Sizing up the malware threat - key malware trends for 2010

被引:0
|
作者
Cluley G.
机构
关键词
D O I
10.1016/S1353-4858(10)70045-3
中图分类号
学科分类号
摘要
Malware has changed over the past decade, evolving from being a bedroom operation run by solitary teenage boys to become a major money-making industry in its own right. © 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:8 / 10
页数:2
相关论文
共 50 条
  • [1] Mobile Device Threat: Malware
    Atanassov, Nikolay
    Chowdhury, Md Minhaz
    2021 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2021, : 7 - 13
  • [2] Automatic Generation of Malware Threat Intelligence from Unstructured Malware Traces
    Wei, Yuheng
    Zou, Futai
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT I, 2021, 398 : 44 - 61
  • [3] Threat assessment model for mobile malware
    v Do, Thanh
    Lyche, Fredrik B.
    Lytskjold, Jørgen H.
    van Thuan, Do
    Lecture Notes in Electrical Engineering, 2015, 339 : 467 - 474
  • [4] TRENDS IN ANDROID MALWARE DETECTION
    Shaerpour, Kaveh
    Dehghantanha, Ali
    Mahmod, Ramlan
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2013, 8 (03) : 21 - 40
  • [5] Intelligent malware – trends and possibilities
    Plucar J.
    Frank J.
    Walter D.
    Zelinka I.
    Mendel, 2021, 27 (01) : 18 - 22
  • [6] Identifying Mobile Malware and Key Threat Actors in Online Hacker Forums for Proactive Cyber Threat Intelligence
    Grisham, John
    Samtani, Sagar
    Patton, Mark
    Chen, Hsinchun
    2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2017, : 13 - 18
  • [7] Threat Analysis of Incubation Period in Malware Epidemics
    Kim, Seong-Woo
    Park, Jong-Ho
    Lee, Eun-Dong
    Choi, Mid-Eum
    Seo, Seung-Woo
    2010 IEEE 71ST VEHICULAR TECHNOLOGY CONFERENCE, 2010,
  • [8] Eliminating the Embedded Malware Threat at the Binary Level
    Brady, Mick
    ISACA Journal, 2022, 4 : 38 - 43
  • [9] Using Dynamic Taint Approach for of Malware Threat
    Wang, Ping
    Lin, Wen-Hui
    Chao, Wun Jie
    Chao, Kuo-Ming
    Lo, Chi-Chun
    2015 IEEE 12TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2015, : 408 - 416
  • [10] The threat to identity from new and unknown malware
    Hodgson, PW
    BT TECHNOLOGY JOURNAL, 2005, 23 (04) : 107 - 112