Click here to download all references as Bib-File.•
2011-01-01
⋅
The Brown Journal of World Affairs
⋅
The Spectrum of National Responsibility for Cyberattacks |
2011-01-01
⋅
Symantec
⋅
The Nitro Attacks: Stealing Secrets from the Chemical Industry Poison Ivy Nitro |
2011-01-01
⋅
Symantec
⋅
The Nitro Attacks Nitro |
2011-01-01
⋅
Virus Bulletin
⋅
A Survey of Contemporary Chinese DDoS Malware Rincux |
2011-01-01
⋅
Spiegel Online
⋅
SNOWGLOBE: From Discovery to Attribution Babar |
2010-12-27
⋅
media.ccc.de
⋅
Adventures in analyzing Stuxnet Stuxnet |
2010-12-20
⋅
Kaspersky Labs
⋅
End of the Line for the Bredolab Botnet? Bredolab |
2010-12-14
⋅
FireEye
⋅
Leouncia - Yet Another Backdoor - Part 2 Leouncia |
2010-12-14
⋅
FireEye
⋅
Leouncia - Yet Another Backdoor |
2010-11-20
⋅
InfoSec Institute
⋅
The Kernel-Mode Device Driver Stealth Rootkit ZeroAccess |
2010-11-16
⋅
ZEROACCESS MALWARE - PART 3: The Device Driver Process Injection Rootkit ZeroAccess |
2010-11-15
⋅
Infosec
⋅
Tracing the Crimeware Origins by Reversing Injected Code ZeroAccess |
2010-11-01
⋅
InfoSec Institute
⋅
ZEROACCESS MALWARE - PART 1: De-Obfuscating and Reversing the User-Mode Agent Dropper ZeroAccess |
2010-10-27
⋅
FireEye
⋅
Bredolab - It's not the size of the dog in the fight.. Bredolab |
2010-10-25
⋅
RSA
⋅
Businesses Beware: Qakbot Spreads like a Worm, Stings like a Trojan QakBot |
2010-09-17
⋅
KrebsOnSecurity
⋅
SpyEye Botnet’s Bogus Billing Feature SpyEye |
2010-09-07
⋅
S21sec
⋅
ZeuS: The missing link Zeus |
2010-09-01
⋅
Wikipedia
⋅
Stuxnet Equation Group |
2010-08-25
⋅
The New York Times
⋅
Military Computer Attack Confirmed Turla |
2010-08-05
⋅
Kaspersky Labs
⋅
TDSS Alureon |