Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- An internet census taken by an illegal botnet – A qualitative assessment of published measurements + (Scientific paper)
- Measuring and detecting malware downloads in live network traffic + (Scientific paper)
- Survey on network-based botnet detection methods + (Scientific paper)
- The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements + (Scientific paper)
- The underground economy of spam: a botmaster's perspective of coordinating large-scale spam campaigns + (Scientific paper)
- Why forums? An empirical analysis into the facilitating factors of carding forums + (Scientific paper)
- McAfee Labs threat advisory : W32.Pinkslipbot + (Tech report)
- The IMDDOS botnet: discovery and analysis + (Tech report)
- Citadel trojan malware analysis + (Tech report)
- Hesperbot – A new, advanced banking trojan in the wild + (Tech report)
- Anunak:APT against financial institutions + (Tech report)
- FighterPOS: a new one-man PoS malware campaign + (Tech report)
- Traffic direction systems as malware distribution tools + (Tech report)
- Poisoned search results: How hackers have automated search engine poisoning attacks to distribute malware + (Tech report)
- Hammertoss: stealthy tactics define a Russian cyber threat group + (Tech report)
- Tilon/SpyEye2 intelligence report + (Tech report)
- W32.Stuxnet dossier + (Tech report)
- Kaptoxa point-of-sale compromise + (Tech report)
- Inside an APT campaign with multiple targets in India and Japan + (Tech report)
- Chasing cybercrime: network insights of Dyre and Dridex trojan bankers + (Tech report)
- Conficker working group: lessons learned + (Tech report)
- Poison Ivy: assessing damage and extracting intelligence + (Tech report)
- Symantec/Android.Ackposts + (Threat entry)
- Symantec/Backdoor.Arcomrat + (Threat entry)
- Win32/Vundo + (Threat entry)
- Symantec/Android.Maistealer + (Threat entry)
- Symantec/W32.Zorenium + (Threat entry)
- Dyre Banking Trojan + (Threat entry)
- The new era of botnets + (White paper)
- Inside the world of the Citadel trojan + (White paper)
- SDBot IRC botnet continues to make waves + (White paper)
- Hiding in plain sight: the FAKEM remote access trojan + (White paper)
- Reversing the wrath of Khan + (White paper)
- Combatting point-of-sale malware + (White paper)
- "njRAT" Uncovered + (White paper)
- Discerning relationships: the Mexican botnet connection + (White paper)
- Unveiling an Indian cyberattack infrastructure - a special report + (White paper)
- MP-DDoser:Monitoring a rapidly improving DDoS threat + (White paper)
- Kaspersky security bulletin 2015. Overall statistics for 2015 + (White paper)
- Pitou, The “silent” resurrection of the PITOU notorious Srizbi kernel spambot + (White paper)
- Dragonfly Threat Against Western Energy Suppliers + (White paper)
- PoS RAM scraper malware; past, present and future + (White paper)
- Takeover of Virut domains + (White paper)
- Demystifying Pobelka + (White paper)
- IcoScript: using webmail to control malware + (White paper)
- Analysis of a PlugX malware variant used for targeted attacks + (White paper)
- Covert channels over social networks + (White paper)
- Illuminating the Etumbot APT backdoor + (White paper)
- OSX/Flashback - The first malware to infect hundreds of thousands of Apple Mac + (White paper)
- Analysis of a stage 3 Miniduke malware sample + (White paper)