Search results

Page title matches

  • .../Security-Field-Advisory-Dexter-POS-Malware_20121227.pdf |title=Dexter POS Malware Threat ...rminals |url=https://arstechnica.com/information-technology/2012/12/dexter-malware-steals-credit-card-data-from-point-of-sale-terminals/ |access-date=2022-04-
    7 KB (876 words) - 00:10, 26 September 2023
  • {{Short description|Computer malware}} ...security/iot-malware-clashes-in-a-botnet-territory-battle.html | title=IoT malware clashes in a botnet territory battle | publisher=[[PC World]] | date=April
    8 KB (946 words) - 00:11, 26 September 2023
  • {{Short description|Malware that turns computer systems running Linux into remotely controlled "bots"}} ...6 | url-status=dead }}</ref> a [[White hat (computer security)|white hat]] malware research group, and has been used in some of the largest and most disruptiv
    38 KB (4,639 words) - 00:13, 26 September 2023
  • {{Short description|Sophisticated malware}} ...</ref> ''The Intercept'' provided samples of Regin for download, including malware discovered at a Belgian telecommunications provider, [[Belgacom]].<ref name
    12 KB (1,574 words) - 00:15, 26 September 2023
  • {{short description|Malware package}} ==Malware==
    4 KB (568 words) - 00:18, 26 September 2023
  • | type = [[Malware]] ...ttack-ukraine-russia-code-crashed-the-world/ |url-status=live }}</ref> The malware targets [[Microsoft Windows]]–based systems, infecting the [[master boot
    51 KB (6,024 words) - 00:15, 26 September 2023
  • {{short description|Cyberespionage malware}} ...2012 and uncovered in January 2013 by Russian firm [[Kaspersky Lab]]. The malware was reportedly operating worldwide for up to five years prior to discovery,
    9 KB (1,250 words) - 00:15, 26 September 2023

Page text matches

  • {{Short description|Distributor of malware}} The '''Necurs botnet''' is a distributor of many pieces of malware, most notably [[Locky]].
    2 KB (246 words) - 00:13, 26 September 2023
  • {{Short description|Android Malware, discovered in February 2016}} '''HummingBad''' is [[Linux malware|Android malware]], discovered by [[Check Point]] in February 2016.<ref>{{cite web|url=http:
    3 KB (383 words) - 00:11, 26 September 2023
  • {{short description|Malware package}} ==Malware==
    4 KB (568 words) - 00:18, 26 September 2023
  • {{Short description|Computer malware}} ...security/iot-malware-clashes-in-a-botnet-territory-battle.html | title=IoT malware clashes in a botnet territory battle | publisher=[[PC World]] | date=April
    8 KB (946 words) - 00:11, 26 September 2023
  • .../Security-Field-Advisory-Dexter-POS-Malware_20121227.pdf |title=Dexter POS Malware Threat ...rminals |url=https://arstechnica.com/information-technology/2012/12/dexter-malware-steals-credit-card-data-from-point-of-sale-terminals/ |access-date=2022-04-
    7 KB (876 words) - 00:10, 26 September 2023
  • {{Short description|Cybercrime malware botnet}} ...[botnet]], operating at least since 2006, and one of the major botnets and malware distributors on the Internet. In January 2013, its operations were disrupte
    5 KB (652 words) - 00:18, 26 September 2023
  • '''''Code Shikara''''' is a [[computer worm]], related to the [[Dorkbot (malware)|Dorkbot family]], that attacks through [[Social engineering attack|social ...ling usernames and passwords, the [[bot herder]] may also order additional malware downloads.
    5 KB (723 words) - 00:09, 26 September 2023
  • .../17/spam_botnet_trends/ |title=Undead botnets blamed for big rise in email malware; Grave concern over reanimated cyber-corpses |first=John |last=Leyden |work *[[Malware]]
    3 KB (468 words) - 00:12, 26 September 2023
  • {{short description|Destructive malware targeting IoT devices}} '''BrickerBot''' was [[malware]] that attempted to [[Denial-of-service_attack#Permanent_denial-of-service_
    4 KB (520 words) - 00:08, 26 September 2023
  • The name of this malware is based on the fact that early versions of it contained the string "NetTra ...f countries.<ref>{{Cite news|url=https://www.csoonline.com/article/2131350/malware-cybercrime/cyberespionage-campaign---39-nettraveler--39--siphoned-data-from
    4 KB (544 words) - 00:13, 26 September 2023
  • {{Short description|Android based malware}} ...re/|title=DIY Attribution, Classification, and In-depth Analysis of Mobile Malware|date=2016-07-11|website=Check Point Blog|access-date=2016-10-09}}</ref>
    20 KB (2,441 words) - 00:16, 26 September 2023
  • {{short description|Cyberespionage malware}} ...2012 and uncovered in January 2013 by Russian firm [[Kaspersky Lab]]. The malware was reportedly operating worldwide for up to five years prior to discovery,
    9 KB (1,250 words) - 00:15, 26 September 2023
  • {{Short description|Sophisticated malware}} ...</ref> ''The Intercept'' provided samples of Regin for download, including malware discovered at a Belgian telecommunications provider, [[Belgacom]].<ref name
    12 KB (1,574 words) - 00:15, 26 September 2023
  • ...V0UP/Malware-caused-Indias-biggest-debit-card-fraud-Audit-repor.html|title=Malware caused India's biggest debit card data breach: Audit report|last=Gopakumar| ...erformed by SISA Information Security reports that the breach was due to [[malware]] injected into the [[payment gateway]] network of [[Hitachi]] Payment Syst
    3 KB (434 words) - 00:06, 26 September 2023
  • ...V0UP/Malware-caused-Indias-biggest-debit-card-fraud-Audit-repor.html|title=Malware caused India's biggest debit card data breach: Audit report|last=Gopakumar| ...erformed by SISA Information Security reports that the breach was due to [[malware]] injected into the [[payment gateway]] network of [[Hitachi]] Payment Syst
    3 KB (443 words) - 22:39, 13 August 2023
  • .../security/portal/Threat/Encyclopedia/Search.aspx?query=Bredolab Search the malware encyclopedia: Bredolab], Microsoft.com</ref> was a Russian<ref name=autogen ...form of propagation was through sending malicious e-mails that included [[malware]] attachments which would infect a computer when opened, effectively turnin
    9 KB (1,258 words) - 00:08, 26 September 2023
  • {{Short description|Windows-platform based malware}} ...ties, Sality is considered one of the most complex and formidable forms of malware to date.
    25 KB (3,771 words) - 00:16, 26 September 2023
  • ...'''Waledpak''', was a [[botnet]] mostly involved in [[e-mail spam]] and [[malware]]. In March 2010 the botnet was taken down by [[Microsoft]].<ref name="ther *[[Command and control (malware)]]
    4 KB (612 words) - 00:18, 26 September 2023
  • * [[Mirai (malware)]] * [[Hajime (malware)]]
    7 KB (971 words) - 00:09, 26 September 2023
  • ...nk credentials and credit cards.<ref name=washingtontimes/> After that the malware would attempt to self-propagate to other connectible systems using various After completing its initial infection routine the malware would contact a [[Botnet#Command_and_control|command-and-control server]] w
    11 KB (1,517 words) - 00:12, 26 September 2023
  • | products = [[Stuxnet]], [[Flame (malware)|Flame]], [[EternalBlue]] ...the-death-star-of-malware-galaxy/68750/ |title=Equation: The Death Star of Malware Galaxy |author=GReAT |date=February 16, 2015 |website=Securelist.com |publi
    15 KB (1,961 words) - 00:10, 26 September 2023
  • ..."Operation Cleaver" alludes to frequent uses of the word "cleaver" in the malware's coding.<ref>{{cite web|last=Bertrand|first=Natasha|author-link=Natasha Be
    5 KB (631 words) - 00:14, 26 September 2023
  • ...reneur and IT professional, with the aim to address the rapidly increasing malware practices in the IT sector. As an executive protection firm Cyber Boy Corp. ...offers a vast range of security services that help clients get rid of the malware from their systems.<ref>{{cite web |title=Cyber Boy Corp. |url=https://cybe
    7 KB (925 words) - 16:11, 4 August 2021
  • ...or Laptop Been Hacked? -Dhruv Pandit|url=http://gujaratmail.in/news-detail/malware-analysis-has-your-phone-or-laptop-been-hacked-dhruv-pandit?v=1|access-date=
    3 KB (349 words) - 22:49, 18 July 2023
  • ...[[Blogspot]], and [[blog.com]],<ref name=":4" /> which were used to host [[malware]]<ref name=":6">{{Cite web|url = http://www.cnet.com/news/report-india-targ ...ce of His Holiness the Dalai Lama (OHHDL) had been compromised by multiple malware networks, one of which was the Shadow Network.<ref>{{Cite web|url = https:/
    8 KB (1,018 words) - 00:16, 26 September 2023
  • ...shing]] and other forms of [[computer crime]]; as well as [[trading]] in [[malware]], bank login details and stolen [[credit card]] numbers.<ref name="reg">{{
    3 KB (376 words) - 00:14, 26 September 2023
  • ...UK|url=https://cyberdaily.securelayer7.net/uk-invents-device-to-thwart-usb-malware/|access-date=2021-09-13|website=The Cybersecurity Daily News|language=en-US
    3 KB (400 words) - 14:21, 23 September 2021
  • ...used on versions later than NT was abused by the [[Flame (malware)|"FLAME" malware]], leading to a patch in 2012 restricting the Certificate Creation system u
    8 KB (1,199 words) - 22:33, 17 August 2023
  • ...stem. Hitachi provides ATM and [[Point of sale]] services in India and the malware enabled hackers to extract money from user accounts. The [[National Payment ...temporary files extracted from a remote server by the attacker. The Dtrack malware has been traced back to the [[North Korea]]-linked<ref>{{Cite web|title=Tre
    26 KB (3,520 words) - 00:10, 26 September 2023
  • ...ion and intellectual property from U.S. commercial firms and of planting [[malware]] on their computers.<ref>Finkle, J., Menn, J., Viswanatha, J. [https://www Most activity between [[malware]] embedded in a compromised system and the malware's controllers takes place during business hours in Beijing's time zone, sug
    16 KB (1,932 words) - 00:15, 26 September 2023
  • {{Short description|Malware that turns computer systems running Linux into remotely controlled "bots"}} ...6 | url-status=dead }}</ref> a [[White hat (computer security)|white hat]] malware research group, and has been used in some of the largest and most disruptiv
    38 KB (4,639 words) - 00:13, 26 September 2023
  • ...t Windows]] systems even if the computer system was rebooted. It installed malware and hacking tools to access systems and steal data.<ref name=":1" />
    8 KB (1,028 words) - 00:15, 26 September 2023
  • ...owiki> About NPTI Southern Region]<sup>[[WP:LINKSTOAVOID|[Link may contain Malware – disabled]]]</sup>{{citation needed|date=January 2013}}</ref>
    4 KB (547 words) - 03:23, 3 April 2021
  • {{short description|Series of powerful cyberattacks using the Petya malware}} | cause = [[Malware]], [[ransomware]], [[cyberterrorism]]
    47 KB (5,688 words) - 00:09, 26 September 2023
  • ...ware]], [[disinformation]], [[Backdoor (computing)|backdoors]], [[Dropper (malware)|droppers]] ...ref>{{Cite web |title=FBI thwarts Lazarus-linked North Korean surveillance malware |url=https://www.itpro.co.uk/go/33609 |access-date=2019-08-16 |website=IT P
    43 KB (5,860 words) - 00:12, 26 September 2023
  • ...group had developed the software used to infect 1,400 target devices with malware.<ref>{{Cite news|url=https://timesofindia.indiatimes.com/business/india-bus
    6 KB (798 words) - 00:19, 26 September 2023
  • | type = [[Malware]] ...ttack-ukraine-russia-code-crashed-the-world/ |url-status=live }}</ref> The malware targets [[Microsoft Windows]]–based systems, infecting the [[master boot
    51 KB (6,024 words) - 00:15, 26 September 2023
  • ...n10-av-rankings,news-23945.html|title=Microsoft Antivirus Tied for Last in Malware Tests|last=Wagenseil|first=Paul|date=2016-11-30|work=Tom's Guide|archive-ur
    7 KB (833 words) - 12:03, 16 December 2021
  • ...agaraja, Ross Anderson |date=March 2009 |title=The snooping dragon: social-malware surveillance of the Tibetan movement |url=http://www.cl.cam.ac.uk/techrepor ...|last2=Anderson, Ross |date=March 2009 |title=The snooping dragon: social-malware surveillance of the Tibetan movement |url=http://www.cl.cam.ac.uk/techrepor
    14 KB (1,864 words) - 00:11, 26 September 2023
  • **Malware and keylogger design.
    7 KB (871 words) - 19:16, 31 July 2023
  • ...lware-affects-thousands-of-bsnl-broadband-modems/article19381410.ece|title=Malware affects thousands of BSNL broadband modems
    23 KB (3,085 words) - 21:23, 28 August 2023
  • [[Category:Windows malware]]
    7 KB (983 words) - 00:09, 26 September 2023
  • ...vestigation.<ref>{{cite news |last1=Staff |first1=The Wire |title=Pegasus: Malware Found in 5 Phones, Government 'Refused to Cooperate' With Probe, Says CJI | ...]]'s oral note on uploading parts of it on the website.<ref name="the-wire-malware-found" /><ref>{{cite news |title=SC Keeps Pegasus Report in Sealed Cover De
    48 KB (6,301 words) - 00:14, 26 September 2023
  • |Title = Malware
    11 KB (1,191 words) - 05:55, 14 May 2021
  • * [[Malware R Ghai]] as Mrs. Kavita Sinha
    8 KB (1,162 words) - 15:50, 13 June 2022
  • ...ware-found-on-indian-nuclear-plants-network/|title=Confirmed: North Korean malware found on Indian nuclear plant's network|date=30 October 2019|newspaper=[[ZD
    31 KB (3,991 words) - 00:12, 26 September 2023
  • ...oits, or content that is illegal to access in the United States. Suspected malware sites can be reported by following the instructions at [[Wikipedia:Spam bla ...]] along with a note in the comment explaining that the official site is a malware site. The website could also be inserted by an infobox, in which referring
    46 KB (7,171 words) - 20:02, 31 August 2023
  • * Malware Reporting
    12 KB (1,626 words) - 00:21, 26 September 2023
  • [[Category:Malware in fiction]]
    9 KB (1,137 words) - 08:01, 9 May 2022
  • | type = [[Dropper (malware)|Dropper]] '''Stuxnet''' is a [[Malware|malicious]] [[computer worm]] first uncovered in 2010 and thought to have b
    140 KB (17,905 words) - 00:17, 26 September 2023
  • ...tsmc-wannacry-ransomware-attack.html|title=TSMC Chip Maker Blames WannaCry Malware for Production Halt|work=The Hacker News|access-date=7 August 2018|language ...//web.archive.org/web/20170506144144/http://www.silicon.co.uk/security/nsa-malware-security-210253|url-status=live}}</ref> The WannaCry code can take advantag
    113 KB (13,200 words) - 00:18, 26 September 2023
  • On 12 May 2017, Andhra Pradesh Police computer's network was attacked by a malware known as [[WannaCry ransomware attack]] which was found to be critical.
    12 KB (1,482 words) - 14:55, 19 August 2021
  • ...ernet/220696-forbes-forces-readers-to-turn-off-ad-blockers-promptly-serves-malware |publisher=Extreme Tech |access-date=April 14, 2017}}</ref>
    28 KB (3,669 words) - 20:01, 7 August 2021
  • ...rt published by [[McAfee]] found that, in terms of potential exposure to [[malware]], lyrics-related searches and searches containing the word "free" are the
    13 KB (1,869 words) - 02:27, 30 August 2023
  • ...'''malware''', is software that is developed to harm or disrupt computers. Malware is closely associated with computer-related crimes, though some malicious p
    36 KB (5,105 words) - 11:14, 30 August 2023
  • ...ode such as [[computer worm]]s or [[computer virus|viruses]], installing [[malware]] or [[spyware]] to steal data, [[phishing]], and [[advance-fee scam]]s.<re Ransomware is a type of malware used in cyberextortion to restrict access to files, sometimes threatening p
    77 KB (10,704 words) - 23:03, 3 August 2023
  • ...''[[Wired (magazine)|Wired]]'' report noted the attack was able to inject malware via calls to the targeted phone, even if the user did not answer the call.< ...tps://techcrunch.com/2020/07/16/federal-court-rules-whatsapp-and-facebooks-malware-exploit-case-against-nso-group-can-proceed/?guccounter=1&guce_referrer=aHR0
    179 KB (21,925 words) - 22:17, 17 August 2023
  • ...[[Kaspersky Lab]], equates large-scale [[cyber weapon]]s, such as [[Flame (malware)|Flame]] and [[NetTraveler]] which his company discovered, to [[biological ...gs.nytimes.com/2010/09/24/malware-hits-computerized-industrial-equipment/ "Malware Hits Computerized Industrial Equipment"]. ''The New York Times'', 24 Septem
    150 KB (20,588 words) - 17:16, 10 September 2023
  • ...emails for multiple purposes, including to filter [[Spamming|spam]] and [[malware]], and to add context-sensitive advertisements next to emails. This adverti ...emails for multiple purposes, including [[spam filter|filtering spam]] and malware, and (until 2017) adding context-sensitive advertisements next to emails.<r
    108 KB (13,310 words) - 22:17, 17 August 2023
  • ...Wilson was placed on his laptop by a yet-to-be-identified attacker using a malware while his laptop was compromised for over 22 months.<ref>{{cite news |title
    31 KB (3,920 words) - 00:04, 24 July 2023
  • ...eting-evidence-flexispy |title=The Wayback Machine Is Deleting Evidence of Malware Sold to Stalkers |last=Cox |first=Joseph |date=May 22, 2018 |access-date=Ma ...Joseph|date=May 22, 2018|title=The Wayback Machine Is Deleting Evidence of Malware Sold to Stalkers|url=https://www.vice.com/en/article/nekzzq/wayback-machine
    74 KB (9,642 words) - 12:19, 8 October 2023
  • ...ware, some students complained of their laptops slowing or crashing due to malware.<ref>{{Cite web|last=Garg|first=Tina|date=2020-06-05|title=What Is PEXA And
    33 KB (4,545 words) - 20:39, 21 July 2023
  • ...security#Malware infections|infects]] her and her sister's laptop with a [[malware]]-laced USB flash drive.<ref>{{cite web|url=https://gizmodo.com/barbie-f-ck
    74 KB (10,546 words) - 09:57, 29 January 2022
  • ...of websites, social media accounts, personal devices and the creation of [[malware]] had taken place to urge people to subscribe. "[[Bitch Lasagna]]", a [[dis
    71 KB (8,540 words) - 15:04, 28 February 2022
  • ...s in cold storage even when used with computers that may be compromised by malware.{{r|befuddled|page=42–45}}
    52 KB (6,858 words) - 13:48, 2 July 2021
  • ...nal information classes, provide free operating systems with utilities for malware, free access to internet, and for computerized activities of daily life as
    113 KB (14,888 words) - 09:52, 25 May 2022
  • ...e=Indeed, there's no evidence of any hack. Most likely to have been either malware or someone not using a 2-step verification password. |date=11 June 2019}}</ ...raveled/|url-status=live}}</ref> The attack relied on people downloading a malware-infected file from any source, at which point it would replace Telegram fil
    202 KB (24,900 words) - 22:33, 17 August 2023
  • [[Category:Malware in fiction]]
    105 KB (12,653 words) - 01:03, 2 July 2023
  • ...ptocurrency private keys can be permanently lost from local storage due to malware, data loss or the destruction of the physical media. This precludes the cry
    87 KB (11,220 words) - 23:52, 31 May 2021
  • ...users visiting pirate websites who are then subjected to pirated content, malware, and fraud.<ref>{{cite web |title=Advertising Fuels $1.34 Billion Illegal P
    80 KB (11,941 words) - 02:34, 14 August 2023
  • ...2012 |website=postnoon}}</ref> Link goes to random ads, antivirus flagged (malware?) --><ref>{{Cite web |url=https://indiancinema100.in/swadeshi/ |title=Celeb
    107 KB (13,987 words) - 12:07, 12 August 2021
  • ...2012 |website=postnoon}}</ref> Link goes to random ads, antivirus flagged (malware?) --><ref>{{Cite web |url=https://indiancinema100.in/swadeshi/ |title=Celeb
    108 KB (14,093 words) - 21:52, 15 December 2021
  • ...2012 |website=postnoon}}</ref> Link goes to random ads, antivirus flagged (malware?) --><ref>{{Cite web |url=https://indiancinema100.in/swadeshi/ |title=Celeb
    113 KB (14,567 words) - 16:35, 26 June 2022
  • [[Category:Malware in fiction]]
    109 KB (14,155 words) - 20:23, 23 September 2023
  • [[Category:Malware in fiction]]
    101 KB (14,288 words) - 20:08, 23 September 2023
  • ...r. It also included offensive cyber-warfare capabilities, like injecting [[malware]] into remote computers. Congress criticized Turbulence in 2007 for having ...port-says/ |title=The NSA regularly intercepts laptop shipments to implant malware report says|work=extremetech.com |date=December 30, 2013}}</ref> Cottonmout
    215 KB (29,469 words) - 11:43, 14 September 2023
  • ...fter the skirmishes in 2020, though it did not validate a link between the malware and Mumbai power outage.<ref name="RecordedFutureNYT">{{Cite news |last1=Sa
    378 KB (47,031 words) - 02:11, 14 August 2023
  • ...l|copy protection scandal]], because its music CDs had installed [[rootkit|malware]] on users' computers that was posing a security risk to affected customers
    113 KB (15,473 words) - 22:22, 14 August 2023
  • ...iew.com/article/property-insurance-cyber-insurance-coverage-and-war-losses-malware-may-not-be-0 |access-date=25 April 2019 |work=The National Law Review |date
    114 KB (16,578 words) - 20:26, 25 August 2021
  • Twitter acquired [[Dasient]], a startup that offers malware protection for businesses, in January 2012. Twitter announced plans to use ...ts that point to external websites that contain malicious content (such as malware and phishing content) as well or hate speech, speech encouraging violence,
    288 KB (38,176 words) - 09:39, 2 July 2023
  • ...cause they've failed to upgrade to the latest Windows service pack or some malware disabled Windows Update then those days will hopefully be over."<ref name=v
    203 KB (26,192 words) - 23:23, 4 September 2023