810 resultados para Malware attacks


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The objectives of the present study were to verify if the males of the wasp Mischocyttarus cerberus participate in defense of the nest as they react to attack by ants, and to observe if they use chemical defense. First, wasps were stimulated with an empty pair of tweezers and a second stimulation was done with a pair of tweezers containing an ant, Camponotus crassus. The behaviors of the wasps were recorded and analyzed. The males can participate in defense of the nest, presenting some aggressive behaviors, even so, most of the time they ignore the stimulation, hide behind the nest and stay immobile.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Malware has become a major threat in the last years due to the ease of spread through the Internet. Malware detection has become difficult with the use of compression, polymorphic methods and techniques to detect and disable security software. Those and other obfuscation techniques pose a problem for detection and classification schemes that analyze malware behavior. In this paper we propose a distributed architecture to improve malware collection using different honeypot technologies to increase the variety of malware collected. We also present a daemon tool developed to grab malware distributed through spam and a pre-classification technique that uses antivirus technology to separate malware in generic classes. © 2009 SPIE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Conflicts between humans and big cats have been known for centuries throughout the world, but have intensified in recent decades. Recently, attacks by Panthera onca on humans in Brazil have been brought to the forefront through exposure in the press and because of the severity of the attacks. We report 3 cases of patients attacked by jaguars in provoked and predatory situations. Two patients survived the attacks and one died. Attack mechanisms and lesions in victims are discussed. The attacks demonstrate a real risk of accidents from jaguars in certain regions, such as the Pantanal and the Amazon. © 2011 Wilderness Medical Society.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless networks are widely deployed and have many uses, for example in critical embedded systems. The applications of this kind of network meets the common needs of most embedded systems and addressing the particularities of each scenario, such as limitations of computing resources and energy supply. Problems such as denial of service attacks are common place and cause great inconvenience. Thus, this study presents simulations of denial of service attacks on 802.11 wireless networks using the network simulator OMNeT++. Furthermore, we present an approach to mitigate such attack, obtaining significant results for improving wireless networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is with great astonishment and concern that I read the letter to the editor by Barreiros et al1 in which the authors report an attack by a blue shark on a spear fisherman in the Azores. Whereas the first part of the article accurately details the circumstances of the accident, Barreiros et al, in the second part, devise a far-fetched and illegitimate connection with shark diving, in particular with shark feeding.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Several pharmacological targets have been proposed as modulators of panic-like reactions. However, interest should be given to other potential therapeutic neurochemical agents. Recent attention has been given to the potential anxiolytic properties of cannabidiol, because of its complex actions on the endocannabinoid system together with its effects on other neurotransmitter systems. The aim of this study was to investigate the effects of cannabidiol on innate fear-related behaviors evoked by a prey vs predator paradigm. Male Swiss mice were submitted to habituation in an arena containing a burrow and subsequently pre-treated with intraperitoneal administrations of vehicle or cannabidiol. A constrictor snake was placed inside the arena, and defensive and non-defensive behaviors were recorded. Cannabidiol caused a clear anti-aversive effect, decreasing explosive escape and defensive immobility behaviors outside and inside the burrow. These results show that cannabidiol modulates defensive behaviors evoked by the presence of threatening stimuli, even in a potentially safe environment following a fear response, suggesting a panicolytic effect. Neuropsychopharmacology (2012) 37, 412-421; doi:10.1038/npp.2011.188; published online 14 September 2011

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objectives: To observe postpartum migraine recurrence among migraine sufferers before pregnancy, its classifications and associated factors and to compare women, who were exclusively breastfeeding, with those that used other forms of infant feeding. Methods: Out of 686 consecutively assisted women, at the first postnatal week, 266 were identified as migraine sufferers before pregnancy. Among those, one in five that were exclusively breastfeeding (53) and all the ones consecutively using others forms of infant feeding (40) were interviewed at the first and forth postpartum weeks. Results: After multivariable analysis, exclusive breastfeeding, no breastfeeding problems, and low income were associated with decrease in migraine recurrence at the first postpartum week. At the fourth week, exclusive breastfeeding continued to be a protective factor. Conclusions: A decrease in postpartum migraine recurrence seems to be another advantage of exclusive breastfeeding.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective: To review the clinical characteristics of patients with neuromyelitis optica (NMO) and to compare their visual outcome with those of patients with optic neuritis (ON) and multiple sclerosis (MS). Methods: Thirty-three patients with NMO underwent neuro-ophthalmic evaluation, including automated perimetry along with 30 patients with MS. Visual function in both groups was compared overall and specifically for eyes after a single episode of ON. Results: Visual function and average visual field (VF) mean deviation were significantly worse in eyes of patients with NMO. After a single episode of ON, the VF was normal in only 2 of 36 eyes of patients with NMO compared to 17 of 35 eyes with MS (P < 0.001). The statistical analysis indicated that after a single episode of ON, the odds ratio for having NMO was 6.0 (confidence interval [CI]: 1.6-21.9) when VF mean deviation was worse than -20.0 dB while the odds ratio for having MS was 16.0 (CI: 3.6-68.7) when better than -3.0 dB. Conclusion: Visual outcome was significantly worse in NMO than in MS. After a single episode of ON, suspicion of NMO should be raised in the presence of severe residual VF deficit with automated perimetry and lowered in the case of complete VF recovery.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

[EN]Spoofing identities using photographs is one of the most common techniques to attack 2-D face recognition systems. There seems to exist no comparative stud- ies of di erent techniques using the same protocols and data. The motivation behind this competition is to com- pare the performance of di erent state-of-the-art algo- rithms on the same database using a unique evaluation method. Six di erent teams from universities around the world have participated in the contest.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

L’avanzare delle tecnologie ICT e l’abbattimento dei costi di produzione hanno portato ad un aumento notevole della criminalità informatica. Tuttavia il cambiamento non è stato solamente quantitativo, infatti si può assistere ad un paradigm-shift degli attacchi informatici da completamente opportunistici, ovvero senza un target specifico, ad attacchi mirati aventi come obiettivo una particolare persona, impresa o nazione. Lo scopo della mia tesi è quello di analizzare modelli e tassonomie sia di attacco che di difesa, per poi valutare una effettiva strategia di difesa contro gli attacchi mirati. Il lavoro è stato svolto in un contesto aziendale come parte di un tirocinio. Come incipit, ho effettuato un attacco mirato contro l’azienda in questione per valutare la validità dei sistemi di difesa. L’attacco ha avuto successo, dimostrando l’inefficacia di moderni sistemi di difesa. Analizzando i motivi del fallimento nel rilevare l’attacco, sono giunto a formulare una strategia di difesa contro attacchi mirati sotto forma di servizio piuttosto che di prodotto. La mia proposta è un framework concettuale, chiamato WASTE (Warning Automatic System for Targeted Events) il cui scopo è fornire warnings ad un team di analisti a partire da eventi non sospetti, ed un business process che ho nominato HAZARD (Hacking Approach for Zealot Attack Response and Detection), che modella il servizio completo di difesa contro i targeted attack. Infine ho applicato il processo all’interno dell’azienda per mitigare minacce ed attacchi informatici.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis collects the outcomes of a Ph.D. course in Telecommunications Engineering and it is focused on the study and design of possible techniques able to counteract interference signal in Global Navigation Satellite System (GNSS) systems. The subject is the jamming threat in navigation systems, that has become a very increasingly important topic in recent years, due to the wide diffusion of GNSS-based civil applications. Detection and mitigation techniques are developed in order to fight out jamming signals, tested in different scenarios and including sophisticated signals. The thesis is organized in two main parts, which deal with management of GNSS intentional counterfeit signals. The first part deals with the interference management, focusing on the intentional interfering signal. In particular, a technique for the detection and localization of the interfering signal level in the GNSS bands in frequency domain has been proposed. In addition, an effective mitigation technique which exploits the periodic characteristics of the common jamming signals reducing interfering effects at the receiver side has been introduced. Moreover, this technique has been also tested in a different and more complicated scenario resulting still effective in mitigation and cancellation of the interfering signal, without high complexity. The second part still deals with the problem of interference management, but regarding with more sophisticated signal. The attention is focused on the detection of spoofing signal, which is the most complex among the jamming signal types. Due to this highly difficulty in detect and mitigate this kind of signal, spoofing threat is considered the most dangerous. In this work, a possible techniques able to detect this sophisticated signal has been proposed, observing and exploiting jointly the outputs of several operational block measurements of the GNSS receiver operating chain.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Il Cryptolocker è un malware diffuso su scala globale appartenente alla categoria ransomware. La mia analisi consiste nel ripercorrere le origini dei software maligni alla ricerca di rappresentanti del genere con caratteristiche simili al virus che senza tregua persevera a partire dal 2013: il Cryptolocker. Per imparare di più sul comportamento di questa minaccia vengono esposte delle analisi del malware, quella statica e quella dinamica, eseguite sul Cryptolocker (2013), CryptoWall (2014) e TeslaCrypt (2015). In breve viene descritta la parte operativa per la concezione e la configurazione di un laboratorio virtuale per la successiva raccolta di tracce lasciate dal malware sul sistema e in rete. In seguito all’analisi pratica e alla concentrazione sui punti deboli di queste minacce, oltre che sugli aspetti tecnici alla base del funzionamento dei crypto, vengono presi in considerazione gli aspetti sociali e psicologici che caratterizzano un complesso background da cui il virus prolifica. Vengono confrontate fonti autorevoli e testimonianze per chiarire i dubbi rimasti dopo i test. Saranno questi ultimi a confermare la veridicità dei dati emersi dai miei esperimenti, ma anche a formare un quadro più completo sottolineando quanto la morfologia del malware sia in simbiosi con la tipologia di utente che va a colpire. Capito il funzionamento generale del crypto sono proprio le sue funzionalità e le sue particolarità a permettermi di stilare, anche con l’aiuto di fonti esterne al mio operato, una lista esauriente di mezzi e comportamenti difensivi per contrastarlo ed attenuare il rischio d’infezione. Vengono citati anche le possibili procedure di recupero per i dati compromessi, per i casi “fortunati”, in quanto il recupero non è sempre materialmente possibile. La mia relazione si conclude con una considerazione da parte mia inaspettata: il potenziale dei crypto, in tutte le loro forme, risiede per la maggior parte nel social engineering, senza il quale (se non per certe categorie del ransomware) l’infezione avrebbe percentuali di fallimento decisamente più elevate.