Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Researchers: Bredolab still lurking, though severely injured + (October 28, 2010)
- Hiloti: the (bot)master of disguise + (November 8, 2010)
- New IE Zero-Day used in targeted attacks + (November 8, 2010)
- Bleeding Life Exploit Pack + (November 23, 2010)
- VinSelf - A new backdoor in town + (November 23, 2010)
- Leouncia - Yet another backdoor + (December 14, 2010)
- Leouncia - Yet another backdoor - Part 2 + (December 14, 2010)
- Encyclopedia entry: Win32/Carberp + (2011)
- HARMUR: storing and analyzing historic data on malicious domains + (2011)
- BareBox: efficient malware analysis on bare-metal + (2011)
- Top 50 bad hosts & networks 2011 Q4 + (2011)
- Shedding light on the NeoSploit Exploit Kit + (January 4, 2011)
- Spambot evolution 2011 + (February 15, 2011)
- Tatanga: a new banking trojan with MitB functions + (February 25, 2011)
- Skunkx DDoS bot analysis + (March 14, 2011)
- Taking down botnets: Microsoft and the Rustock botnet + (March 17, 2011)
- Harnig botnet: a retreating army + (March 22, 2011)
- The evolution of TDL: conquering x64 + (March 30, 2011)
- The underground economy of spam: a botmaster's perspective of coordinating large-scale spam campaigns + (March 30, 2011)
- W32.Stuxnet dossier + (April 2011)
- Botnet operation disabled + (April 14, 2011)
- The ‘advertising’ botnet + (April 20, 2011)
- Torpig - Back to the future or how the most sophisticated trojan in 2008 reinvents itself + (June 16, 2011)
- TDL4 - Top Bot + (June 27, 2011)
- The good , the bad and the unknown online scanners + (July 2, 2011)
- HTran and the Advanced Persistent Threat + (August 3, 2011)
- Analysis of ngrBot + (August 4, 2011)
- Chapro.A source code + (August 6, 2011)
- Harnig is back + (August 9, 2011)
- GingerMaster Android Malware Utilizing A Root Exploit + (August 18, 2011)
- The Miner botnet: Bitcoin mining goes peer-to-peer + (August 19, 2011)
- Xpaj Botnet intercepts up to 87 million searches per year + (August 26, 2011)
- Morto worm sets a (DNS) record + (August 31, 2011)
- Analysis: Malware Win32/Rimecud.B + (September 5, 2011)
- Microsoft neutralizes Kelihos botnet, names defendant in case + (September 27, 2011)
- Hodprot: hot to bot + (October 5, 2011)
- VOlk-botnet takes over Latin America + (October 12, 2011)
- The mystery of Duqu: part one + (October 20, 2011)
- Get gamed and rue the day... + (23:40:00, 25 October 2011)
- Apple took 3 years to fix Finfisher trojan hole + (November 2011)
- An analysis of underground forums + (November 2, 2011)
- Esthost taken down - Biggest cybercriminal takedown in history + (November 9, 2011)
- The mystery of Duqu: part five + (November 15, 2011)
- International cyber ring that infected millions of computers dismantled + (November 19, 2011)
- Cracking into the new P2P variant of Zeusbot/Spyeye + (November 28, 2011)
- The mystery of Duqu: part six (the command and control servers) + (November 30, 2011)
- Advancing the fight against botnets with consumer notifications + (December 5, 2011)
- Evolution of Win32Carberp: going deeper + (December 5, 2011)
- Proactive detection of network security incidents + (December 7, 2011)
- Traffic direction systems as malware distribution tools + (December 12, 2011)
- Disorderly conduct: localized malware impersonates the police + (December 19, 2011)