Click here to download all references as Bib-File.•
2009-05-22
⋅
Trend Micro
⋅
Pushdo / Cutwail Botnet Pushdo |
2009-05-07
⋅
Symantec
⋅
W32.Qakbot QakBot |
2009-04-01
⋅
Sophos Labs
⋅
Conficker.C A Technical Analysis |
2009-03-29
⋅
Wikipedia
⋅
GhostNet Gh0stnet GhostNet |
2009-03-28
⋅
Infinitum Labs
⋅
Tracking GhostNet: Investigating a Cyber Espionage Network Ghost RAT GhostNet |
2009-03-17
⋅
Marshal8e6
⋅
Gheg spambot Tofsee |
2009-03-08
⋅
SRI International
⋅
Conficker C Analysis Conficker |
2009-03-04
⋅
FireEye
⋅
‘Bancos’ - A Brazilian Crook bancos |
2009-03-01
⋅
The snooping dragon:social-malware surveillanceof the Tibetan movement GhostNet |
2009-01-01
⋅
Symantec
⋅
Zeus: King of the Bots Zeus |
2009-01-01
⋅
Kaspersky Labs
⋅
Kaspersky Lab analyses new version of Kido (Conficker) Conficker |
2009-01-01
⋅
Sunbelt Malware Research Labs
⋅
Rootkit Installation and Obfuscation in Rustock Rustock |
2008-11-30
⋅
ThreatExpert
⋅
Agent.btz - A Threat That Hit Pentagon Agent.BTZ |
2008-11-26
⋅
FireEye
⋅
Technical details of Srizbi's domain generation algorithm Szribi |
2008-11-24
⋅
NoVirusThanks Blog
⋅
I-Worm/Nuwar.W + Rustock.E Variant – Analysis Rustock |
2008-10-15
⋅
Secureworks
⋅
The Return of Warezov Warezov |
2008-06-10
⋅
ZDNet
⋅
Who's behind the GPcode ransomware? |
2008-06-08
⋅
⋅
Потомок «нецензурного» трояна или как воруют пароли на FTP Obscene |
2008-05-18
⋅
ThreatExpert
⋅
Rustock.C – Unpacking a Nested Doll Rustock |
2008-01-07
⋅
Royal Air Force
⋅
4th Party Collection: Taking Advantage of Non-Partner Computer Network Exploitation Activity |