Difference between pages "Malware" and "Talk:SQLite database format"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(See Also)
 
(Created page with "Dead links, please re-add when link works again or location has changed: == External Links == * [http://www.cclgroupltd.com/blog/2012/05/04/the-forensic-implications-of-sqlit...")
 
Line 1: Line 1:
'''Malware''' is a short version of '''Malicious Software'''.
+
Dead links, please re-add when link works again or location has changed:
 
+
Malware is software used for data theft, device damage, harassment, etc. It is very similar to computer malware. It installs things such as trojans, worms, and botnets to the affected device. It is illegal to knowingly distribute malware.
+
 
+
== Virus ==
+
A computer program that can automatically copy itself and infect a computer.
+
 
+
== Worm ==
+
A self-replicating computer program that can automatically infect computers on a network.
+
 
+
== Trojan horse ==
+
A computer program which appears to perform a certain action, but actually performs many different forms of codes.
+
 
+
== Spyware ==
+
A computer program that can automatically intercept or take partial control over the user's interaction.
+
 
+
== Exploit Kit ==
+
A toolkit that automates the exploitation of client-side vulnerabilities, targeting browsers and programs that a website can invoke through the browser [http://blog.zeltser.com/post/1410922437/what-are-exploit-kits]. Often utilizing a drive-by-download.
+
 
+
=== Drive-by-download ===
+
Any download that happens without a person's knowledge [http://en.wikipedia.org/wiki/Drive-by_download].
+
 
+
== See Also ==
+
* [[Malware analysis]]
+
  
 
== External Links ==
 
== External Links ==
* [http://en.wikipedia.org/wiki/Malware Wikipedia entry on malware]
+
* [http://www.cclgroupltd.com/blog/2012/05/04/the-forensic-implications-of-sqlites-write-ahead-log/ The Forensic Implications of SQLite’s Write Ahead Log], by Alex Caithness, May 4, 2012
* [http://en.wikipedia.org/wiki/Drive-by_download Wikipedia drive-by-download]
+
* [http://www.viruslist.com/ Viruslist.com]
+
* [http://code.google.com/p/androguard/wiki/DatabaseAndroidMalwares Androguard]: A list of recognized Android malware
+
 
+
=== Exploit Kit ===
+
* [http://blog.zeltser.com/post/1410922437/what-are-exploit-kits What Are Exploit Kits?], by [[Lenny Zeltser]], October 26, 2010
+
* [http://nakedsecurity.sophos.com/2013/07/02/the-four-seasons-of-glazunov-digging-further-into-sibhost-and-flimkit/ The four seasons of Glazunov: digging further into Sibhost and Flimkit], by Fraser Howard, July 2, 2013
+
* [http://www.kahusecurity.com/2013/kore-exploit-kit/ Kore Exploit Kit], Kahu Security blog, July 18, 2013
+
 
+
[[Category:Malware]]
+

Latest revision as of 02:46, 28 October 2013

Dead links, please re-add when link works again or location has changed:

External Links