Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Tim Wilson + (19:17:17, 5 August 2015)
- The underground economy of spam: a botmaster's perspective of coordinating large-scale spam campaigns + (19:25:13, 5 August 2015)
- A chat with NGR Bot + (19:26:31, 5 August 2015)
- A peek inside the Darkness (Optima) DDoS Bot + (19:27:57, 5 August 2015)
- Collateral damage: Microsoft hits security researchers along with Citadel + (19:29:09, 5 August 2015)
- Ransomware gets professional, targeting Switzerland, Germany and Austria + (19:29:09, 5 August 2015)
- A quick update on spambot Kelihos + (19:29:11, 5 August 2015)
- New Mahdi updates, new C2 server + (19:30:51, 5 August 2015)
- New virus SMSZombie.A discovered by TrustGo Security Labs + (19:30:55, 5 August 2015)
- Research Win32/Slenfbot + (19:30:56, 5 August 2015)
- The anatomy of a botnet + (19:30:57, 5 August 2015)
- Win32/Gataka banking Trojan - Detailed analysis + (19:30:58, 5 August 2015)
- Dorifel/Quervar: the support scammer’s secret weapon + (19:31:04, 5 August 2015)
- Saudi Aramco hit by computer virus + (19:31:07, 5 August 2015)
- Nepalese government websites compromised to serve Zegost RAT + (19:31:14, 5 August 2015)
- Joint strike force against Dorifel + (19:31:16, 5 August 2015)
- The “Hikit” rootkit: advanced and persistent attack techniques (part 2) + (19:31:18, 5 August 2015)
- Shamoon the wiper - copycats at work + (19:31:20, 5 August 2015)
- Dorifel virus gereed voor Nederlandse banking phishing + (19:31:22, 5 August 2015)
- The first trojan in history to steal Linux and Mac OS X passwords + (19:31:24, 5 August 2015)
- GingerMaster Android Malware Utilizing A Root Exploit + (19:31:25, 5 August 2015)
- What was that Wiper thing? + (19:31:26, 5 August 2015)
- Tales from Crisis, Chapter 3: The Italian rootkit job + (19:31:30, 5 August 2015)
- A study of the Ilomo / Clampi botnet + (19:31:31, 5 August 2015)
- An analysis of the cross-platform backdoor NetWeirdRC + (19:31:32, 5 August 2015)
- Newly detected Crisis virus infects Windows, Macs and virtual machines + (19:31:34, 5 August 2015)
- Shamoon the Wiper in details + (19:31:34, 5 August 2015)
- Crypto experts called on to crack cyberspy tool's encryption + (19:31:37, 5 August 2015)
- Tales from Crisis, Chapter 1: The dropper’s box of tricks + (19:31:38, 5 August 2015)
- Tales from Crisis, Chapter 2: Backdoor’s first steps + (19:31:42, 5 August 2015)
- Spam botnets: The fall of Grum and the rise of Festi + (19:31:46, 5 August 2015)
- Tales from Crisis, Chapter 4: a ghost in the network + (19:31:47, 5 August 2015)
- A study on botnet detection techniques + (19:35:27, 5 August 2015)
- Acquisition and analysis of volatile memory from Android devices + (19:37:44, 5 August 2015)
- Actually, my name is Duqu - Stuxnet is my middle name + (19:39:06, 5 August 2015)
- Advancing the fight against botnets with consumer notifications + (19:42:07, 5 August 2015)
- Aldi Bot - bka.de DDoS + (19:42:16, 5 August 2015)
- Pramro and Sality - two PEs in a pod + (19:42:27, 5 August 2015)
- The Elderwood project (infographic) + (19:42:41, 5 August 2015)
- New IE Zero-Day used in targeted attacks + (19:42:48, 5 August 2015)
- W32.Duqu, the precursor to the next Stuxnet + (19:42:48, 5 August 2015)
- An analysis of Dorkbot’s infection vectors (part 2) + (19:43:00, 5 August 2015)
- MSRT march: three hioles in one + (19:43:07, 5 August 2015)
- Cross-platform Frutas RAT builder and back door + (19:43:07, 5 August 2015)
- Malware targeting Windows 8 uses Google Docs + (19:43:31, 5 August 2015)
- Guys behind Gauss and Flame are the same + (19:43:36, 5 August 2015)
- Xpaj Botnet intercepts up to 87 million searches per year + (19:43:52, 5 August 2015)
- The Sality botnet + (19:46:24, 5 August 2015)
- Flamer: urgent suicide + (19:47:56, 5 August 2015)
- Anonymous supporters tricked into installing ZeuS trojan + (19:47:58, 5 August 2015)
- Flamer: highly sophisticated and discreet threat targets the Middle East + (19:48:29, 5 August 2015)
- Android.Counterclank found in official Android market + (19:49:28, 5 August 2015)
- Ransomware crimeware kits + (19:49:35, 5 August 2015)
- Trojan horse using sender policy framework + (19:49:47, 5 August 2015)
- MSRT March 2012: breaking bad + (19:50:14, 5 August 2015)
- DDoS attacks: the Zemra bot + (19:50:17, 5 August 2015)
- Zorenium bot not half the threat it claims to be + (19:50:18, 5 August 2015)
- W32.Shadesrat (Blackshades) author arrested + (19:50:19, 5 August 2015)
- First widespread virus cross-infection + (19:50:22, 5 August 2015)
- Trojan.ZeroAccess infection analysis + (19:50:23, 5 August 2015)
- Waledac gets cozy with Virut + (19:50:24, 5 August 2015)
- Playing cops & robbers with banks & browsers + (19:50:26, 5 August 2015)
- Android RATs branch out with Dendroid + (19:50:27, 5 August 2015)
- Bredolab severely injured but not dead + (19:50:28, 5 August 2015)
- Malware analysis Rannoh/Matsnu + (19:50:29, 5 August 2015)
- Analyse of the sample cdorked.A + (19:50:32, 5 August 2015)
- MSRT September '12 - Medfos, hijacking your daily search + (19:50:33, 5 August 2015)
- Analyse et poncage du botnet HerpesNet + (19:50:35, 5 August 2015)
- Microsoft and financial services industry leaders target cybercriminal operations from ZeuS botnets + (19:50:38, 5 August 2015)
- Symantec/W32.Zorenium + (19:50:40, 5 August 2015)
- More Flame/Skywiper CNC behavior uncovered + (19:50:41, 5 August 2015)
- Disorderly conduct: localized malware impersonates the police + (19:50:43, 5 August 2015)
- An Analysis of the iKeeB (duh) iPhone botnet (Worm) + (19:50:44, 5 August 2015)
- An interesting case of JRE sandbox breach (CVE-2012-0507) + (19:50:45, 5 August 2015)
- Anaru malware now live and ready to steal + (19:50:47, 5 August 2015)
- Analyse statique de Duqu stage 1 + (19:50:48, 5 August 2015)
- VinSelf - A new backdoor in town + (19:50:49, 5 August 2015)
- Leouncia - Yet another backdoor + (19:50:51, 5 August 2015)
- Leouncia - Yet another backdoor - Part 2 + (19:50:53, 5 August 2015)
- Trojan.Ransomgerpo criminal arrested + (19:50:53, 5 August 2015)
- Microsoft and Symantec take down Bamital botnet that hijacks online searches + (19:50:57, 5 August 2015)
- Get gamed and rue the day... + (19:51:00, 5 August 2015)
- Ransomware and Silence Locker control panel + (19:51:01, 5 August 2015)
- Microsoft disrupts the emerging Nitol botnet being spread through an unsecure supply chain + (19:51:03, 5 August 2015)
- Security Response Android.Counterclank + (19:51:04, 5 August 2015)
- W32.Flamer: spreading mechanism tricks and exploits + (19:51:05, 5 August 2015)
- Taking down botnets: Microsoft and the Rustock botnet + (19:51:07, 5 August 2015)
- Analyse de Xtreme RAT + (19:51:09, 5 August 2015)
- An encounter with trojan Nap + (19:51:11, 5 August 2015)
- W32.Xpaj.B: making easy money from complex code + (19:51:12, 5 August 2015)
- W32.Changeup: how the worm was created + (19:51:15, 5 August 2015)
- MSRT November '12 - Weelsof around the world + (19:51:16, 5 August 2015)
- Crisis for Windows sneaks onto virtual machines + (19:51:17, 5 August 2015)
- Analyse statique de Duqu stage 2 + (19:51:18, 5 August 2015)
- Relentless Zbot and anti-emulations + (19:51:19, 5 August 2015)
- New Duqu sample found in the wild + (19:51:21, 5 August 2015)
- Symantec/Backdoor.Arcomrat + (19:51:25, 5 August 2015)
- Malware Uses Google Go Language + (19:51:26, 5 August 2015)
- Analysis of TDL4 + (19:52:37, 5 August 2015)
- Necurs Quick Analysis + (19:53:25, 5 August 2015)
- Karagny.L unpack + (19:53:28, 5 August 2015)
- Analysis of the malware of Red October - Part 1 + (19:53:30, 5 August 2015)
- Analysis of functions used to encode strings in Flame (GDB script) + (19:53:31, 5 August 2015)
- AutoIT ransomware + (19:53:32, 5 August 2015)
- Analysis of Ysreef (a variant of Tobfy) + (19:53:34, 5 August 2015)
- Analysis of a VBScript bot + (19:54:03, 5 August 2015)
- Blackhole exploit kit v2 on the rise + (19:54:06, 5 August 2015)
- Analysis of a “/0” stealth scan from a botnet + (19:55:30, 5 August 2015)
- Analysis of ngrBot + (19:55:51, 5 August 2015)
- Analysis of the Finfisher lawful interception malware + (19:56:24, 5 August 2015)
- Darkmegi: this is not the Rootkit you’re looking for + (20:04:49, 5 August 2015)
- NGRBot spreads via chat + (20:04:50, 5 August 2015)
- Ransomware ‘Holds Up’ victims + (20:04:51, 5 August 2015)
- Travnet trojan could be part of APT campaign + (20:04:52, 5 August 2015)
- Latest SpyEye botnet active and cheaper + (20:04:55, 5 August 2015)
- ZeroAccess rootkit launched by signed installers + (20:04:58, 5 August 2015)
- Digging into the Nitol DDoS botnet + (20:05:01, 5 August 2015)
- Travnet botnet steals huge amount of sensitive data + (20:05:02, 5 August 2015)
- Apache binary backdoors on Cpanel-based servers + (20:06:58, 5 August 2015)
- Critroni crypto ransomware seen using Tor for command and control + (20:10:31, 5 August 2015)
- Latest Kelihos botnet shut down live at RSA Conference 2013 + (20:10:31, 5 August 2015)
- New Mac malware discovered on attendee computer at anti-surveillance workshop + (20:10:32, 5 August 2015)
- Armenian Bredolab creator jailed for computer sabotage + (20:10:34, 5 August 2015)
- Who's behind the world's largest spam botnet? + (20:11:07, 5 August 2015)
- Harvesting data on the Xarvester botmaster + (20:11:08, 5 August 2015)
- Apple took 3 years to fix Finfisher trojan hole + (20:11:10, 5 August 2015)
- Citadel trojan touts trouble-ticket system + (20:11:12, 5 August 2015)
- Bredolab botmaster ‘Birdie’ still at large + (20:11:13, 5 August 2015)
- Exploring the market for stolen passwords + (20:11:13, 5 August 2015)
- ‘Project Blitzkrieg’ promises more aggressive cyberheists against U.S. banks + (20:11:16, 5 August 2015)
- Inside the Grum botnet + (20:11:18, 5 August 2015)
- Fake FBI Ransomware analysis + (20:12:07, 5 August 2015)
- Attention! All data on your hardrive is encrypted + (20:12:08, 5 August 2015)
- New CryptoLocker spreads via removable drives + (20:13:06, 5 August 2015)
- Esthost taken down - Biggest cybercriminal takedown in history + (20:13:08, 5 August 2015)
- Police Trojan crosses the Atlantic, now targets USA and Canada + (20:13:09, 5 August 2015)
- Library file in certain Android apps connects to C&C servers + (20:13:11, 5 August 2015)
- PlugX: new tool for a not so new campaign + (20:13:12, 5 August 2015)
- New ransomware plays its victims an audio file, over and over and over… + (20:13:13, 5 August 2015)
- Dutch users served Sinowal for lunch + (20:13:15, 5 August 2015)
- The Dorkbot rises + (20:13:15, 5 August 2015)
- Trojan on the loose: an in-depth analysis of police trojan + (20:13:18, 5 August 2015)
- Banking trojan Dridex uses macros for infection + (20:13:19, 5 August 2015)
- New crypto-ransomware emerge in the wild + (20:13:21, 5 August 2015)
- Going solo: self-propagating ZBOT malware spotted + (20:13:23, 5 August 2015)
- Hiding in plain sight: the FAKEM remote access trojan + (20:13:26, 5 August 2015)
- ZACCESS/SIREFEF arrives with new infection technique + (20:13:28, 5 August 2015)
- DaRK DDoSseR leads to Gh0st RAT + (20:13:31, 5 August 2015)
- File infector Expiro hits US, steals FTP credentials + (20:13:31, 5 August 2015)
- Java Zero-Days and the Blackhole Exploit Kit + (20:13:32, 5 August 2015)
- Probing the Gozi-Prinimalka campaign + (20:13:33, 5 August 2015)
- New PoS malware “Backoff” targets US + (20:13:34, 5 August 2015)
- BareBox: efficient malware analysis on bare-metal + (20:16:44, 5 August 2015)
- Zeroing in on malware propagation methods + (20:21:52, 5 August 2015)
- Battling the Zbot threat + (20:21:54, 5 August 2015)
- Battling the Rustock threat + (20:22:19, 5 August 2015)
- SIRv12 + (20:22:21, 5 August 2015)
- Bitcrypt broken + (20:22:57, 5 August 2015)
- PlugX: some uncovered points + (20:22:59, 5 August 2015)
- Spread of Darkness...Details on the public release of the Darkness DDoS bot + (20:23:25, 5 August 2015)
- Darkness DDoS bot version identification guide + (20:23:25, 5 August 2015)
- Botnet construction, control and concealment + (20:23:27, 5 August 2015)
- BlackEnergy competitor – The 'Darkness' DDoS bot + (20:23:29, 5 August 2015)
- Black Dragon: "... and all will burn beneath the shadow of my wings" + (20:23:56, 5 August 2015)
- Trojan Nap aka Kelihos/Hlux - Feb. 2013 status update + (20:24:21, 5 August 2015)
- Blackhole & Cridex: season 2 episode 1: Intuit spam & SSL traffic analysis + (20:24:22, 5 August 2015)
- Blackhole Ramnit - samples and analysis + (20:24:46, 5 August 2015)
- Bot herders build newer versions of previous botnet Waledac + (20:25:53, 5 August 2015)
- Bot shopping with my wife + (20:26:31, 5 August 2015)
- BotGrep: finding P2P bots with structured graph analysis + (20:27:37, 5 August 2015)
- BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection + (20:28:29, 5 August 2015)
- Análisis del comportamiento de VOlk y sus funcionalidades + (20:45:40, 5 August 2015)
- Over 9 million PCs infected - ZeroAccess botnet uncovered + (20:46:01, 5 August 2015)
- Apple zombie malware 'NetWeird' rummages for browser and email passwords + (20:46:23, 5 August 2015)
- Panda Security uncovers bot-killing malware + (20:46:51, 5 August 2015)
- Mahdi malware finds 150 new targets including U.S. and Germany, gets more evasive + (20:46:56, 5 August 2015)
- Botnets on discount! + (20:47:59, 5 August 2015)
- Botnet operation disabled + (20:48:04, 5 August 2015)
- Malware discovered developed with Google's "Go" programming language + (20:48:15, 5 August 2015)
- Attackers place Command and Control servers inside enterprise walls + (20:48:25, 5 August 2015)
- International cyber ring that infected millions of computers dismantled + (20:48:30, 5 August 2015)
- Operation Bot Roast II + (20:48:34, 5 August 2015)
- Have we seen the end of the ZeroAccess botnet? + (20:48:40, 5 August 2015)
- Carberp - a modular information stealing trojan + (20:48:41, 5 August 2015)
- Lifting the lid on the Redkit exploit kit (Part 1) + (20:48:52, 5 August 2015)
- SIM-ple: mobile handsets are weak link in latest online banking fraud scheme + (20:49:00, 5 August 2015)
- Tilon-son of Silon + (20:49:23, 5 August 2015)
- Trusteer warns of new two headed trojan attack against online banks + (20:49:27, 5 August 2015)
- Carberp steals e-cash vouchers from Facebook users + (20:49:43, 5 August 2015)
- Carberp reverse engineering + (20:49:49, 5 August 2015)
- ZeuS: me talk pretty Finnish one day + (20:49:56, 5 August 2015)
- Targeted attacks and Ukraine + (20:50:11, 5 August 2015)
- ZeroAccess's way of self-deletion + (20:50:17, 5 August 2015)
- Pitou, The “silent” resurrection of the PITOU notorious Srizbi kernel spambot + (20:51:04, 5 August 2015)
- Under the hood of Carberp: Malware & configuration analysis + (20:51:13, 5 August 2015)
- Cyber gang seeks botmasters to wage massive wave of trojan attacks against U.S. banks + (20:51:14, 5 August 2015)
- Now you Z-(eus) it, now you don’t: ZeuS bots silently upgraded to Citadel + (20:51:20, 5 August 2015)
- Mac spyware found at Oslo Freedom Forum + (20:52:03, 5 August 2015)
- China targets macs used by NGOs + (20:52:12, 5 August 2015)
- Citadel V1.3.5.1: enter the fort’s dungeons + (20:52:28, 5 August 2015)
- ZeuS – P2P+DGA variant – mapping out and understanding the threat + (20:52:32, 5 August 2015)
- NASK shuts down dangerous Virut botnet domains + (20:52:37, 5 August 2015)
- Takeover of Virut domains + (20:52:48, 5 August 2015)
- Citadel: a cyber-criminal’s ultimate weapon? + (20:53:06, 5 August 2015)
- Citadel : le fichier de configuration + (20:53:19, 5 August 2015)
- Egypt Finfisher intrusion tools and ethics + (20:53:30, 5 August 2015)
- Citadel plitfi botnet report + (20:53:33, 5 August 2015)
- You dirty RAT! part 2 – BlackShades NET + (20:54:12, 5 August 2015)
- F-Secure has discovered MiniDuke malware samples in the wild + (20:54:27, 5 August 2015)
- Coordinated DDoS attack during Russian Duma elections + (20:54:35, 5 August 2015)
- You dirty RAT! Part 1 – DarkComet + (20:54:42, 5 August 2015)
- Confidential documents from Japanese politics stolen by malware + (20:54:51, 5 August 2015)
- FBI ransomware now targeting Apple’s Mac OS X users + (20:54:56, 5 August 2015)
- Cool exploit kit - URL structure + (20:54:58, 5 August 2015)
- ZeroAccess anti-debug uses debugger + (20:54:59, 5 August 2015)
- Citadel ZeuS bot + (20:55:02, 5 August 2015)
- Coreflood botnet - Detection and remediation + (20:55:03, 5 August 2015)
- Tatanga attack exposes chipTAN weaknesses + (20:56:08, 5 August 2015)
- Cracking the encrypted C&C protocol of the ZeroAccess botnet + (20:56:50, 5 August 2015)
- Crypto breakthrough shows Flame was designed by world-class scientists + (20:56:58, 5 August 2015)
- Part virus, part botnet, spreading fast: Ramnit moves past Facebook passwords + (20:57:04, 5 August 2015)
- Massive search fraud botnet seized by Microsoft and Symantec + (20:57:18, 5 August 2015)
- Xarvester, the new Srizbi? + (20:57:19, 5 August 2015)
- Cutwail drives spike in malicious HTML attachment spam + (20:57:31, 5 August 2015)
- The Cridex trojan targets 137 financial organizations in one go + (20:57:33, 5 August 2015)
- Shedding light on the NeoSploit Exploit Kit + (20:57:58, 5 August 2015)
- DISCLOSURE: detecting botnet command and control servers through large-scale NetFlow analysis + (20:58:04, 5 August 2015)
- DGAs and cyber-criminals: a case study + (20:58:07, 5 August 2015)
- De code van Dorifel nader bekeken + (20:58:21, 5 August 2015)
- Property:Sibling + (21:03:09, 5 August 2015)
- Property:Vuln + (21:03:54, 5 August 2015)
- Property:Threat + (21:05:30, 5 August 2015)
- Richard Kemmerer + (22:20:16, 5 August 2015)
- File:12pnkct9gera3rqayqx4c6pxb8q01bv.png + (22:51:54, 5 August 2015)
- File:2fggkvqhuy5c7d4xdss11ijy7g20bpm.png + (22:51:55, 5 August 2015)
- File:4aeh60guhiq9cjigk8hto4zrnjnsc28.png + (22:51:56, 5 August 2015)
- File:4irdgcvoxx5c14j0vnmm5b0tp8de6m6.png + (22:51:56, 5 August 2015)
- File:4tsj5vmfge47udd37gs1nk1yirt2g8g.png + (22:51:57, 5 August 2015)
- File:53ec285102dfc9f9e73290220108439c0d35b45a.pdf + (22:51:57, 5 August 2015)
- File:66e9f0fd991088c1bb361bfd6a8ae2ba6c13c281.pdf + (22:51:58, 5 August 2015)
- File:718ae457633d7be24c28969a892f66e938be4af8.pdf + (22:51:58, 5 August 2015)
- File:738c9sdm16r94kdlv5sy93mnll7p41i.gif + (22:51:59, 5 August 2015)
- File:73yj9ap4poaipjj67ccxszcq2bfpn4y.png + (22:51:59, 5 August 2015)
- File:7pxi6kmgsxjdhjvkemsvijt2l1mrhk8.jpg + (22:51:59, 5 August 2015)
- File:Aceh Indonesia Flag.png + (22:52:00, 5 August 2015)
- File:Aericaflag.jpg + (22:52:01, 5 August 2015)
- File:Afghanistan Flag 1928.jpg + (22:52:02, 5 August 2015)
- File:Afghanistan flag 1919.png + (22:52:02, 5 August 2015)
- File:Albania 1914 Flag.gif + (22:52:03, 5 August 2015)
- File:Ambox content.png + (22:52:04, 5 August 2015)
- File:Ambox notice.png + (22:52:04, 5 August 2015)