SPYWARE
1,800 Followers
Recent papers in SPYWARE
Hardware virtualization technologies play a significant role in cyber security. On the one hand these technologies enhance security levels, by designing a trusted operating system. On the other hand these technologies can be taken up into... more
— This seminar covers a contemporary issue in Computer Security; Spyware and Trojan Horses. These are separate security threats to networked systems, both of which are realized using differing software development techniques. We introduce... more
T There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working principal of such malware then we can very easily prevent most... more
The spread of broadband Internet has resulted in the increase of spyware and adware. This study highlights their damaging effects and proposes a model that captures defensive measures adopted by Internet users. Specifically, our model... more
Ein ausführlicher Leitfaden für Anfänger zum Hacken von Facebook Passwort
Masalah keamanan system penyedia informasi menjadi salah satu aspek penting dari sebuah sistem informasi. Sayang sekali masalah keamanan ini sering kali kurang mendapat perhatian dari para pemilik dan pengelola sistem informasi.... more
"Lorsque l’on évoque l’affaire « Pegasus », beaucoup l’associent immédiatement à la surveillance globale par les États de nos faits et gestes, aux actions d’espionnage adverse, mais également au non-respect de la législation en vigueur... more
A product of the global rise of right-wing populism has been a seeming normalisation of gendered public disinformation, which portrays female public figures as unintelligent, untrustworthy, irrational, and libidinous. Social media has... more
User activity monitoring (UAM) do the task of monitoring and recording of user actions, in the field of information security or cyber security. Including the use of applications, windows opened, system commands executed, checkboxes... more
Internet surveillance has become a crucial issue for journalism. The “Snowden moment” has shed light on the risks that journalists and their sources face while communicating online and has shown how journalists themselves can be targets... more
International journal on applications of graph theory in wireless ad hoc networks and sensor networks (ABSTRACT T There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other... more
Technologies play crucial roles in security politics. In a recent push to understand the dynamic interplay between technologies and politics, IR scholars increasingly draw on reflexive research traditions. The aim is to understand the... more
Pitch => "Stylish, une extension de navigateur web, vient d'être supprimée de Mozilla et de Google Chrome. Téléchargée par plus de deux millions d'internautes, elle collectait leur historique de navigation."
Après le scandale de la surveillance des communications par la NSA, il semblerait que la Russie ferait de même. Les services de renseignements, le FSB, espionnerait plus de 400 millions d'internautes grâce à un fournisseur d'antivirus.
This article is about how you can protect yourself and your computer from Cerbe virus.
The paper summarizes the research the author conducted under the individually targetable mass surveillance systems of the P. R. China dictatorial regime with cyber sovereignty claims. In the complexities of cyber security and mass... more
L’evoluzione delle tecnologie, con la relativa diffusione delle piattaforme digitali, ha certamente apportato molteplici benefici alla nostra società e potremmo definirla come la terza rivoluzione industriale, quella digitale appunto. Non... more
“Warning, your computer is infected with spyware. Windows needs to download and install the anti-spyware updates to remedy this issue. Click OK to begin.” This is just one example of many popup warnings that spyware and malware creators... more
The threat profile of spyware is increasing rapidly when we consider the pervasiveness of computing in everyday life. The surreptitious nature of spyware can lead to information mining, data theft and exploitation of stolen data. This... more
—Internet security threats have grown from just simple viruses to various forms of computer hacking, scams, impersonation, cyber bullying, and spyware. The Internet has great influence on most people. It has profound influence and one can... more
Has someone been sending spam or viruses over eMail with your identity? With identity theft scams of any type, once the forger has your information it's very difficult to do much until they're either caught [by authorities], or their... more
El domingo 18 de julio, Amnistía Internacional y la plataforma Forbidden Stories, con la colaboración de varios medios informativos, dieron a conocer que algunos de los clientes del programa Pegasus emplearon ese spyware para interceptar... more
Human actions like selecting incorrect password, entering the password in an insecure way it will leads to weakest link in authentication. Due to the weakest link, an attacker can damage the hardware, software or theft the information. So... more
GRAPH-HOC is a quarterly open access peer-reviewed journal focuses on the applications of graph theory in different areas of wireless ad hoc networks such as Mobile Ad hoc Networks (MANETs), Vehicular Ad hoc Networks (VANETs) and sensor... more
Zwischen Tier und Mensch haben sich im Laufe der Zeit viele ungewtihnliche Symbiosen und Antibiosen ergeben. Vom Nutztier zur Leibspeise, vom besten Freund zum gefUrchteten Feind. Der amerikanische Geheimdienst CIA begann ein Projekt mit... more
It's now indisputable fact that governments in the Middle East are using spyware to spot political activists rather than terrorists or criminals. I wrote many articles about this phenomenon since the revelation of WikiLeaks SpyFiles. But... more
Identity theft is an attractive activity for cyber-criminals. Every day, many people are victim of one of the many cyber-traps resulting in millions of dollars lost. People victim of these crimes suffer terrible consequences trying to... more
The primary goal of computer security is to defend computers against attacks launched by malicious users. There are a number of ways in which researchers and developers can work to protect the network they use; one class of these tools... more
Spyware evidence is playing a decisive role in court cases. Recently, Delhi high court has admitted evidence collected through spyware illegally installed by the husband in his wife mobile. Gone are the days when you have to steal the... more
Let us ask a counter-intuitive question: what if instead of (only) hacking the internet sites of Mastercard, Paypal and Visa, our ‘Anonymous’ hackers had (instead) attempted to connect with the rank and file employees of the company to go... more
It is possible to transfer gigabits of data with near perfect secrecy using the BitTorrent Protocols and BitTorrent Objects providing one concatenates them together in a way to provide essentially concatenated encryption (as single step... more
Abstract—Text-based password schemes have inherent security and usability problems, leading to the development of graphical password schemes. However, most of these alternate schemes are vulnerable to spyware attacks. We propose a new... more