Android malware Payloads and Permission Use

Android malware Payloads and Permission Use

As Smart Phones are becoming the growing Future of the handheld devices, so does the threats that are associated with them. This is third article of a series where we some what try to cover a systematic characterization of existing Android malware, ranging from their...
Android malware ActivationTactics

Android malware ActivationTactics

As Smart Phones are becoming the growing Future of the handheld devices, so does the threats that are associated with them. This is second article of a series where we some what try to cover a systematic characterization of existing Android malware, ranging from their...
Android Malware Installation Tactics

Android Malware Installation Tactics

As Smart Phones are becoming the growing Future of the handheld devices, so does the threats that are associated with them. This article some what tries to cover a systematic characterization of existing Android malware, ranging from their installation, activation, to...
How Malware Spreads

How Malware Spreads

The article gives an overview of the techniques most commonly used in the malware spread. Some times it is also termed as infection vectors that are commonly used by malicious software to infect a victim’s system. Brief examples re-used to illustrate how these...
Essential Executive overview of Malware

Essential Executive overview of Malware

Malware Classification an Executive Overview The digital age of today demands executives to be aware of the growing concerns of Cyber Security; threats and business risks associated with it.This article is specially organized to provide the executive level  overview...