Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- HTran and the Advanced Persistent Threat + (August 3, 2011)
- Analysis of ngrBot + (August 4, 2011)
- Chapro.A source code + (August 6, 2011)
- Harnig is back + (August 9, 2011)
- GingerMaster Android Malware Utilizing A Root Exploit + (August 18, 2011)
- The Miner botnet: Bitcoin mining goes peer-to-peer + (August 19, 2011)
- Xpaj Botnet intercepts up to 87 million searches per year + (August 26, 2011)
- Morto worm sets a (DNS) record + (August 31, 2011)
- Analysis: Malware Win32/Rimecud.B + (September 5, 2011)
- Microsoft neutralizes Kelihos botnet, names defendant in case + (September 27, 2011)
- Hodprot: hot to bot + (October 5, 2011)
- VOlk-botnet takes over Latin America + (October 12, 2011)
- The mystery of Duqu: part one + (October 20, 2011)
- Get gamed and rue the day... + (23:40:00, 25 October 2011)
- Apple took 3 years to fix Finfisher trojan hole + (November 2011)
- An analysis of underground forums + (November 2, 2011)
- Esthost taken down - Biggest cybercriminal takedown in history + (November 9, 2011)
- The mystery of Duqu: part five + (November 15, 2011)
- International cyber ring that infected millions of computers dismantled + (November 19, 2011)
- Cracking into the new P2P variant of Zeusbot/Spyeye + (November 28, 2011)
- The mystery of Duqu: part six (the command and control servers) + (November 30, 2011)
- Advancing the fight against botnets with consumer notifications + (December 5, 2011)
- Evolution of Win32Carberp: going deeper + (December 5, 2011)
- Proactive detection of network security incidents + (December 7, 2011)
- Traffic direction systems as malware distribution tools + (December 12, 2011)
- Disorderly conduct: localized malware impersonates the police + (December 19, 2011)
- Malware 2 - from infection to persistence + (January 2012)
- DNS: a botnet dialect + (2012)
- SKyWIper: A complex malware for targeted attacks + (2012)
- Dorkbot: conquistando Latinoamérica + (2012)
- Malware hunting with the Sysinternals tools + (2012)
- Unveiling the network criminal infrastructure of TDSS/TDL4 - DGAv14: a case study on a new TDSS/TDL4 variant + (2012)
- Cracking the encrypted C&C protocol of the ZeroAccess botnet + (2012)
- Industrial espionage and targeted attacks: understanding the characteristics of an escalating threat + (2012)
- Learning stateful models for network honeypots + (2012)
- ZeuS – P2P+DGA variant – mapping out and understanding the threat + (January 4, 2012)
- Ramnit goes social + (January 5, 2012)
- A peek inside the PickPocket botnet + (January 6, 2012)
- Acquisition and analysis of volatile memory from Android devices + (February 2012)
- Reveton.A + (February 1, 2012)
- TDL4 reloaded: Purple Haze all in my brain + (February 3, 2012)
- Android.Bmaster: A million-dollar mobile botnet + (February 9, 2012)
- The where and why of Hlux + (February 15, 2012)
- Cutwail drives spike in malicious HTML attachment spam + (February 16, 2012)
- Shylock financial malware back 'with a vengeance' + (February 16, 2012)
- Long life to Kelihos! + (February 17, 2012)
- Pramro and Sality - two PEs in a pod + (February 21, 2012)
- Rovnix Reloaded: new step of evolution + (February 22, 2012)
- McAfee Labs threat advisory : W32.Pinkslipbot + (February 22, 2012)
- ZeuSbot/Spyeye P2P updated, fortifying the botnet + (February 23, 2012)
- Playing cops & robbers with banks & browsers + (February 27, 2012)