One of the main challenges in security today is defending against malware attacks. As trends and anecdotal evidence show, preventing these attacks, regardless of their …
Although the concept of ransomware is not new (ie, such attacks date back at least as far as the 1980s), this type of malware has recently experienced a resurgence in popularity. In fact …
A processing device in one embodiment comprises a processor coupled to a memory and is configured to obtain internal log data of a computer network of an enterprise, to extract …
Similar to criminals in the physical world, cyber-criminals use a variety of illegal and immoral means to achieve monetary gains. Recently, malware known as ransomware started to …
A wave of alternative coins that can be effectively mined without specialized hardware, and a surge in cryptocurrencies' market value has led to the development of cryptocurrency …
Purpose This paper aims to shed light into money laundering using bitcoin. Digital payment methods are increasingly used by criminals to launder money obtained through cybercrime …
A Oprea, Z Li, TF Yen, SH Chin… - 2015 45th Annual IEEE …, 2015 - ieeexplore.ieee.org
Recent years have seen the rise of sophisticated attacks including advanced persistent threats (APT) which pose severe risks to organizations and governments. Additionally, new …
A Nappa, R Johnson, L Bilge… - … IEEE symposium on …, 2015 - ieeexplore.ieee.org
Vulnerability exploits remain an important mechanism for malware delivery, despite efforts to speed up the creation of patches and improvements in software updating mechanisms …
Malware remains an important security threat, as miscreants continue to deliver a variety of malicious programs to hosts around the world. At the heart of all the malware delivery …