Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2012-09-19KrebsOnSecurityBrian Krebs
Blog Posts on Nitol
Nitol
2012-08-16SymantecSymantec Security Response
The Shamoon Attacks
DistTrack OilRig
2012-08-16SymantecSymantec Security Response
The Shamoon Attacks
OilRig
2012-07-24The Mac Security BlogLysa Myers
New Apple Mac Trojan Called OSX/Crisis Discovered
Crisis RCS
2012-07-18SymantecSecurity Response
The Madi Attacks: Series of Social Engineering Campaigns
Madi
2012-07-17SymantecSymantec Security Response
The Madi Attacks: Series of Social Engineering Campaigns
Madi
2012-05-31SymantecSecurity Response
Flamer: A Recipe for Bluetoothache
Flame
2012-02-15Security IntelligenceAmit Klein
Merchant of Fraud Returns: Shylock Polymorphic Financial Malware Infections on the Rise
Shylock
2011-12-11Open Security ResearchMichael G. Spohn.
Intro. To Reversing - W32Pinkslipbot
QakBot
2011-07-28KrebsOnSecurityBrian Krebs
Trojan Tricks Victims Into Transferring Funds
UrlZone
2011-05-19MicrosoftMicrosoft Security Intelligence
Win32/Expiro
Expiro
2011-03-28KrebsOnSecurityBrian Krebs
Microsoft Hunting Rustock Controllers
Rustock
2011-03-08Microsoft Security IntelligenceMicrosoft
Worm:Win32/Yimfoca.A
Buzus
2010-09-17KrebsOnSecurityBrian Krebs
SpyEye Botnet’s Bogus Billing Feature
SpyEye
2010-04-01KrebsOnSecurityBrian Krebs
SpyEye vs. ZeuS Rivalry
SpyEye
1900-01-01Security AffairsPierluigi Paganini
Hackers Broke Into the Celeb London Bridge Plastic Surgery Clinic
TheDarkOverlord