Skip to main content

Home/ ACSE Discussion/ Group items tagged detection

Rss Feed Group items tagged

tech vedic

How to remove 'Yontoo' adware Trojan from OS X system? - 0 views

  •  
    Yontoo Trojan, detected by noted security company Dr. Web is blamed for tracking the browsing behaviors across a range of popular browsers like Safari, Chrome, and Firefox. It may pretend as a media player, download manager, or other plug-in, thereby directing you to some maliciously crafted Web sites disguised as sources for file sharing and movie trailers.
Doug Peterson

GpCode ransomware returns, with stronger encryption | ZDNet - 0 views

  •  
    A new version of the dangerous GpCode ransomware has been detected, using RSA-1024 and AES-256 as crypto-algorithms.
Doug Peterson

Supercookies: What You Need to Know About the Web's Latest Tracking Device - 0 views

  •  
    Recently, online properties like Hulu, MSN and Flixster have been caught using a tougher version of the common cookie. These "supercookies" (aka "Flash cookies" and "zombie cookies") serve the same purpose as regular cookies by tracking user preferences and browsing histories. Unlike their popular cousins, however, this breed is difficult to detect and subsequently remove. These cookies secretly collect user data beyond the limitations of common industry practice, and thus raise serious privacy concerns.
Peter McAsh

WIRED - Digital Detectives Deciphered stuxnet - 0 views

  •  
    Long article.
tech vedic

How to know that my computer is virus or malware infected? - 0 views

  •  
    Advantages: Keeps system running smooth Protection against Internet frauds
Doug Peterson

nude.js | Nudity detection with JavaScript and HTMLCanvas - 0 views

  •  
    nude.js is a JavaScript implementation of a nudity scanner based on approaches from research papers. HTMLCanvas makes it possible to analyse image data and afterwards decide whether it should be displayed or not.
Peter McAsh

6 weird malware tricks hackers use to bypass security - 0 views

  •  
    6 weird malware tricks hackers use to bypass security Security experts presenting in the upcoming SecTor conference reveal six new tactics that cyber criminals are employing to circumvent security and avoid detection.
1 - 7 of 7
Showing 20 items per page