Click here to download all references as Bib-File.
2011-08-27 ⋅ Microsoft ⋅ Morto.A Morto |
2011-08-24 ⋅ Kaspersky Labs ⋅ Ice IX, the first crimeware based on the leaked ZeuS sources Ice IX |
2011-08-09 ⋅ FireEye ⋅ Harnig is Back Harnig |
2011-08-04 ⋅ Stop Malvertising Rootkits ⋅ Analysis of ngrBot NgrBot |
2011-08-03 ⋅ Secureworks ⋅ HTran and the Advanced Persistent Threat HTran |
2011-07-28 ⋅ KrebsOnSecurity ⋅ Trojan Tricks Victims Into Transferring Funds UrlZone |
2011-07-27 ⋅ Contagiodump Blog ⋅ Jul 25 Mac Olyx backdoor + Gh0st Backdoor in RAR archive related to July 2009 Ürümqi riots in China (Samples included) Olyx Gh0stnet |
2011-07-26 ⋅ Computerworld ⋅ SpyEye Trojan defeating online banking defenses SpyEye |
2011-07-14 ⋅ ESET Research ⋅ Cycbot: Ready to Ride CycBot |
2011-07-10 ⋅ Facts and myths about antivirus evasion with Metasploit Meterpreter |
2011-07-08 ⋅ Dr.Web ⋅ Trojan.Mayachok.2: анализ первого известного VBR-буткита Rovnix |
2011-07-07 ⋅ Contagio Dump ⋅ Rootkit TDL-4 (TDSS, Alureon.DX, Olmarik, TDL) 32-bit and 64-bit Sample + Analysis links - Update July 7 Alureon |
2011-07-06 ⋅ Kaspersky Labs ⋅ Cybercriminals switch from MBR to NTFS Rovnix |
2011-07-04 ⋅ Kernelmode.info Forums ⋅ WinNT/Rovnix (alias Mayachok, Cidox, BkLoader) Rovnix |
2011-07 ⋅ Symantec ⋅ Sality: Story of a Peerto-Peer Viral Network Sality |
2011-06-29 ⋅ Symantec ⋅ Inside a Back Door Attack Ghost RAT Dust Storm |
2011-06-29 ⋅ Symantec ⋅ Inside a Back Door Attack Dust Storm |
2011-06-22 ⋅ Doctor Web ⋅ Criminals gain control over Mac with BackDoor.Olyx Olyx |
2011-06-03 ⋅ CERT Polska / NASK ⋅ Botnet Hamweq - analiza Hamweq |
2011-06-03 ⋅ Sourceforge ⋅ Ani-Shell Ani-Shell |