Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-02-16Check Point ResearchCheck Point Research
@online{research:20200216:hamas:c7c85d6, author = {Check Point Research}, title = {{Hamas Android Malware On IDF Soldiers-This is How it Happened}}, date = {2020-02-16}, organization = {Check Point Research}, url = {https://research.checkpoint.com/2020/hamas-android-malware-on-idf-soldiers-this-is-how-it-happened/}, language = {English}, urldate = {2020-02-25} } Hamas Android Malware On IDF Soldiers-This is How it Happened
Unidentified APK 004
2017-02-16Kaspersky LabsIDF C4I, Ido Naor
@online{c4i:20170216:breaking:cc7bead, author = {IDF C4I and Ido Naor}, title = {{Breaking The Weakest Link Of The Strongest Chain}}, date = {2017-02-16}, organization = {Kaspersky Labs}, url = {https://securelist.com/blog/incidents/77562/breaking-the-weakest-link-of-the-strongest-chain/}, language = {English}, urldate = {2019-12-20} } Breaking The Weakest Link Of The Strongest Chain
Viper RAT AridViper
2017-02-16Kaspersky LabsIDF C4I, Ido Naor
@online{c4i:20170216:breaking:b65439a, author = {IDF C4I and Ido Naor}, title = {{Breaking The Weakest Link Of The Strongest Chain}}, date = {2017-02-16}, organization = {Kaspersky Labs}, url = {https://securelist.com/breaking-the-weakest-link-of-the-strongest-chain/77562/}, language = {English}, urldate = {2019-12-20} } Breaking The Weakest Link Of The Strongest Chain
GlanceLove
2017-02-05IDFIDF
@online{idf:20170205:hamas:b96235f, author = {IDF}, title = {{Hamas Uses Fake Facebook Profiles to Target Israeli Soldiers}}, date = {2017-02-05}, organization = {IDF}, url = {https://www.idf.il/en/minisites/hamas/hamas-uses-fake-facebook-profiles-to-target-israeli-soldiers/}, language = {English}, urldate = {2019-12-31} } Hamas Uses Fake Facebook Profiles to Target Israeli Soldiers
GlanceLove