Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- NitlovePOS: another new POS malware + (Blogpost)
- Mac spyware found at Oslo Freedom Forum + (Blogpost)
- The life cycle of web server botnet recruitment + (Blogpost)
- PlugX malware: A good hacker is an apologetic hacker + (Blogpost)
- OSX Kitmos analysis + (Blogpost)
- Android Marcher now marching via porn sites + (Blogpost)
- Qadars: un nouveau malware bancaire avec un composant mobile + (Blogpost)
- Carbanak: Multi-million dollar cybercrime gang focuses on banks rather than their customers + (Blogpost)
- Case study of the Miner botnet + (Conference paper or presentation)
- The Waledac protocol: the how and why + (Conference paper or presentation)
- Stealing money from ATMs with malware + (Conference paper or presentation)
- An analysis of underground forums + (Conference paper or presentation)
- The evolution of webinjects + (Conference paper or presentation)
- Post-mortem of a zombie: Conficker cleanup after six years + (Conference paper or presentation)
- A Foray into Conficker’s Logic and Rendezvous Points + (Conference paper or presentation)
- Industrial espionage and targeted attacks: understanding the characteristics of an escalating threat + (Conference paper or presentation)
- Operation Socialist The Inside Story Of How British Spies Hacked Belgium’s Largest Telco + (Press article)
- Chameleon botnet grabbed $6m A MONTH from online ad-slingers + (Press article)
- Mastermind behind Gozi bank malware charged along with two others + (Press article)
- Massive search fraud botnet seized by Microsoft and Symantec + (Press article)
- 'Tigger' trojan keeps security researchers hopping + (Press article)
- Mariposa botnet 'mastermind' jailed in Slovenia + (Press article)
- Pushdo botnet gets DGA update, over 6,000 machines host new variant + (Press article)
- Stolen passwords allowed hackers to steal over one billion rubles + (Press article)
- Five charged in largest hacking scheme ever prosecuted in US + (Press article)
- Ransomware : la sulfureuse hypothèse sur la situation chez Norsk Hydro + (Press article)
- REvil ransomware gang's web sites mysteriously shut down + (Press article)
- Bot Roast II nets 8 individuals + (Press release)
- An internet census taken by an illegal botnet – A qualitative assessment of published measurements + (Scientific paper)
- Measuring and detecting malware downloads in live network traffic + (Scientific paper)
- Survey on network-based botnet detection methods + (Scientific paper)
- The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements + (Scientific paper)
- The underground economy of spam: a botmaster's perspective of coordinating large-scale spam campaigns + (Scientific paper)
- Why forums? An empirical analysis into the facilitating factors of carding forums + (Scientific paper)
- McAfee Labs threat advisory : W32.Pinkslipbot + (Tech report)
- The IMDDOS botnet: discovery and analysis + (Tech report)
- Citadel trojan malware analysis + (Tech report)
- Hesperbot – A new, advanced banking trojan in the wild + (Tech report)
- Anunak:APT against financial institutions + (Tech report)
- FighterPOS: a new one-man PoS malware campaign + (Tech report)
- Traffic direction systems as malware distribution tools + (Tech report)
- Poisoned search results: How hackers have automated search engine poisoning attacks to distribute malware + (Tech report)
- Hammertoss: stealthy tactics define a Russian cyber threat group + (Tech report)
- Tilon/SpyEye2 intelligence report + (Tech report)
- W32.Stuxnet dossier + (Tech report)
- Kaptoxa point-of-sale compromise + (Tech report)
- Inside an APT campaign with multiple targets in India and Japan + (Tech report)
- Chasing cybercrime: network insights of Dyre and Dridex trojan bankers + (Tech report)
- Conficker working group: lessons learned + (Tech report)
- Poison Ivy: assessing damage and extracting intelligence + (Tech report)
- Symantec/Android.Ackposts + (Threat entry)
- Symantec/Backdoor.Arcomrat + (Threat entry)
- Win32/Vundo + (Threat entry)
- Symantec/Android.Maistealer + (Threat entry)
- Symantec/W32.Zorenium + (Threat entry)
- Dyre Banking Trojan + (Threat entry)