MALWARE

Brand Owner (click to sort) Address Description
INDUSTRIAL LIGHT AND MALWARE Phobos Group, Inc. #424 10531 4S Commons Drive San Diego CA 92127 MALWARE;Software as a service (SAAS) services featuring computer and network security software, specifically, software for simulating computer, network, and premises security threats, data breaches, and other network and computer attacks, for the purpose of assessing security maturity and incident readiness; Software as a service (SAAS) services featuring computer and network security software, specifically, software for providing threat and vulnerability analysis, security posture and risk analysis and assessment, attack and espionage simulation, social engineering and security readiness training, security maturity and incident readiness training, risk triage and response training, perimeter enumeration and discovery services, data breach analysis and forensic incident response and remediation services, and scanning and penetration testing of computers and networks to assess information security vulnerability;
MALWARE HUNTER Dexter Bowling, Jr. 1379 Hawthorn Dr. Hanover MD 21076 MALWARE;Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer virus protection services; Maintenance of computer software relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks;
MALWARE SNAPSHOT Easy Solutions, Inc. 2 Alhambra Plaza, Suite PH-1-B Coral Gables FL 33134 MALWARE;Providing a website featuring on-line non-downloadable software that enables users to obtain malware injection attack visibility by taking a screenshot of a malware-injected web page, enhancing attack detection accuracy and assisting in forensic investigations;
MALWEAR Miguel, Harvey, L 90-58-187th Street 90-58-187th Street Hollis NY 11423 MALWARE; MAL WEAR;(Based on Use in Commerce) Short-sleeve shirts; Short-sleeved or long-sleeved t-shirts; T-shirts; Tee shirts; Tee-shirts(Based on Intent to Use) Hats; Hooded pullovers; Hooded sweatshirts; Hoodies; Hoods; Pants; Shirts; Shorts; Track jackets; Track suits; Windbreakers; Athletic shirts; Athletic shorts; Baseball caps and hats; Belts; Boxer shorts; Boxing shorts; Button down shirts; Camouflage pants; Camouflage shirts; Capri pants; Cargo pants; Collared shirts; Cycling shorts; Denim pants; Fashion hats; Fleece shorts; Golf shirts; Graphic T-shirts; Gym pants; Headbands for clothing; Hooded sweat shirts; Jerseys; Jogging pants; Leather pants; Long-sleeved shirts; Polo shirts; Rain hats; Sport shirts; Sports pants; Sports shirts; Sweat pants; Sweat shirts; Sweat shorts; Track pants; Walking shorts; Wearable garments and clothing, namely, shirts; Wind pants; Wind shirts;
THEATRICAL MALWARE Phobos Group, Inc. #424 10531 4S Commons Drive San Diego CA 92127 MALWARE;Software as a service (SAAS) services featuring computer and network security software, specifically, software for simulating computer, network, and premises security threats, data breaches, and other network and computer attacks, for the purpose of assessing security maturity and incident readiness; Software as a service (SAAS) services featuring computer and network security software, specifically, software for providing threat and vulnerability analysis, security posture and risk analysis and assessment, attack and espionage simulation, social engineering and security readiness training, security maturity and incident readiness training, risk triage and response training, perimeter enumeration and discovery services, data breach analysis and forensic incident response and remediation services, and scanning and penetration testing of computers and networks to assess information security vulnerability;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A malware scanner (8) operates to scan compressed computer files (16) by compressing the malware signatures (17) using the same compression algorithm as used for the compressed computer file and then comparing the compressed malware signatures (18) with the compressed computer file directly.