Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2011-12-08SymantecVikram Thakur
The Sykipot Attacks
sykipot
2011-10-31Trend MicroNart Villeneuve
The Significance of the "Nitro" Attacks
Nitro
2011-10-26IntegoPeter James
Tsunami Backdoor Can Be Used for Denial of Service Attacks
Tsunami
2011-10-08F-SecureMikko
Possible Governmental Backdoor Found ("Case R2D2")
Bundestrojaner
2011-10-06Kaspersky LabsDenis Maslennikov
ZeuS-in-the-Mobile – Facts and Theories
ZitMo
2011-08-27MicrosoftMatt McCormack
Morto.A
Morto
2011-08-09FireEyeAtif Mushtaq
Harnig is Back
Harnig
2011-07-27Contagiodump BlogMila Parkour
Jul 25 Mac Olyx backdoor + Gh0st Backdoor in RAR archive related to July 2009 Ürümqi riots in China (Samples included)
Olyx Gh0stnet
2011-07-10Michael Schierl
Facts and myths about antivirus evasion with Metasploit
Meterpreter
2011-07-08Dr.WebDr. Web
Trojan.Mayachok.2: анализ первого известного VBR-буткита
Rovnix
2011-07-06Kaspersky LabsVyacheslav Zakorzhevsky
Cybercriminals switch from MBR to NTFS
Rovnix
2011-07-04Kernelmode.info Forumsrkhunter
WinNT/Rovnix (alias Mayachok, Cidox, BkLoader)
Rovnix
2011-06-29SymantecJohn McDonald
Inside a Back Door Attack
Ghost RAT Dust Storm
2011-06-29SymantecJohn McDonald
Inside a Back Door Attack
Dust Storm
2011-06-22Doctor WebDoctor Web
Criminals gain control over Mac with BackDoor.Olyx
Olyx
2011-03-02ESET ResearchDavid Harley
TDL4 and Glupteba: Piggyback PiggyBugs
Glupteba
2011-02-24Contagiodump BlogMila Parkour
ZeroAccess / Max++ / Smiscer Crimeware Rootkit sample for Step-by-Step Reverse Engineering by Giuseppe Bonfa - << (Update 2011 version available)
ZeroAccess
2011-02-10McAfeeMcAfee Foundstone Professional Services, McAfee Labs
Global Energy Cyberattacks: “Night Dragon”
Night Dragon
2011-01-20antivirnews
Beschreibung des Virus Backdoor.Win32. Buterat.afj
Buterat
2011-01-01The Brown Journal of World AffairsJason Healey
The Spectrum of National Responsibility for Cyberattacks