Sizing up the malware threat - key malware trends for 2010

被引:0
|
作者
Cluley G.
机构
关键词
D O I
10.1016/S1353-4858(10)70045-3
中图分类号
学科分类号
摘要
Malware has changed over the past decade, evolving from being a bedroom operation run by solitary teenage boys to become a major money-making industry in its own right. © 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:8 / 10
页数:2
相关论文
共 50 条
  • [41] Cyber threat intelligence framework using advanced malware forensics
    Keim Y.
    Mohapatra A.K.
    International Journal of Information Technology, 2022, 14 (1) : 521 - 530
  • [42] A Deep Learning Approach for Malware and Software Piracy Threat Detection
    Aldriwish, Khalid
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2021, 11 (06) : 7757 - 7762
  • [43] Hidden Malware Ratchets Up Cybersecurity Risks
    Greengard, Samuel
    COMMUNICATIONS OF THE ACM, 2022, 65 (10) : 16 - 18
  • [44] EARTHQUAKES - SIZING UP THE THREAT
    KISSLINGER, C
    NATURE, 1992, 355 (6355) : 18 - 19
  • [45] An overview of social engineering malware: Trends, tactics, and implications
    Abraham, Sherly
    Chengalur-Smith, InduShobha
    TECHNOLOGY IN SOCIETY, 2010, 32 (03) : 183 - 196
  • [46] Introduction to the Special Issue on Challenges and Trends in Malware Analysis
    Rodriguez, R. J.
    Ugarte-Pedrero, X.
    Tapiador, J.
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (02):
  • [47] Advanced persistent threat organization identification based on software gene of malware
    Chen, Weixiang
    Helu, Xiaohan
    Jin, Chengjie
    Zhang, Man
    Lu, Hui
    Sun, Yanbin
    Tian, Zhihong
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (12)
  • [48] AZSecure Hacker Assets Portal: Cyber Threat Intelligence and Malware Analysis
    Samtani, Sagar
    Chinn, Kory
    Larson, Cathy
    Chen, Hsinchun
    IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 19 - 24
  • [49] Automatic Generation of MAEC and STIX Standards for Android Malware Threat Intelligence
    Park, Jungsoo
    Vu, Long Nguyen
    Bencivengo, George
    Jung, Souhwan
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (08): : 3420 - 3436
  • [50] SIGNET: a worldwide deployable framework to support the analysis of malware threat models
    Leita, Corrado
    Dacier, Marc
    EDCC-7: SEVENTH EUROPEAN DEPENDABLE COMPUTING CONFERENCE, PROCEEDINGS, 2008, : 99 - 109