Pages that link to "Template:Quotation"
Jump to navigation
Jump to search
The following pages link to Template:Quotation:
Displayed 100 items.
View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)- Hodprot: hot to bot (transclusion) (← links)
- Smartcard vulnerabilities in modern banking malware (transclusion) (← links)
- Sinowal: MBR rootkit never dies! (and it always brings some new clever features) (transclusion) (← links)
- Flamer: urgent suicide (transclusion) (← links)
- Flame: replication via Windows Update MITM proxy (transclusion) (← links)
- MP-DDoser: A rapidly improving DDoS threat (transclusion) (← links)
- MP-DDoser:Monitoring a rapidly improving DDoS threat (transclusion) (← links)
- Crypto breakthrough shows Flame was designed by world-class scientists (transclusion) (← links)
- Un WOMBAT pour évaluer la cybercriminalité (transclusion) (← links)
- Library file in certain Android apps connects to C&C servers (transclusion) (← links)
- Back to Stuxnet: the missing link (transclusion) (← links)
- You dirty RAT! Part 1 – DarkComet (transclusion) (← links)
- MSRT June '12 - cleanup on aisle one (transclusion) (← links)
- ZeroAccess's way of self-deletion (transclusion) (← links)
- BareBox: efficient malware analysis on bare-metal (transclusion) (← links)
- Using libemu to create malware flow graph (transclusion) (← links)
- A chat with NGR Bot (transclusion) (← links)
- Large-scale analysis of malware downloaders (transclusion) (← links)
- Insights into Win32/Bradop (transclusion) (← links)
- You dirty RAT! part 2 – BlackShades NET (transclusion) (← links)
- Backdoor:Win32/Caphaw.A (transclusion) (← links)
- Proactive policy measures by Internet service providers against Botnets (transclusion) (← links)
- Shylock financial malware back 'with a vengeance' (transclusion) (← links)
- Digging inside Tinba malware - A walkthrough (transclusion) (← links)
- Fake FBI Ransomware analysis (transclusion) (← links)
- BotGrep: finding P2P bots with structured graph analysis (transclusion) (← links)
- XPAJ: reversing a Windows x64 bootkit (transclusion) (← links)
- Xpaj Botnet intercepts up to 87 million searches per year (transclusion) (← links)
- W32.Xpaj.B: making easy money from complex code (transclusion) (← links)
- Analysis of functions used to encode strings in Flame (GDB script) (transclusion) (← links)
- ZeroAccess - new steps in evolution (transclusion) (← links)
- Carberp gang evolution: CARO 2012 presentation (transclusion) (← links)
- More Flame/Skywiper CNC behavior uncovered (transclusion) (← links)
- ZeroAccess: code injection chronicles (transclusion) (← links)
- Ponmocup analysis (transclusion) (← links)
- Introducing Ponmocup-Finder (transclusion) (← links)
- DDoS attacks: the Zemra bot (transclusion) (← links)
- Win32/Gataka: a banking Trojan ready to take off (transclusion) (← links)
- W32.Shadesrat (Blackshades) author arrested (transclusion) (← links)
- QuickPost: Flame & Volatility (transclusion) (← links)
- Get gamed and rue the day... (transclusion) (← links)
- Relentless Zbot and anti-emulations (transclusion) (← links)
- Monkif botnet hides commands in JPEGs (transclusion) (← links)
- Kaspersky Lab et Seculert annoncent la récente découverte de « Madi », une nouvelle attaque de cyberespionnage au Moyen‑Orient (transclusion) (← links)
- Flame, Duqu and Stuxnet: in-depth code analysis of mssecmgr.ocx (transclusion) (← links)
- Rovnix bootkit framework updated (transclusion) (← links)
- Madi is back - New Tricks and a new Command&Control server (transclusion) (← links)
- The Madi campaign - Part II (transclusion) (← links)
- Rovnix.D: the code injection story (transclusion) (← links)
- Dorkbot: conquistando Latinoamérica (transclusion) (← links)
- The ‘Madi’ infostealers - a detailed analysis (transclusion) (← links)
- Winlock affiliate (transclusion) (← links)
- EURO Winlocker (transclusion) (← links)
- Flamer analysis: framework reconstruction (transclusion) (← links)
- Gangstaservice Winlock Affiliate (transclusion) (← links)
- Gauss: Nation-state cyber-surveillance meets banking Trojan (transclusion) (← links)
- Dorifel crypto malware paralyzes Dutch companies and public sector (transclusion) (← links)
- Dorifel is much bigger than expected and it’s still active and growing! (transclusion) (← links)
- More details of the Dorifel servers (transclusion) (← links)
- Stealthy router-based botnet worm squirming (transclusion) (← links)
- De code van Dorifel nader bekeken (transclusion) (← links)
- Joint strike force against Dorifel (transclusion) (← links)
- Dorifel virus gereed voor Nederlandse banking phishing (transclusion) (← links)
- Panel Virus Gendarmerie : Ratio 0.36% (transclusion) (← links)
- Gauss: abnormal distribution (transclusion) (← links)
- Panel Supern0va et virus gendarmerie (transclusion) (← links)
- Win32/Gataka banking Trojan - Detailed analysis (transclusion) (← links)
- Crypto experts called on to crack cyberspy tool's encryption (transclusion) (← links)
- What’s the buzz with Bafruz (transclusion) (← links)
- ZACCESS/SIREFEF arrives with new infection technique (transclusion) (← links)
- Interconnection of Gauss with Stuxnet, Duqu & Flame (transclusion) (← links)
- Malware analysis tutorial 32: exploration of botnet client (transclusion) (← links)
- Dorifel/Quervar: the support scammer’s secret weapon (transclusion) (← links)
- Analyzing a new exploit pack (transclusion) (← links)
- Spam botnets: The fall of Grum and the rise of Festi (transclusion) (← links)
- Targeted destructive malware explained: Troj/Mdrop-ELD (transclusion) (← links)
- Disttrack sabotage malware wipes data at unnamed Middle East energy organization (transclusion) (← links)
- Shamoon the wiper - copycats at work (transclusion) (← links)
- Saudi Aramco hit by computer virus (transclusion) (← links)
- Bleeding Life Exploit Pack (transclusion) (← links)
- Mac Flashback exploiting unpatched Java vulnerability (transclusion) (← links)
- Analyse et poncage du botnet HerpesNet (transclusion) (← links)
- Analyse statique de Duqu stage 1 (transclusion) (← links)
- Analyse statique de Duqu stage 2 (transclusion) (← links)
- Analyse de Xtreme RAT (transclusion) (← links)
- Disttrack malware overwrites files, infects MBR (transclusion) (← links)
- Nepalese government websites compromised to serve Zegost RAT (transclusion) (← links)
- New virus SMSZombie.A discovered by TrustGo Security Labs (transclusion) (← links)
- Inside the Grum botnet (transclusion) (← links)
- AutoIT ransomware (transclusion) (← links)
- Shamoon the Wiper in details (transclusion) (← links)
- Quervar – Induc.C reincarnate (transclusion) (← links)
- Newly detected Crisis virus infects Windows, Macs and virtual machines (transclusion) (← links)
- OSX/Crisis has been used as part of a targeted attack (transclusion) (← links)
- New Apple Mac trojan called OSX/Crisis discovered (transclusion) (← links)
- Crisis for Windows sneaks onto virtual machines (transclusion) (← links)
- Guys behind Gauss and Flame are the same (transclusion) (← links)
- Apple took 3 years to fix Finfisher trojan hole (transclusion) (← links)
- Analysis of the Finfisher lawful interception malware (transclusion) (← links)
- Egypt Finfisher intrusion tools and ethics (transclusion) (← links)