Click here to download all references as Bib-File.
2009-03-28 ⋅ Infinitum Labs ⋅ Tracking GhostNet: Investigating a Cyber Espionage Network Ghost RAT GhostNet |
2009-03-17 ⋅ Marshal8e6 ⋅ Gheg spambot Tofsee |
2009-03-08 ⋅ SRI International ⋅ Conficker C Analysis Conficker |
2009-03-04 ⋅ FireEye ⋅ ‘Bancos’ - A Brazilian Crook bancos |
2009-03 ⋅ The snooping dragon:social-malware surveillanceof the Tibetan movement GhostNet |
2009 ⋅ Symantec ⋅ Zeus: King of the Bots Zeus |
2009 ⋅ Sunbelt Malware Research Labs ⋅ Rootkit Installation and Obfuscation in Rustock Rustock |
2009 ⋅ Kaspersky Labs ⋅ Kaspersky Lab analyses new version of Kido (Conficker) Conficker |
2008-11-30 ⋅ ThreatExpert ⋅ Agent.btz - A Threat That Hit Pentagon Agent.BTZ |
2008-11-26 ⋅ FireEye ⋅ Technical details of Srizbi's domain generation algorithm Szribi |
2008-11-24 ⋅ NoVirusThanks Blog ⋅ I-Worm/Nuwar.W + Rustock.E Variant – Analysis Rustock |
2008-06-10 ⋅ ZDNet ⋅ Who's behind the GPcode ransomware? |
2008-06-08 ⋅ Потомок «нецензурного» трояна или как воруют пароли на FTP Obscene |
2008-05-18 ⋅ ThreatExpert ⋅ Rustock.C – Unpacking a Nested Doll Rustock |
2008-01-07 ⋅ Royal Air Force ⋅ 4th Party Collection: Taking Advantage of Non-Partner Computer Network Exploitation Activity |
2008 ⋅ Dr.Web ⋅ Win32.Ntldrbot (aka Rustock.C) no longer a myth, no longer a threat Rustock |
2007-12-16 ⋅ Secureworks ⋅ Pushdo - Analysis of a Modern Malware Distribution System Pushdo |
2007-12-04 ⋅ Secureworks ⋅ Inside the "Ron Paul" Spam Botnet Szribi |
2007-11-01 ⋅ Virus Bulletin ⋅ Spam from the kernel Szribi |
2007-10-31 ⋅ Symantec ⋅ Trojan.Bayrob Strikes Again! SuppoBox |