658:"The Hard and Soft Cost of Apathy"
4388:Danchev, Dancho (18 August 2011).
4265:from the original on 14 April 2021
4044:from the original on 1 August 2019
3993:
3955:
3841:
3636:from the original on 24 March 2018
3628:Fruhlinger, Josh (1 August 2017).
3386:from the original on 20 April 2017
3328:from the original on 20 April 2017
3275:
3237:from the original on 29 March 2017
3178:. Pearson Education. p. 204.
3057:
2797:from the original on 20 March 2017
2405:Morgan, Steve (13 November 2020).
2168:from the original on 10 April 2019
1342:Potentially Unwanted Program (PUP)
919:Obtained from trustworthy sources
852:, to host contraband data such as
695:instructions in these programs or
14:
6828:
6683:Security-focused operating system
5737:Computer and network surveillance
5383:to help reach a consensus. βΊ
5362:
4971:"Free antivirus profiles in 2018"
4915:"Malicious Software Removal Tool"
4742:from the original on 4 March 2022
4569:Wu, Sha; Liu, Jiajia (May 2019).
4526:"Android permissions demystified"
3825:. Arstechnica. 15 December 2009.
3570:. MalwareBytes. 30 January 2020.
3418:from the original on 8 April 2013
2722:"Beware of Word Document Viruses"
2417:from the original on 5 March 2022
2354:
2342:from the original on 26 June 2022
2299:from the original on 23 June 2020
2253:
2136:Brewer, Ross (1 September 2016).
2081:
2007:
1634:Antivirus / Anti-malware software
1566:
1456:it requires to run. For example,
1326:, joke programs ("jokeware") and
730:containing potentially malicious
6779:
6479:Insecure direct object reference
5090:from the original on 7 July 2024
4335:. Kaspersky lab. November 2012.
3943:from the original on 2 July 2015
3803:from the original on 2 June 2012
3708:from the original on 21 May 2017
3285:Gill, Harjeevan (21 June 2022),
3210:from the original on 13 May 2013
2983:"Raccoon Infostealer Disclosure"
2672:from the original on 10 May 2018
2641:from the original on 2 June 2019
2503:Young, Adam; Yung, Moti (2004).
1862:Comparison of antivirus software
1682:data for malware and blocks any
1592:Use of the same operating system
617:electricity distribution network
6733:Information security management
5320:
5299:
5262:
5102:
5031:"How Antivirus Software Works?"
5023:
4993:
4963:
4907:
4862:
4805:
4781:Cohen, Jason (28 August 2020).
4774:
4697:
4649:
4619:
4562:
4514:
4465:
4434:
4408:
4381:
4354:
4322:
4277:
4247:
4201:
4152:
4107:
4082:
4015:
3929:
3815:
3755:
3684:
3648:
3621:
3599:International Management Review
3586:
3560:
3534:
3518:. AppleInsider. 14 March 2017.
3508:
3482:
3456:
3430:
3398:
3367:
3340:
3309:
3249:
3222:
3192:
3135:
3031:
3005:
2911:
2892:
2866:
2840:
2809:
2783:
2744:
2714:
2702:from the original on 9 May 2018
2684:
2653:
2590:
2568:"USB devices spreading viruses"
2496:
2487:
2478:
2429:
1625:to block traffic between them.
1505:National Vulnerability Database
1191:
660:For a chronological guide, see
638:from intrusion, having regular
56:Hacking of consumer electronics
5452:Comparison of computer viruses
3172:Peter Szor (3 February 2005).
2311:
2197:IEEE Transactions on Computers
2180:
2129:
2045:
1286:
1:
5691:Data loss prevention software
5368:
5278:. USENIX Security Symposium.
5080:"What is Browser Sandboxing?"
4091:Symp. on Security and Privacy
3351:. IT Security. Archived from
2154:10.1016/S1353-4858(16)30086-1
2001:
1960:Social engineering (security)
1732:
1644:Microsoft Security Essentials
1628:
1347:Potentially unwanted programs
1330:. For example, at one point,
1248:
1037:, showing a message left for
953:Potentially unwanted programs
858:distributed denial-of-service
833:Since the rise of widespread
5203:10.1109/MALWARE.2014.6999418
4718:10.1007/978-981-15-6014-9_39
4670:10.1007/978-1-4302-3922-2_10
3855:"Vanity, cracks and malware"
3692:"State of Malware, research"
3544:. Betanews. 24 August 2017.
1513:intrusion prevention systems
1392:
1336:silently installed a rootkit
1309:Potentially unwanted program
1144:
799:and similar programs. These
155:Chaos Communication Congress
7:
6738:Information risk management
6659:Multi-factor authentication
6215:Related security categories
6063:Software release life cycle
5158:misile00's personal website
4917:. Microsoft. Archived from
4486:10.1007/978-3-642-16161-2_2
4392:. pcmag.com. Archived from
4365:. pcmag.com. Archived from
4138:10.1109/MITP.2018.032501746
2411:Cybercrime magazine website
1900:Domain generation algorithm
1844:
1815:
1791:Software-defined networking
1759:Inter-process communication
1298:
1230:
1205:used to invade the city of
1101:
828:
656:History of computer viruses
10:
6833:
6715:Intrusion detection system
6673:Computer security software
6329:Advanced persistent threat
6131:Software protection dongle
6011:Unwanted software bundling
5711:Intrusion detection system
5345:10.1016/j.jnca.2016.08.022
5230:. IEEE. pp. 276β289.
4284:Nemeth, Zoltan L. (2015).
4093:. IEEE. pp. 224β235.
3937:"Peer To Peer Information"
3101:10.1016/j.cose.2022.102996
2540:. EFPL Press. p. 20.
2413:. Cybersecurity ventures.
2336:10.1016/j.jnca.2016.08.022
1985:Web server overload causes
1444:, a complete computer, an
1375:unsolicited advertisements
1368:
1302:
1252:
1234:
1148:
1105:
1053:
1021:
659:
653:
649:
644:isolating infected systems
467:2600: The Hacker Quarterly
205:List of computer criminals
6614:
6314:
6300:
6294:Digital rights management
6214:
6126:Digital rights management
6116:
6061:
6003:
5952:
5860:
5795:
5729:
5668:
5612:
5579:Privacy-invasive software
5526:
5480:
5444:
5400:Advanced Malware Cleaning
5128:10.1049/iet-ifs.2012.0192
4826:10.1109/SSCI.2016.7849908
4298:10.1109/SISY.2015.7325394
4178:10.1186/s42400-019-0043-x
4030:. ACM. pp. 287β301.
3741:10.1049/iet-net.2017.0207
2455:10.1007/s11416-018-0325-y
2277:10.1016/j.ins.2018.04.092
1995:Zombie (computer science)
1586:two-factor authentication
1360:
1305:Privacy-invasive software
6439:Denial-of-service attack
6334:Arbitrary code execution
6004:Deceptive and/or illicit
5381:templates for discussion
5187:. IEEE. pp. 58β67.
5115:IET Information Security
4767:27 February 2023 at the
4583:10.1109/ICC.2019.8761572
3079:Computers & Security
2662:"Computer Virus history"
1422:
1093:transmits itself over a
1049:
1045:by the worm's programmer
885:
761:of 1988, which infected
385:Cloud computing security
6649:Computer access control
6601:Rogue security software
6264:Electromagnetic warfare
6156:Software license server
5589:Rogue security software
4883:10.1145/3205651.3208287
4538:10.1145/2046707.2046779
3867:10.1145/2382196.2382282
3257:"The Meaning of 'Hack'"
2219:10.1109/TC.2022.3160357
2105:10.1145/2554850.2555157
2030:10 January 2023 at the
1474:Adobe Acrobat or Reader
1080:
825:control is inadequate.
165:Hackers on Planet Earth
6695:Obfuscation (software)
6424:Browser Helper Objects
6308:
5832:Freely redistributable
5625:Classic Mac OS viruses
5467:List of computer worms
4055:Freely accessible at:
1970:Technical support scam
1776:Website security scans
1557:scripting applications
1501:Common vulnerabilities
1440:or software bug in an
1142:
1046:
848:" can be used to send
420:Homebrew Computer Club
6690:Data-centric security
6571:Remote access trojans
6306:
5995:Software as a service
5789:Software distribution
4522:Felt, Adrienne Porter
3542:"Non-Windows Malware"
1940:Point-of-sale malware
1675:Real-time protection:
1137:
1135:time sharing system:
1029:
787:With the rise of the
6812:Computer programming
6622:Application security
6516:Privilege escalation
6384:Cross-site scripting
6237:Cybersex trafficking
6208:Information security
6086:Software maintenance
5960:Digital distribution
5815:Free and open-source
5747:Operation: Bot Roast
5086:. 19 February 2024.
4631:list.ercacinnican.tk
4292:. pp. 275β280.
3901:(25 November 2015).
3769:on 20 September 2015
2904:27 July 2008 at the
2383:10.1155/2020/6804290
2269:Information Sciences
1955:Security in Web apps
1920:Industrial espionage
1763:secure communication
1711:Real-time protection
1519:Excessive privileges
1381:revenues are called
1188:, or other methods.
1151:Backdoor (computing)
673:computability theory
438:Masters of Deception
380:Application security
6269:Information warfare
6227:Automotive security
6091:Software maintainer
5873:Commercial software
5861:Compensation models
5696:Defensive computing
5613:By operating system
5402:β a Microsoft video
5246:10.1109/CSF.2015.26
5011:on 2 September 2018
4975:antivirusgratis.org
4441:Rubenking, Neil J.
4008:29 May 2021 at the
3470:on 13 February 2015
2574:. CBS Interactive.
2271:. 460β461: 83β102.
1784:Network Segregation
1428:Vulnerable software
1379:affiliate marketing
1328:remote access tools
898:
876:master boot records
630:, applying regular
415:Chaos Computer Club
150:Black Hat Briefings
24:Part of a series on
6678:Antivirus software
6546:Social engineering
6511:Polymorphic engine
6464:Fraudulent dialers
6369:Hardware backdoors
6309:
6151:Software copyright
6141:Product activation
6096:Software publisher
5810:Floating licensing
5681:Antivirus software
5527:Malware for profit
5498:Man-in-the-browser
5445:Infectious malware
5386:Malicious Software
3799:. Microsoft MSDN.
3492:. 9 October 1995.
3355:on 9 February 2017
3147:Indiana University
2828:on 23 January 2014
2816:Hernandez, Pedro.
2696:Security Boulevard
2511:. Wiley. pp.
2022:Tahir, R. (2018).
1975:Telemetry software
1761:(IPC) is used for
1470:Adobe Flash Player
1324:fraudulent dialers
1214:social engineering
1063:biological viruses
1047:
894:
856:, or to engage in
624:antivirus software
537:malicious software
245:Social engineering
16:Malicious software
6807:Security breaches
6764:
6763:
6726:Anomaly detection
6631:Secure by default
6484:Keystroke loggers
6419:Drive-by download
6307:vectorial version
6274:Internet security
6222:Computer security
6174:
6173:
6166:Torrent poisoning
6081:Long-term support
5905:Pay what you want
5755:
5754:
5706:Internet security
5660:HyperCard viruses
5569:Keystroke logging
5559:Fraudulent dialer
5503:Man-in-the-middle
5285:978-1-939133-11-3
5255:978-1-4673-7538-2
5212:978-1-4799-7329-3
5005:techadvisor.co.uk
4892:978-1-4503-5764-7
4835:978-1-5090-4240-1
4820:. pp. 1β10.
4727:978-981-15-6014-9
4679:978-1-4302-3922-2
4592:978-1-5386-8088-9
4547:978-1-4503-0948-6
4495:978-3-642-16161-2
4307:978-1-4673-9388-1
4213:webaccess.psu.edu
4037:978-1-931971-15-7
3876:978-1-4503-1651-4
3414:. DTIC Document.
3229:McDowell, Mindi.
3185:978-0-672-33390-3
2876:. November 2009.
2764:978-1-4200-7241-9
2547:978-1-4200-4620-5
2522:978-0-7645-4975-5
2114:978-1-4503-2469-4
1867:Computer security
1857:Browser hijacking
1751:zero-day exploits
1606:Microsoft Windows
1548:non-administrator
1237:Dropper (malware)
1218:drive-by download
1019:
1018:
854:child pornography
822:black hat hackers
789:Microsoft Windows
749:The first worms,
636:securing networks
562:computer security
525:
524:
373:Computer security
340:Keystroke logging
6824:
6784:
6783:
6775:
6635:Secure by design
6566:Hardware Trojans
6399:History sniffing
6389:Cross-site leaks
6284:Network security
6201:
6194:
6187:
6178:
6177:
5980:Product bundling
5953:Delivery methods
5852:Source-available
5782:
5775:
5768:
5759:
5758:
5721:Network security
5686:Browser security
5430:
5423:
5416:
5407:
5406:
5357:
5356:
5324:
5318:
5317:
5315:
5303:
5297:
5296:
5294:
5277:
5266:
5260:
5259:
5239:
5223:
5217:
5216:
5196:
5180:
5174:
5173:
5171:
5169:
5160:. 15 June 2024.
5150:
5141:
5140:
5130:
5106:
5100:
5099:
5097:
5095:
5076:
5065:
5064:
5056:
5047:
5046:
5044:
5042:
5027:
5021:
5020:
5018:
5016:
5007:. Archived from
4997:
4991:
4990:
4988:
4986:
4967:
4961:
4960:
4958:
4956:
4940:
4931:
4930:
4928:
4926:
4911:
4905:
4904:
4866:
4860:
4859:
4857:
4855:
4809:
4803:
4802:
4800:
4798:
4778:
4772:
4758:
4752:
4751:
4749:
4747:
4701:
4695:
4694:
4693:
4691:
4653:
4647:
4646:
4644:
4642:
4623:
4617:
4616:
4614:
4612:
4577:. pp. 1β6.
4566:
4560:
4559:
4518:
4512:
4511:
4509:
4507:
4469:
4463:
4462:
4460:
4458:
4438:
4432:
4431:
4429:
4427:
4412:
4406:
4405:
4403:
4401:
4385:
4379:
4378:
4376:
4374:
4358:
4352:
4351:
4349:
4347:
4341:
4334:
4326:
4320:
4319:
4281:
4275:
4274:
4272:
4270:
4251:
4245:
4244:
4242:
4240:
4231:. Archived from
4205:
4199:
4198:
4180:
4156:
4150:
4149:
4131:
4111:
4105:
4104:
4086:
4080:
4079:
4077:
4075:
4069:
4063:. Archived from
4062:
4053:
4051:
4049:
4029:
4019:
4013:
4012:. 27 April 2015.
4000:
3991:
3990:
3988:
3986:
3962:
3953:
3952:
3950:
3948:
3933:
3927:
3926:
3924:
3922:
3895:
3889:
3888:
3850:
3839:
3838:
3836:
3834:
3819:
3813:
3812:
3810:
3808:
3788:
3779:
3778:
3776:
3774:
3765:. Archived from
3759:
3753:
3752:
3724:
3718:
3717:
3715:
3713:
3707:
3696:
3688:
3682:
3681:
3679:
3677:
3671:
3660:
3652:
3646:
3645:
3643:
3641:
3625:
3619:
3618:
3616:
3614:
3590:
3584:
3583:
3581:
3579:
3568:"Trojan Dropper"
3564:
3558:
3557:
3555:
3553:
3538:
3532:
3531:
3529:
3527:
3512:
3506:
3505:
3503:
3501:
3486:
3480:
3479:
3477:
3475:
3460:
3454:
3453:
3451:
3449:
3434:
3428:
3427:
3425:
3423:
3413:
3402:
3396:
3395:
3393:
3391:
3371:
3365:
3364:
3362:
3360:
3344:
3338:
3337:
3335:
3333:
3313:
3307:
3306:
3305:
3303:
3282:
3273:
3272:
3270:
3268:
3253:
3247:
3246:
3244:
3242:
3226:
3220:
3219:
3217:
3215:
3196:
3190:
3189:
3169:
3163:
3162:
3160:
3158:
3139:
3133:
3132:
3130:
3128:
3094:
3070:
3055:
3054:
3052:
3050:
3035:
3029:
3028:
3026:
3024:
3009:
3003:
3002:
3000:
2998:
2979:
2973:
2972:
2966:
2964:
2942:
2936:
2935:
2933:
2931:
2915:
2909:
2896:
2890:
2889:
2887:
2885:
2870:
2864:
2863:
2861:
2859:
2844:
2838:
2837:
2835:
2833:
2824:. Archived from
2813:
2807:
2806:
2804:
2802:
2787:
2781:
2780:
2778:
2776:
2748:
2742:
2741:
2739:
2737:
2718:
2712:
2711:
2709:
2707:
2688:
2682:
2681:
2679:
2677:
2657:
2651:
2650:
2648:
2646:
2626:
2620:
2619:
2617:
2615:
2609:
2602:
2594:
2588:
2587:
2585:
2583:
2564:
2555:
2554:
2533:
2527:
2526:
2510:
2500:
2494:
2491:
2485:
2482:
2476:
2475:
2457:
2433:
2427:
2426:
2424:
2422:
2402:
2396:
2395:
2385:
2361:
2352:
2351:
2349:
2347:
2315:
2309:
2308:
2306:
2304:
2260:
2251:
2250:
2248:
2246:
2212:
2184:
2178:
2177:
2175:
2173:
2142:Network Security
2133:
2127:
2126:
2088:
2079:
2078:
2076:
2074:
2068:
2057:
2049:
2043:
2020:
1905:Facebook malware
1704:system resources
1686:it comes across.
1648:Windows Defender
1582:strong passwords
1572:cracked using a
1450:computer network
1446:operating system
1387:Sony BMG rootkit
905:Characteristics
899:
893:
846:zombie computers
669:John von Neumann
570:computer viruses
558:computer network
517:
510:
503:
390:Network security
91:Hacker Manifesto
30:Computer hacking
21:
20:
6832:
6831:
6827:
6826:
6825:
6823:
6822:
6821:
6792:
6791:
6790:
6778:
6770:
6767:
6765:
6760:
6610:
6310:
6298:
6289:Copy protection
6279:Mobile security
6210:
6205:
6175:
6170:
6161:Software patent
6136:License manager
6118:Copy protection
6112:
6057:
5999:
5985:Retail software
5948:
5922:Open-core model
5878:Retail software
5856:
5791:
5786:
5756:
5751:
5730:Countermeasures
5725:
5716:Mobile security
5664:
5655:Palm OS viruses
5620:Android malware
5608:
5522:
5518:Zombie computer
5476:
5440:
5434:
5384:
5365:
5360:
5325:
5321:
5304:
5300:
5292:
5286:
5275:
5267:
5263:
5256:
5224:
5220:
5213:
5181:
5177:
5167:
5165:
5152:
5151:
5144:
5107:
5103:
5093:
5091:
5078:
5077:
5068:
5057:
5050:
5040:
5038:
5029:
5028:
5024:
5014:
5012:
4999:
4998:
4994:
4984:
4982:
4969:
4968:
4964:
4954:
4952:
4941:
4934:
4924:
4922:
4921:on 21 June 2012
4913:
4912:
4908:
4893:
4867:
4863:
4853:
4851:
4836:
4810:
4806:
4796:
4794:
4787:PCMag Australia
4779:
4775:
4769:Wayback Machine
4759:
4755:
4745:
4743:
4728:
4702:
4698:
4689:
4687:
4680:
4654:
4650:
4640:
4638:
4625:
4624:
4620:
4610:
4608:
4593:
4567:
4563:
4548:
4519:
4515:
4505:
4503:
4496:
4470:
4466:
4456:
4454:
4439:
4435:
4425:
4423:
4414:
4413:
4409:
4399:
4397:
4386:
4382:
4372:
4370:
4369:on 9 April 2016
4359:
4355:
4345:
4343:
4339:
4332:
4328:
4327:
4323:
4308:
4282:
4278:
4268:
4266:
4253:
4252:
4248:
4238:
4236:
4235:on 8 March 2021
4221:10.1145/3365001
4207:
4206:
4202:
4157:
4153:
4116:IT Professional
4112:
4108:
4101:
4087:
4083:
4073:
4071:
4070:on 4 March 2016
4067:
4060:
4056:
4054:
4047:
4045:
4038:
4020:
4016:
4010:Wayback Machine
4001:
3994:
3984:
3982:
3963:
3956:
3946:
3944:
3935:
3934:
3930:
3920:
3918:
3899:Casey, Henry T.
3896:
3892:
3877:
3851:
3842:
3832:
3830:
3821:
3820:
3816:
3806:
3804:
3789:
3782:
3772:
3770:
3761:
3760:
3756:
3725:
3721:
3711:
3709:
3705:
3694:
3690:
3689:
3685:
3675:
3673:
3669:
3658:
3654:
3653:
3649:
3639:
3637:
3626:
3622:
3612:
3610:
3591:
3587:
3577:
3575:
3566:
3565:
3561:
3551:
3549:
3540:
3539:
3535:
3525:
3523:
3514:
3513:
3509:
3499:
3497:
3488:
3487:
3483:
3473:
3471:
3462:
3461:
3457:
3447:
3445:
3436:
3435:
3431:
3421:
3419:
3411:
3403:
3399:
3389:
3387:
3372:
3368:
3358:
3356:
3347:Edwards, John.
3345:
3341:
3331:
3329:
3314:
3310:
3301:
3299:
3283:
3276:
3266:
3264:
3255:
3254:
3250:
3240:
3238:
3227:
3223:
3213:
3211:
3198:
3197:
3193:
3186:
3170:
3166:
3156:
3154:
3141:
3140:
3136:
3126:
3124:
3071:
3058:
3048:
3046:
3037:
3036:
3032:
3022:
3020:
3011:
3010:
3006:
2996:
2994:
2987:raccoon.ic3.gov
2981:
2980:
2976:
2962:
2960:
2952:theregister.com
2943:
2939:
2929:
2927:
2916:
2912:
2906:Wayback Machine
2897:
2893:
2883:
2881:
2872:
2871:
2867:
2857:
2855:
2846:
2845:
2841:
2831:
2829:
2814:
2810:
2800:
2798:
2789:
2788:
2784:
2774:
2772:
2765:
2749:
2745:
2735:
2733:
2720:
2719:
2715:
2705:
2703:
2690:
2689:
2685:
2675:
2673:
2658:
2654:
2644:
2642:
2627:
2623:
2613:
2611:
2607:
2600:
2596:
2595:
2591:
2581:
2579:
2566:
2565:
2558:
2548:
2534:
2530:
2523:
2501:
2497:
2492:
2488:
2483:
2479:
2434:
2430:
2420:
2418:
2403:
2399:
2362:
2355:
2345:
2343:
2316:
2312:
2302:
2300:
2261:
2254:
2244:
2242:
2185:
2181:
2171:
2169:
2134:
2130:
2115:
2089:
2082:
2072:
2070:
2066:
2062:(Us-cert.gov).
2055:
2051:
2050:
2046:
2032:Wayback Machine
2021:
2008:
2004:
1999:
1965:Targeted threat
1847:
1818:
1799:
1786:
1778:
1735:
1713:
1636:
1631:
1621:and setting up
1594:
1569:
1536:over-privileged
1521:
1466:vulnerabilities
1454:gain privileges
1436:is a weakness,
1430:
1425:
1395:
1371:
1363:
1344:
1311:
1301:
1289:
1257:
1251:
1239:
1233:
1194:
1153:
1147:
1110:
1104:
1083:
1067:executable code
1058:
1052:
1024:
1013:
967:
936:
896:
888:
831:
774:vulnerabilities
665:
658:
652:
521:
492:
491:
461:
453:
452:
405:
395:
394:
375:
365:
364:
290:
280:
279:
265:
255:
254:
225:
215:
214:
195:
185:
184:
170:Security BSides
145:
135:
134:
80:
66:
65:
61:List of hackers
41:
17:
12:
11:
5:
6830:
6820:
6819:
6814:
6809:
6804:
6789:
6788:
6762:
6761:
6759:
6758:
6756:Site isolation
6753:
6748:
6747:
6746:
6740:
6730:
6729:
6728:
6723:
6712:
6707:
6702:
6697:
6692:
6687:
6686:
6685:
6680:
6670:
6669:
6668:
6663:
6662:
6661:
6654:Authentication
6646:
6645:
6644:
6643:
6642:
6632:
6629:
6618:
6616:
6612:
6611:
6609:
6608:
6603:
6598:
6593:
6588:
6583:
6578:
6573:
6568:
6563:
6558:
6553:
6548:
6543:
6538:
6533:
6528:
6523:
6518:
6513:
6508:
6507:
6506:
6496:
6491:
6486:
6481:
6476:
6471:
6466:
6461:
6456:
6454:Email spoofing
6451:
6446:
6441:
6436:
6431:
6426:
6421:
6416:
6411:
6406:
6401:
6396:
6394:DOM clobbering
6391:
6386:
6381:
6376:
6374:Code injection
6371:
6366:
6365:
6364:
6359:
6354:
6349:
6341:
6336:
6331:
6326:
6320:
6318:
6312:
6311:
6301:
6299:
6297:
6296:
6291:
6286:
6281:
6276:
6271:
6266:
6261:
6256:
6254:Cyberterrorism
6251:
6246:
6245:
6244:
6242:Computer fraud
6239:
6229:
6224:
6218:
6216:
6212:
6211:
6204:
6203:
6196:
6189:
6181:
6172:
6171:
6169:
6168:
6163:
6158:
6153:
6148:
6143:
6138:
6133:
6128:
6122:
6120:
6114:
6113:
6111:
6110:
6109:
6108:
6098:
6093:
6088:
6083:
6078:
6073:
6067:
6065:
6059:
6058:
6056:
6055:
6050:
6045:
6044:
6043:
6038:
6033:
6028:
6023:
6013:
6007:
6005:
6001:
6000:
5998:
5997:
5992:
5987:
5982:
5977:
5972:
5967:
5962:
5956:
5954:
5950:
5949:
5947:
5946:
5941:
5940:
5939:
5929:
5924:
5919:
5918:
5917:
5912:
5902:
5897:
5892:
5887:
5882:
5881:
5880:
5870:
5864:
5862:
5858:
5857:
5855:
5854:
5849:
5844:
5839:
5834:
5829:
5828:
5827:
5822:
5812:
5807:
5801:
5799:
5793:
5792:
5785:
5784:
5777:
5770:
5762:
5753:
5752:
5750:
5749:
5744:
5739:
5733:
5731:
5727:
5726:
5724:
5723:
5718:
5713:
5708:
5703:
5698:
5693:
5688:
5683:
5678:
5676:Anti-keylogger
5672:
5670:
5666:
5665:
5663:
5662:
5657:
5652:
5650:Mobile malware
5647:
5642:
5637:
5632:
5627:
5622:
5616:
5614:
5610:
5609:
5607:
5606:
5601:
5596:
5591:
5586:
5581:
5576:
5571:
5566:
5561:
5556:
5551:
5546:
5541:
5536:
5530:
5528:
5524:
5523:
5521:
5520:
5515:
5510:
5505:
5500:
5495:
5490:
5484:
5482:
5478:
5477:
5475:
5474:
5469:
5464:
5459:
5457:Computer virus
5454:
5448:
5446:
5442:
5441:
5433:
5432:
5425:
5418:
5410:
5404:
5403:
5397:
5392:
5364:
5363:External links
5361:
5359:
5358:
5319:
5298:
5284:
5261:
5254:
5218:
5211:
5175:
5142:
5121:(2): 126β133.
5101:
5066:
5048:
5022:
4992:
4962:
4932:
4906:
4891:
4861:
4834:
4804:
4773:
4753:
4726:
4696:
4678:
4648:
4618:
4591:
4561:
4546:
4513:
4494:
4464:
4433:
4407:
4396:on 5 July 2014
4380:
4353:
4321:
4306:
4276:
4246:
4200:
4151:
4106:
4099:
4081:
4036:
4014:
3992:
3977:(3): 100β110.
3954:
3928:
3890:
3875:
3840:
3814:
3780:
3754:
3735:(5): 321β327.
3719:
3683:
3647:
3620:
3585:
3559:
3533:
3507:
3481:
3455:
3444:on 5 July 2017
3440:Archived from
3429:
3397:
3380:Spiegel Online
3366:
3339:
3322:Spiegel Online
3308:
3274:
3248:
3221:
3204:Britannica.com
3191:
3184:
3164:
3134:
3056:
3030:
3004:
2974:
2937:
2910:
2891:
2865:
2850:. March 2007.
2839:
2808:
2782:
2763:
2743:
2713:
2698:. 2 May 2018.
2683:
2652:
2621:
2589:
2556:
2546:
2528:
2521:
2495:
2486:
2477:
2448:(2): 109β125.
2428:
2397:
2353:
2310:
2252:
2203:(2): 438β451.
2189:Cheng, Xiuzhen
2179:
2128:
2113:
2080:
2044:
2005:
2003:
2000:
1998:
1997:
1992:
1987:
1982:
1977:
1972:
1967:
1962:
1957:
1952:
1947:
1942:
1937:
1932:
1927:
1922:
1917:
1915:Identity theft
1912:
1907:
1902:
1897:
1892:
1887:
1879:
1877:Cryptovirology
1874:
1869:
1864:
1859:
1854:
1848:
1846:
1843:
1817:
1814:
1798:
1795:
1785:
1782:
1777:
1774:
1770:attack surface
1742:security model
1734:
1731:
1727:virtual memory
1712:
1709:
1708:
1707:
1694:
1687:
1635:
1632:
1630:
1627:
1593:
1590:
1580:attack. Using
1568:
1567:Weak passwords
1565:
1520:
1517:
1482:buffer overrun
1429:
1426:
1424:
1421:
1408:fingerprinting
1394:
1391:
1377:, or redirect
1370:
1367:
1362:
1359:
1354:key generators
1343:
1340:
1334:compact discs
1300:
1297:
1288:
1285:
1253:Main article:
1250:
1247:
1235:Main article:
1232:
1229:
1193:
1190:
1149:Main article:
1146:
1143:
1106:Main article:
1103:
1100:
1092:
1082:
1079:
1056:Computer virus
1054:Main article:
1051:
1048:
1023:
1020:
1017:
1016:
1014:
1012:
1011:
1006:
1001:
996:
991:
986:
980:
978:
975:
971:
970:
968:
966:
965:
960:
955:
949:
947:
944:
940:
939:
937:
935:
934:
932:Buggy software
929:
922:
920:
917:
913:
912:
909:
906:
903:
887:
884:
830:
827:
797:Microsoft Word
654:Main article:
651:
648:
594:rogue software
523:
522:
520:
519:
512:
505:
497:
494:
493:
490:
489:
482:
479:Nuts and Volts
475:
470:
462:
459:
458:
455:
454:
451:
450:
441:
435:
429:
426:Legion of Doom
423:
417:
412:
406:
401:
400:
397:
396:
393:
392:
387:
382:
376:
371:
370:
367:
366:
363:
362:
357:
352:
347:
342:
337:
332:
327:
322:
317:
312:
307:
302:
297:
291:
286:
285:
282:
281:
278:
277:
272:
266:
263:Practice sites
261:
260:
257:
256:
253:
252:
247:
242:
237:
232:
226:
221:
220:
217:
216:
213:
212:
207:
202:
196:
193:Computer crime
191:
190:
187:
186:
183:
182:
177:
172:
167:
162:
157:
152:
146:
141:
140:
137:
136:
133:
132:
131:
130:
125:
120:
109:
104:
99:
94:
87:
81:
74:Hacker culture
72:
71:
68:
67:
64:
63:
58:
53:
51:Cryptovirology
48:
42:
37:
36:
33:
32:
26:
25:
15:
9:
6:
4:
3:
2:
6829:
6818:
6815:
6813:
6810:
6808:
6805:
6803:
6800:
6799:
6797:
6787:
6782:
6777:
6776:
6773:
6768:
6757:
6754:
6752:
6749:
6744:
6741:
6739:
6736:
6735:
6734:
6731:
6727:
6724:
6721:
6718:
6717:
6716:
6713:
6711:
6708:
6706:
6703:
6701:
6698:
6696:
6693:
6691:
6688:
6684:
6681:
6679:
6676:
6675:
6674:
6671:
6667:
6666:Authorization
6664:
6660:
6657:
6656:
6655:
6652:
6651:
6650:
6647:
6641:
6638:
6637:
6636:
6633:
6630:
6628:
6627:Secure coding
6625:
6624:
6623:
6620:
6619:
6617:
6613:
6607:
6604:
6602:
6599:
6597:
6596:SQL injection
6594:
6592:
6589:
6587:
6584:
6582:
6579:
6577:
6576:Vulnerability
6574:
6572:
6569:
6567:
6564:
6562:
6561:Trojan horses
6559:
6557:
6556:Software bugs
6554:
6552:
6549:
6547:
6544:
6542:
6539:
6537:
6534:
6532:
6529:
6527:
6524:
6522:
6519:
6517:
6514:
6512:
6509:
6505:
6502:
6501:
6500:
6497:
6495:
6492:
6490:
6487:
6485:
6482:
6480:
6477:
6475:
6472:
6470:
6467:
6465:
6462:
6460:
6457:
6455:
6452:
6450:
6447:
6445:
6444:Eavesdropping
6442:
6440:
6437:
6435:
6434:Data scraping
6432:
6430:
6427:
6425:
6422:
6420:
6417:
6415:
6412:
6410:
6407:
6405:
6404:Cryptojacking
6402:
6400:
6397:
6395:
6392:
6390:
6387:
6385:
6382:
6380:
6377:
6375:
6372:
6370:
6367:
6363:
6360:
6358:
6355:
6353:
6350:
6348:
6345:
6344:
6342:
6340:
6337:
6335:
6332:
6330:
6327:
6325:
6322:
6321:
6319:
6317:
6313:
6305:
6295:
6292:
6290:
6287:
6285:
6282:
6280:
6277:
6275:
6272:
6270:
6267:
6265:
6262:
6260:
6257:
6255:
6252:
6250:
6247:
6243:
6240:
6238:
6235:
6234:
6233:
6230:
6228:
6225:
6223:
6220:
6219:
6217:
6213:
6209:
6202:
6197:
6195:
6190:
6188:
6183:
6182:
6179:
6167:
6164:
6162:
6159:
6157:
6154:
6152:
6149:
6147:
6144:
6142:
6139:
6137:
6134:
6132:
6129:
6127:
6124:
6123:
6121:
6119:
6115:
6107:
6104:
6103:
6102:
6099:
6097:
6094:
6092:
6089:
6087:
6084:
6082:
6079:
6077:
6074:
6072:
6069:
6068:
6066:
6064:
6060:
6054:
6051:
6049:
6046:
6042:
6039:
6037:
6034:
6032:
6029:
6027:
6024:
6022:
6019:
6018:
6017:
6014:
6012:
6009:
6008:
6006:
6002:
5996:
5993:
5991:
5988:
5986:
5983:
5981:
5978:
5976:
5975:Pre-installed
5973:
5971:
5968:
5966:
5963:
5961:
5958:
5957:
5955:
5951:
5945:
5942:
5938:
5935:
5934:
5933:
5930:
5928:
5925:
5923:
5920:
5916:
5913:
5911:
5908:
5907:
5906:
5903:
5901:
5898:
5896:
5893:
5891:
5888:
5886:
5883:
5879:
5876:
5875:
5874:
5871:
5869:
5866:
5865:
5863:
5859:
5853:
5850:
5848:
5847:Public domain
5845:
5843:
5840:
5838:
5835:
5833:
5830:
5826:
5823:
5821:
5818:
5817:
5816:
5813:
5811:
5808:
5806:
5803:
5802:
5800:
5798:
5794:
5790:
5783:
5778:
5776:
5771:
5769:
5764:
5763:
5760:
5748:
5745:
5743:
5740:
5738:
5735:
5734:
5732:
5728:
5722:
5719:
5717:
5714:
5712:
5709:
5707:
5704:
5702:
5699:
5697:
5694:
5692:
5689:
5687:
5684:
5682:
5679:
5677:
5674:
5673:
5671:
5667:
5661:
5658:
5656:
5653:
5651:
5648:
5646:
5643:
5641:
5640:MacOS malware
5638:
5636:
5635:Linux malware
5633:
5631:
5628:
5626:
5623:
5621:
5618:
5617:
5615:
5611:
5605:
5602:
5600:
5597:
5595:
5592:
5590:
5587:
5585:
5582:
5580:
5577:
5575:
5572:
5570:
5567:
5565:
5562:
5560:
5557:
5555:
5554:Form grabbing
5552:
5550:
5547:
5545:
5542:
5540:
5537:
5535:
5532:
5531:
5529:
5525:
5519:
5516:
5514:
5511:
5509:
5506:
5504:
5501:
5499:
5496:
5494:
5491:
5489:
5486:
5485:
5483:
5479:
5473:
5470:
5468:
5465:
5463:
5462:Computer worm
5460:
5458:
5455:
5453:
5450:
5449:
5447:
5443:
5438:
5431:
5426:
5424:
5419:
5417:
5412:
5411:
5408:
5401:
5398:
5396:
5393:
5391:
5387:
5382:
5378:
5377:
5372:
5367:
5366:
5354:
5350:
5346:
5342:
5338:
5334:
5330:
5323:
5314:
5309:
5302:
5291:
5287:
5281:
5274:
5273:
5265:
5257:
5251:
5247:
5243:
5238:
5233:
5229:
5222:
5214:
5208:
5204:
5200:
5195:
5190:
5186:
5179:
5163:
5159:
5155:
5149:
5147:
5138:
5134:
5129:
5124:
5120:
5116:
5112:
5105:
5089:
5085:
5084:GeeksforGeeks
5081:
5075:
5073:
5071:
5062:
5055:
5053:
5036:
5032:
5026:
5010:
5006:
5002:
4996:
4980:
4976:
4972:
4966:
4950:
4947:. pcmag.com.
4946:
4939:
4937:
4920:
4916:
4910:
4902:
4898:
4894:
4888:
4884:
4880:
4876:
4872:
4865:
4849:
4845:
4841:
4837:
4831:
4827:
4823:
4819:
4815:
4808:
4792:
4788:
4784:
4777:
4770:
4766:
4763:
4757:
4741:
4737:
4733:
4729:
4723:
4719:
4715:
4711:
4707:
4700:
4685:
4681:
4675:
4671:
4667:
4663:
4659:
4652:
4636:
4632:
4628:
4622:
4606:
4602:
4598:
4594:
4588:
4584:
4580:
4576:
4572:
4565:
4557:
4553:
4549:
4543:
4539:
4535:
4531:
4527:
4523:
4517:
4501:
4497:
4491:
4487:
4483:
4479:
4475:
4468:
4452:
4448:
4444:
4437:
4421:
4418:. Adobe.com.
4417:
4411:
4395:
4391:
4384:
4368:
4364:
4357:
4338:
4331:
4325:
4317:
4313:
4309:
4303:
4299:
4295:
4291:
4287:
4280:
4264:
4260:
4256:
4250:
4234:
4230:
4226:
4222:
4218:
4214:
4210:
4204:
4196:
4192:
4188:
4184:
4179:
4174:
4170:
4166:
4165:Cybersecurity
4162:
4155:
4147:
4143:
4139:
4135:
4130:
4125:
4121:
4117:
4110:
4102:
4100:0-8186-7828-3
4096:
4092:
4085:
4066:
4059:
4043:
4039:
4033:
4028:
4027:
4018:
4011:
4007:
4004:
3999:
3997:
3980:
3976:
3972:
3968:
3961:
3959:
3942:
3938:
3932:
3916:
3912:
3908:
3904:
3900:
3894:
3886:
3882:
3878:
3872:
3868:
3864:
3860:
3856:
3849:
3847:
3845:
3828:
3824:
3818:
3802:
3798:
3794:
3787:
3785:
3768:
3764:
3758:
3750:
3746:
3742:
3738:
3734:
3730:
3723:
3704:
3700:
3693:
3687:
3668:
3664:
3657:
3651:
3635:
3631:
3624:
3608:
3604:
3600:
3596:
3589:
3573:
3569:
3563:
3547:
3543:
3537:
3521:
3517:
3511:
3495:
3491:
3485:
3469:
3465:
3459:
3443:
3439:
3433:
3417:
3410:
3409:
3401:
3385:
3381:
3377:
3370:
3354:
3350:
3343:
3327:
3323:
3319:
3312:
3298:
3297:10.31224/2423
3294:
3290:
3289:
3281:
3279:
3262:
3258:
3252:
3236:
3232:
3225:
3209:
3205:
3201:
3195:
3187:
3181:
3177:
3176:
3168:
3152:
3148:
3144:
3138:
3122:
3118:
3114:
3110:
3106:
3102:
3098:
3093:
3088:
3084:
3080:
3076:
3069:
3067:
3065:
3063:
3061:
3044:
3040:
3034:
3018:
3014:
3008:
2992:
2988:
2984:
2978:
2971:
2958:
2954:
2953:
2948:
2941:
2925:
2922:. Softpedia.
2921:
2914:
2907:
2903:
2900:
2895:
2879:
2875:
2869:
2853:
2849:
2843:
2827:
2823:
2819:
2812:
2796:
2792:
2786:
2770:
2766:
2760:
2757:. CRC Press.
2756:
2755:
2747:
2731:
2727:
2726:us.norton.com
2723:
2717:
2701:
2697:
2693:
2687:
2671:
2667:
2663:
2656:
2640:
2636:
2632:
2625:
2606:
2599:
2593:
2577:
2573:
2569:
2563:
2561:
2553:
2549:
2543:
2539:
2532:
2524:
2518:
2514:
2509:
2508:
2499:
2490:
2481:
2473:
2469:
2465:
2461:
2456:
2451:
2447:
2443:
2439:
2432:
2416:
2412:
2408:
2401:
2393:
2389:
2384:
2379:
2375:
2371:
2367:
2360:
2358:
2341:
2337:
2333:
2329:
2325:
2321:
2314:
2298:
2294:
2290:
2286:
2282:
2278:
2274:
2270:
2266:
2259:
2257:
2240:
2236:
2232:
2228:
2224:
2220:
2216:
2211:
2206:
2202:
2198:
2194:
2190:
2183:
2167:
2163:
2159:
2155:
2151:
2147:
2143:
2139:
2132:
2124:
2120:
2116:
2110:
2106:
2102:
2098:
2094:
2087:
2085:
2065:
2061:
2054:
2048:
2041:
2037:
2033:
2029:
2025:
2019:
2017:
2015:
2013:
2011:
2006:
1996:
1993:
1991:
1988:
1986:
1983:
1981:
1980:Typosquatting
1978:
1976:
1973:
1971:
1968:
1966:
1963:
1961:
1958:
1956:
1953:
1951:
1948:
1946:
1943:
1941:
1938:
1936:
1933:
1931:
1928:
1926:
1925:Linux malware
1923:
1921:
1918:
1916:
1913:
1911:
1908:
1906:
1903:
1901:
1898:
1896:
1893:
1891:
1888:
1886:
1884:
1880:
1878:
1875:
1873:
1872:Cryptojacking
1870:
1868:
1865:
1863:
1860:
1858:
1855:
1853:
1850:
1849:
1842:
1840:
1836:
1832:
1828:
1824:
1823:North America
1813:
1810:
1808:
1804:
1794:
1792:
1781:
1773:
1771:
1766:
1764:
1760:
1756:
1752:
1746:
1743:
1739:
1730:
1728:
1723:
1718:
1705:
1701:
1698:
1695:
1691:
1688:
1685:
1681:
1676:
1673:
1672:
1671:
1668:
1665:
1661:
1657:
1653:
1649:
1645:
1641:
1626:
1624:
1620:
1616:
1611:
1607:
1603:
1599:
1589:
1587:
1584:and enabling
1583:
1579:
1575:
1564:
1562:
1558:
1552:
1549:
1545:
1541:
1540:administrator
1537:
1532:
1530:
1526:
1516:
1514:
1510:
1506:
1502:
1497:
1495:
1490:
1488:
1483:
1479:
1475:
1471:
1467:
1463:
1462:security bugs
1459:
1455:
1451:
1447:
1443:
1439:
1435:
1434:vulnerability
1420:
1418:
1414:
1409:
1403:
1399:
1390:
1388:
1384:
1380:
1376:
1366:
1358:
1355:
1350:
1348:
1339:
1337:
1333:
1329:
1325:
1321:
1317:
1310:
1306:
1296:
1294:
1284:
1282:
1278:
1272:
1268:
1266:
1263:
1256:
1246:
1243:
1238:
1228:
1224:
1221:
1219:
1215:
1210:
1208:
1204:
1201:story of the
1200:
1199:Ancient Greek
1189:
1187:
1183:
1177:
1175:
1171:
1167:
1163:
1158:
1152:
1141:
1136:
1134:
1130:
1125:
1123:
1119:
1115:
1109:
1099:
1096:
1090:
1088:
1078:
1076:
1072:
1068:
1064:
1057:
1044:
1040:
1036:
1032:
1028:
1015:
1010:
1009:Trojan horses
1007:
1005:
1002:
1000:
997:
995:
992:
990:
987:
985:
982:
981:
979:
976:
973:
972:
969:
964:
961:
959:
956:
954:
951:
950:
948:
945:
942:
941:
938:
933:
930:
927:
924:
923:
921:
918:
915:
914:
910:
907:
904:
901:
900:
892:
883:
881:
877:
873:
868:
866:
863:as a form of
862:
859:
855:
851:
847:
843:
839:
836:
826:
823:
819:
814:
812:
808:
804:
803:
802:macro viruses
798:
794:
790:
785:
783:
779:
776:) in network
775:
771:
768:
764:
760:
756:
752:
747:
745:
741:
737:
733:
729:
724:
722:
719:virus dubbed
718:
714:
710:
706:
702:
698:
694:
690:
686:
681:
678:
674:
670:
663:
657:
647:
645:
641:
637:
633:
629:
625:
620:
618:
614:
610:
605:
603:
599:
595:
591:
587:
583:
579:
578:Trojan horses
575:
571:
567:
563:
559:
555:
551:
547:
543:
539:
538:
533:
529:
518:
513:
511:
506:
504:
499:
498:
496:
495:
488:
487:
483:
481:
480:
476:
474:
471:
469:
468:
464:
463:
457:
456:
449:
445:
442:
439:
436:
433:
430:
427:
424:
421:
418:
416:
413:
411:
408:
407:
404:
399:
398:
391:
388:
386:
383:
381:
378:
377:
374:
369:
368:
361:
358:
356:
353:
351:
348:
346:
343:
341:
338:
336:
333:
331:
328:
326:
323:
321:
318:
316:
313:
311:
308:
306:
303:
301:
298:
296:
293:
292:
289:
284:
283:
276:
273:
271:
268:
267:
264:
259:
258:
251:
250:Vulnerability
248:
246:
243:
241:
238:
236:
233:
231:
228:
227:
224:
223:Hacking tools
219:
218:
211:
210:Script kiddie
208:
206:
203:
201:
198:
197:
194:
189:
188:
181:
178:
176:
173:
171:
168:
166:
163:
161:
158:
156:
153:
151:
148:
147:
144:
139:
138:
129:
126:
124:
121:
119:
116:
115:
114:
110:
108:
107:Maker culture
105:
103:
100:
98:
95:
93:
92:
88:
86:
83:
82:
79:
75:
70:
69:
62:
59:
57:
54:
52:
49:
47:
44:
43:
40:
35:
34:
31:
28:
27:
23:
22:
19:
6766:
6700:Data masking
6488:
6259:Cyberwarfare
6036:Trojan horse
6015:
5965:File sharing
5927:Postcardware
5915:Donationware
5890:Crowdfunding
5837:License-free
5513:Trojan horse
5493:Clickjacking
5436:
5374:
5336:
5332:
5322:
5301:
5271:
5264:
5227:
5221:
5184:
5178:
5166:. Retrieved
5157:
5118:
5114:
5104:
5092:. Retrieved
5083:
5039:. Retrieved
5025:
5013:. Retrieved
5009:the original
5004:
4995:
4983:. Retrieved
4974:
4965:
4953:. Retrieved
4923:. Retrieved
4919:the original
4909:
4874:
4864:
4852:. Retrieved
4817:
4807:
4795:. Retrieved
4786:
4776:
4756:
4744:. Retrieved
4709:
4699:
4688:, retrieved
4661:
4651:
4639:. Retrieved
4630:
4621:
4609:. Retrieved
4574:
4564:
4529:
4516:
4504:. Retrieved
4477:
4467:
4455:. Retrieved
4446:
4436:
4424:. Retrieved
4410:
4398:. Retrieved
4394:the original
4383:
4371:. Retrieved
4367:the original
4356:
4344:. Retrieved
4324:
4289:
4279:
4267:. Retrieved
4259:ResearchGate
4258:
4249:
4237:. Retrieved
4233:the original
4212:
4203:
4168:
4164:
4154:
4122:(3): 31β39.
4119:
4115:
4109:
4090:
4084:
4072:. Retrieved
4065:the original
4046:. Retrieved
4025:
4017:
3983:. Retrieved
3974:
3970:
3945:. Retrieved
3931:
3919:. Retrieved
3906:
3893:
3858:
3831:. Retrieved
3817:
3805:. Retrieved
3796:
3771:. Retrieved
3767:the original
3757:
3732:
3729:IET Networks
3728:
3722:
3710:. Retrieved
3699:Malwarebytes
3686:
3674:. Retrieved
3650:
3638:. Retrieved
3623:
3611:. Retrieved
3605:(1): 10β21.
3602:
3598:
3588:
3576:. Retrieved
3562:
3550:. Retrieved
3536:
3524:. Retrieved
3510:
3500:13 September
3498:. Retrieved
3484:
3472:. Retrieved
3468:the original
3458:
3446:. Retrieved
3442:the original
3432:
3420:. Retrieved
3407:
3400:
3388:. Retrieved
3379:
3369:
3359:25 September
3357:. Retrieved
3353:the original
3342:
3330:. Retrieved
3321:
3311:
3300:, retrieved
3287:
3265:. Retrieved
3259:. Catb.org.
3251:
3239:. Retrieved
3224:
3212:. Retrieved
3203:
3194:
3174:
3167:
3155:. Retrieved
3146:
3137:
3125:. Retrieved
3082:
3078:
3047:. Retrieved
3033:
3021:. Retrieved
3007:
2995:. Retrieved
2986:
2977:
2968:
2961:. Retrieved
2950:
2940:
2928:. Retrieved
2913:
2894:
2882:. Retrieved
2868:
2856:. Retrieved
2842:
2830:. Retrieved
2826:the original
2821:
2811:
2799:. Retrieved
2785:
2773:. Retrieved
2753:
2746:
2736:25 September
2734:. Retrieved
2725:
2716:
2704:. Retrieved
2695:
2686:
2674:. Retrieved
2666:The Register
2665:
2655:
2643:. Retrieved
2634:
2624:
2614:26 September
2612:. Retrieved
2592:
2580:. Retrieved
2571:
2551:
2537:
2531:
2506:
2498:
2489:
2480:
2445:
2441:
2431:
2419:. Retrieved
2410:
2400:
2373:
2369:
2344:. Retrieved
2327:
2323:
2313:
2301:. Retrieved
2268:
2243:. Retrieved
2200:
2196:
2182:
2170:. Retrieved
2145:
2141:
2131:
2096:
2073:28 September
2071:. Retrieved
2047:
2039:
2035:
1930:Malvertising
1895:Cyber spying
1883:Cuckoo's egg
1882:
1819:
1811:
1800:
1787:
1779:
1767:
1747:
1736:
1714:
1696:
1689:
1674:
1669:
1637:
1595:
1570:
1553:
1543:
1539:
1533:
1522:
1498:
1491:
1458:TestDisk 6.4
1431:
1417:stegomalware
1404:
1400:
1396:
1372:
1364:
1351:
1345:
1312:
1290:
1277:CryptoLocker
1273:
1269:
1262:CryptoLocker
1258:
1240:
1225:
1222:
1211:
1209:by stealth.
1203:Trojan horse
1195:
1192:Trojan horse
1178:
1174:software bug
1154:
1138:
1126:
1113:
1111:
1084:
1059:
1035:Blaster worm
889:
869:
832:
815:
800:
786:
748:
735:
725:
697:boot sectors
693:machine code
689:boot sectors
682:
666:
621:
606:
536:
535:
527:
526:
484:
477:
465:
460:Publications
305:Trojan horse
287:
270:HackThisSite
89:
18:
6640:Misuse case
6474:Infostealer
6449:Email fraud
6414:Data breach
6249:Cybergeddon
6146:Product key
6076:End-of-life
6071:Abandonware
6021:Infostealer
5970:On-premises
5885:Crippleware
5842:Proprietary
5825:Open source
5645:Macro virus
5630:iOS malware
5604:Web threats
5564:Infostealer
5481:Concealment
5369:βΉ The
5015:2 September
4985:13 February
4955:4 September
4641:14 November
4269:29 February
4239:29 February
4074:28 November
4048:28 November
3921:25 November
3907:Tom's Guide
3797:Mark's Blog
3773:18 February
3613:23 November
3390:29 December
3382:. SPIEGEL.
3324:. SPIEGEL.
3233:. US-CERT.
3157:23 February
3049:18 February
3023:18 February
2930:27 February
2884:22 November
2832:15 December
2775:16 November
2582:18 February
2245:2 September
1990:Webattacker
1910:File binder
1755:web content
1722:quarantined
1697:Sandboxing:
1619:subnetworks
1578:brute force
1442:application
1413:obfuscating
1293:click fraud
1287:Click Fraud
1129:Jargon File
1041:co-founder
926:Google Play
818:Morris Worm
807:executables
759:Morris worm
742:, cited by
717:boot sector
532:portmanteau
473:Hacker News
360:Infostealer
143:Conferences
97:Hackerspace
6817:Cybercrime
6796:Categories
6705:Encryption
6581:Web shells
6521:Ransomware
6469:Hacktivism
6232:Cybercrime
6053:Shovelware
6026:Ransomware
5990:Sneakernet
5669:Protection
5584:Ransomware
5549:Fleeceware
5313:1606.05915
5237:1503.07919
5041:16 October
4797:2 December
4746:2 December
4690:2 December
4506:2 December
4457:19 January
4426:19 January
4400:17 January
4373:17 January
4346:17 January
4129:1801.00694
3985:10 January
3833:28 January
3712:19 October
3676:19 October
3578:31 October
3552:19 October
3526:19 October
3474:10 January
3332:23 January
3241:6 February
3127:10 January
3092:2205.12569
3085:: 102996.
2997:27 October
2963:27 October
2645:20 January
2635:CSO Online
2303:2 December
2210:2108.04314
2172:2 December
2148:(9): 5β9.
2002:References
1945:Hacktivism
1890:Cybercrime
1885:(metaphor)
1738:Sandboxing
1733:Sandboxing
1700:Sandboxing
1629:Mitigation
1615:Windows 10
1574:dictionary
1525:privileges
1487:executable
1303:See also:
1255:Ransomware
1249:Ransomware
1075:executable
1043:Bill Gates
1004:Ransomware
850:email spam
811:executable
744:CSO Online
732:JavaScript
728:HTML email
677:Fred Cohen
613:Cybercrime
602:keyloggers
582:ransomware
330:Logic bomb
325:Ransomware
102:Hacktivism
6536:Shellcode
6531:Scareware
6379:Crimeware
6339:Backdoors
6101:Vaporware
6048:Scareware
5944:Trialware
5932:Shareware
5594:Scareware
5544:Crimeware
5353:1084-8045
5339:: 58β76.
5194:1411.0237
5137:1751-8717
4854:1 January
4736:224940546
4611:1 January
4601:198168673
4447:PCMag.com
4229:219884145
4195:257111442
4187:2523-3246
3911:Yahoo.com
3749:2047-4954
3117:252734950
3109:0167-4048
2858:26 August
2791:"Malware"
2472:255164530
2464:2263-8733
2392:1024-123X
2330:: 58β76.
2285:0020-0255
2235:236965755
2227:0018-9340
2162:1353-4858
1803:"air gap"
1652:Windows 8
1640:antivirus
1623:firewalls
1509:Firewalls
1393:Detection
1145:Backdoors
1122:processes
1039:Microsoft
999:Backdoors
994:Root kits
943:Greyware
916:Goodware
908:Examples
865:extortion
835:broadband
628:firewalls
540:) is any
448:Blue team
440:(defunct)
434:(defunct)
428:(defunct)
422:(defunct)
410:Anonymous
350:Web shell
200:Crimeware
180:Summercon
128:White hat
118:Black hat
111:Types of
85:Hackathon
46:Phreaking
6786:Internet
6710:Firewall
6615:Defenses
6541:Spamming
6526:Rootkits
6499:Phishing
6459:Exploits
5910:Careware
5900:Freeware
5895:Freemium
5805:Beerware
5797:Licenses
5742:Honeypot
5701:Firewall
5488:Backdoor
5371:template
5290:Archived
5162:Archived
5088:Archived
5035:Archived
4979:Archived
4949:Archived
4901:51603533
4848:Archived
4791:Archived
4765:Archived
4762:SL40-PDF
4740:Archived
4684:archived
4635:Archived
4605:Archived
4500:Archived
4451:Archived
4420:Archived
4337:Archived
4316:18914754
4263:Archived
4171:(1): 1.
4146:22328658
4042:Archived
4006:Archived
3979:Archived
3947:25 March
3941:Archived
3915:Archived
3827:Archived
3801:Archived
3703:Archived
3667:Archived
3640:23 March
3634:Archived
3607:Archived
3572:Archived
3546:Archived
3520:Archived
3494:Archived
3416:Archived
3384:Archived
3326:Archived
3267:15 April
3261:Archived
3235:Archived
3214:28 April
3208:Archived
3151:Archived
3121:Archived
3043:Archived
3017:Archived
2991:Archived
2957:Archived
2924:Archived
2902:Archived
2878:Archived
2852:Archived
2801:27 March
2795:Archived
2769:Archived
2730:Archived
2700:Archived
2676:29 March
2670:Archived
2639:Archived
2605:Archived
2576:Archived
2415:Archived
2376:: 1β12.
2346:30 April
2340:Archived
2297:Archived
2293:51882216
2239:Archived
2191:(2022).
2166:Archived
2123:14324560
2064:Archived
2042:(2), 20.
2028:Archived
1950:Riskware
1935:Phishing
1845:See also
1816:Research
1690:Removal:
1610:Mac OS X
1561:executes
1332:Sony BMG
1299:Grayware
1281:WannaCry
1242:Droppers
1231:Droppers
1186:implants
1157:backdoor
1114:rootkits
1102:Rootkits
1091:actively
1071:PE files
1031:Hex dump
974:Malware
838:Internet
829:Purposes
721:(c)Brain
701:Apple II
685:Internet
609:Symantec
546:computer
542:software
444:Red team
300:Backdoor
175:ShmooCon
123:Grey hat
6802:Malware
6551:Spyware
6494:Payload
6489:Malware
6429:Viruses
6409:Botnets
6316:Threats
6031:Spyware
6016:Malware
5937:Nagware
5599:Spyware
5508:Rootkit
5437:Malware
5373:below (
4925:21 June
4844:9065830
3885:3423843
3807:29 July
3632:. CSO.
3448:5 April
3422:5 April
3302:22 June
2970:system.
2421:5 March
1807:Stuxnet
1684:threats
1680:network
1598:network
1529:Android
1478:Java SE
1448:, or a
1383:spyware
1369:Spyware
1316:spyware
1265:encrypt
1140:system.
1118:process
1108:Rootkit
1095:network
1033:of the
1022:Malware
984:Viruses
958:Spyware
880:Shamoon
872:Stuxnet
861:attacks
842:viruses
782:process
751:network
740:Verizon
683:Before
650:History
640:backups
632:patches
586:spyware
566:privacy
528:Malware
432:LulzSec
320:Spyware
295:Rootkit
288:Malware
240:Payload
230:Exploit
160:DEF CON
113:hackers
39:History
6772:Portal
6745:(SIEM)
6722:(HIDS)
6606:Zombie
6343:Bombs
6324:Adware
5868:Adware
5574:Malbot
5539:Botnet
5534:Adware
5439:topics
5390:Curlie
5376:Curlie
5351:
5282:
5252:
5209:
5168:7 July
5135:
5094:7 July
4899:
4889:
4842:
4832:
4734:
4724:
4676:
4599:
4589:
4556:895039
4554:
4544:
4492:
4314:
4304:
4227:
4193:
4185:
4144:
4097:
4034:
3883:
3873:
3747:
3182:
3115:
3107:
2761:
2544:
2519:
2515:β392.
2470:
2462:
2390:
2291:
2283:
2233:
2225:
2160:
2121:
2111:
1852:Botnet
1831:Europe
1717:kernel
1361:Adware
1320:adware
1162:trojan
963:Adware
911:Notes
813:code.
793:macros
778:server
713:MS-DOS
709:IBM PC
598:wipers
590:adware
554:client
550:server
486:Phrack
403:Groups
335:Botnet
275:Zone-H
6591:Worms
6586:Wiper
6504:Voice
6352:Logic
5308:arXiv
5293:(PDF)
5276:(PDF)
5232:arXiv
5189:arXiv
4897:S2CID
4840:S2CID
4732:S2CID
4597:S2CID
4552:S2CID
4340:(PDF)
4333:(PDF)
4312:S2CID
4225:S2CID
4191:S2CID
4142:S2CID
4124:arXiv
4068:(PDF)
4061:(PDF)
3881:S2CID
3706:(PDF)
3695:(PDF)
3670:(PDF)
3659:(PDF)
3412:(PDF)
3113:S2CID
3087:arXiv
2822:eWeek
2706:9 May
2608:(PDF)
2601:(PDF)
2468:S2CID
2289:S2CID
2231:S2CID
2205:arXiv
2119:S2CID
2067:(PDF)
2056:(PDF)
1839:India
1835:China
1740:is a
1650:(for
1494:patch
1476:, or
1423:Risks
1182:worms
1170:virus
1069:into
1050:Virus
989:Worms
902:Type
886:Types
763:SunOS
574:worms
556:, or
310:Virus
78:ethic
6357:Time
6347:Fork
6106:list
6041:Worm
5820:Free
5349:ISSN
5280:ISBN
5250:ISBN
5207:ISBN
5170:2024
5133:ISSN
5096:2024
5043:2015
5017:2018
4987:2020
4957:2017
4927:2012
4887:ISBN
4856:2022
4830:ISBN
4799:2021
4748:2021
4722:ISBN
4692:2021
4674:ISBN
4643:2020
4613:2022
4587:ISBN
4542:ISBN
4508:2021
4490:ISBN
4459:2013
4428:2013
4402:2013
4375:2013
4348:2013
4302:ISBN
4271:2020
4241:2020
4183:ISSN
4095:ISBN
4076:2018
4050:2018
4032:ISBN
3987:2023
3949:2011
3923:2015
3871:ISBN
3835:2014
3809:2009
3775:2015
3745:ISSN
3714:2017
3678:2017
3663:ESET
3642:2018
3615:2019
3580:2022
3554:2017
3528:2017
3502:2012
3476:2009
3450:2012
3424:2012
3392:2013
3361:2007
3334:2014
3304:2024
3269:2010
3243:2013
3216:2013
3180:ISBN
3159:2015
3129:2023
3105:ISSN
3051:2015
3025:2015
2999:2022
2965:2022
2932:2013
2886:2010
2860:2017
2834:2013
2803:2014
2777:2020
2759:ISBN
2738:2017
2708:2018
2678:2015
2647:2020
2616:2022
2584:2015
2572:CNET
2542:ISBN
2517:ISBN
2460:ISSN
2423:2022
2388:ISSN
2374:2020
2348:2022
2305:2021
2281:ISSN
2247:2022
2223:ISSN
2174:2021
2158:ISSN
2146:2016
2109:ISBN
2075:2014
1837:and
1829:and
1827:Asia
1658:and
1602:worm
1544:root
1511:and
1438:flaw
1307:and
1279:and
1207:Troy
1166:worm
1133:CP-V
1087:worm
1081:Worm
928:apps
765:and
755:Unix
711:and
703:and
642:and
600:and
564:and
345:HIDS
315:Worm
76:and
6362:Zip
5388:at
5341:doi
5242:doi
5199:doi
5123:doi
4879:doi
4822:doi
4714:doi
4666:doi
4579:doi
4534:doi
4482:doi
4294:doi
4217:doi
4173:doi
4134:doi
3863:doi
3737:doi
3293:doi
3097:doi
3083:124
2450:doi
2378:doi
2332:doi
2273:doi
2215:doi
2150:doi
2101:doi
1608:or
1576:or
1542:or
1464:or
1168:or
770:BSD
767:VAX
738:by
705:Mac
604:).
534:of
530:(a
355:RCE
6798::
5347:.
5337:75
5335:.
5331:.
5288:.
5248:.
5240:.
5205:.
5197:.
5156:.
5145:^
5131:.
5117:.
5113:.
5082:.
5069:^
5051:^
5033:.
5003:.
4977:.
4973:.
4935:^
4895:.
4885:.
4873:.
4846:.
4838:.
4828:.
4816:.
4789:.
4785:.
4738:.
4730:.
4720:.
4682:,
4672:,
4660:,
4633:.
4629:.
4603:.
4595:.
4585:.
4573:.
4550:.
4540:.
4528:.
4498:.
4488:.
4449:.
4445:.
4310:.
4300:.
4288:.
4261:.
4257:.
4223:.
4215:.
4211:.
4189:.
4181:.
4167:.
4163:.
4140:.
4132:.
4120:20
4118:.
4040:.
3995:^
3973:.
3969:.
3957:^
3913:.
3909:.
3905:.
3879:.
3869:.
3857:.
3843:^
3795:.
3783:^
3743:.
3731:.
3701:.
3697:.
3665:.
3661:.
3603:13
3601:.
3597:.
3378:.
3320:.
3291:,
3277:^
3206:.
3202:.
3145:.
3119:.
3111:.
3103:.
3095:.
3081:.
3077:.
3059:^
3041:.
3015:.
2989:.
2985:.
2967:.
2955:.
2949:.
2820:.
2767:.
2728:.
2724:.
2694:.
2668:.
2664:.
2637:.
2633:.
2570:.
2559:^
2550:.
2466:.
2458:.
2446:15
2444:.
2440:.
2409:.
2386:.
2372:.
2368:.
2356:^
2338:.
2328:75
2326:.
2322:.
2295:.
2287:.
2279:.
2267:.
2255:^
2237:.
2229:.
2221:.
2213:.
2201:72
2199:.
2195:.
2164:.
2156:.
2144:.
2140:.
2117:.
2107:.
2095:.
2083:^
2058:.
2038:,
2034:.
2026:.
2009:^
1833:.
1729:.
1660:11
1656:10
1654:,
1472:,
1432:A
1322:,
1318:,
1283:.
1184:,
1164:,
1155:A
1085:A
675:.
634:,
626:,
619:.
596:,
592:,
588:,
584:,
580:,
576:,
572:,
552:,
548:,
446:/
6774::
6200:e
6193:t
6186:v
5781:e
5774:t
5767:v
5429:e
5422:t
5415:v
5355:.
5343::
5316:.
5310::
5258:.
5244::
5234::
5215:.
5201::
5191::
5172:.
5139:.
5125::
5119:7
5098:.
5045:.
5019:.
4989:.
4959:.
4929:.
4903:.
4881::
4858:.
4824::
4801:.
4771:.
4750:.
4716::
4668::
4645:.
4615:.
4581::
4558:.
4536::
4510:.
4484::
4461:.
4430:.
4404:.
4377:.
4350:.
4318:.
4296::
4273:.
4243:.
4219::
4197:.
4175::
4169:3
4148:.
4136::
4126::
4103:.
4078:.
4052:.
3989:.
3975:7
3951:.
3925:.
3887:.
3865::
3837:.
3811:.
3777:.
3751:.
3739::
3733:7
3716:.
3680:.
3644:.
3617:.
3582:.
3556:.
3530:.
3504:.
3478:.
3452:.
3426:.
3394:.
3363:.
3336:.
3295::
3271:.
3245:.
3218:.
3188:.
3161:.
3131:.
3099::
3089::
3053:.
3027:.
3001:.
2934:.
2908:.
2888:.
2862:.
2836:.
2805:.
2779:.
2740:.
2710:.
2680:.
2649:.
2618:.
2586:.
2525:.
2513:1
2474:.
2452::
2425:.
2394:.
2380::
2350:.
2334::
2307:.
2275::
2249:.
2217::
2207::
2176:.
2152::
2125:.
2103::
2077:.
2040:8
664:.
516:e
509:t
502:v
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.