-
281“…Ransomware is one type of malware that involves restricting access to files by encrypting files stored on the victim’s system and demanding money in return for file recovery. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
282“…Recent studies have illustrated some of the security implications of biotechnology, with outcomes of misuse ranging from compromised computers using malware stored in synthesised DNA, infringement of intellectual property on biological matter, synthesis of new threatening viruses, ‘genetic genocide,’ and the exploitation of food markets with genetically modified crops. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
283“…While many apps have raised some concerns by spreading misinformation or even malware, the literature does not yet provide a clear landscape of the different apps that were developed. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
284“…We also found that the most prominent and significant methods of cyberattacks that occurred during the pandemic were related to phishing, ransomware, distributed denial-of-service attacks, and malware. CONCLUSIONS: This scoping review identified the most impactful methods of cyberattacks that targeted the health sector during the COVID-19 pandemic, as well as the challenges in cybersecurity, solutions, and areas in need of improvement. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
285“…Consequently, taking advantage of highly unprecedented circumstances created by the Covid-19 event, cybercriminals launched massive phishing, malware, identity theft, and ransomware attacks. Therefore, if we wish to save people from these frauds in times when millions have already been tipped into poverty and the rest are trying hard to sustain, it is imperative to curb these attacks and attackers. …”
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
286por King, Zoe M., Henshel, Diane S., Flora, Liberty, Cains, Mariana G., Hoffman, Blaine, Sample, Char“…Most maliciousness cyber research to date has focused on detecting malicious software but fails to analyze an individual’s intent to do harm to others by deploying malware or performing malicious attacks. Recent efforts to identify malicious human behavior as it relates to cybersecurity, include analyzing motives driving insider threats as well as user profiling analyses. …”
Publicado 2018
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
287“…Numerous intrusion attacks including bot-attack and malware have confined major classical databases towards e-Healthcare. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
288por Alawida, Moatsum, Omolara, Abiodun Esther, Abiodun, Oludare Isaac, Al-Rajab, Murad“…Mobile apps followed with 8%, Phishing was 7%, Malware 7%, Browsing apps with 6%, DDoS has 6%, Website apps with 6%, and MSMM with 6%. …”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
289por Gomez Ramirez, Andres“…A set of samples is collected from regular production grid jobs from the grid infrastructure of “A Large Ion Collider Experiment” (ALICE) and malicious Linux binaries from a malware research website. The features extracted from these samples are utilized for the training and validation of the machine learning (ML) models. …”
Publicado 2019
Enlace del recurso
-
290“…It refers to the network of computers, laptops, mobile devices or tablets which is remotely controlled by the cybercriminals to initiate various distributed coordinated attacks including spam emails, ad-click fraud, Bitcoin mining, Distributed Denial of Service (DDoS), disseminating other malwares and much more. Likewise traditional PC based botnet, Mobile botnets have the same operational impact except the target audience is particular to smartphone users. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto