Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Harnig botnet: a retreating army + (March 22, 2011)
- The evolution of TDL: conquering x64 + (March 30, 2011)
- The underground economy of spam: a botmaster's perspective of coordinating large-scale spam campaigns + (March 30, 2011)
- W32.Stuxnet dossier + (April 2011)
- Botnet operation disabled + (April 14, 2011)
- The ‘advertising’ botnet + (April 20, 2011)
- Torpig - Back to the future or how the most sophisticated trojan in 2008 reinvents itself + (June 16, 2011)
- TDL4 - Top Bot + (June 27, 2011)
- The good , the bad and the unknown online scanners + (July 2, 2011)
- HTran and the Advanced Persistent Threat + (August 3, 2011)
- Analysis of ngrBot + (August 4, 2011)
- Chapro.A source code + (August 6, 2011)
- Harnig is back + (August 9, 2011)
- GingerMaster Android Malware Utilizing A Root Exploit + (August 18, 2011)
- The Miner botnet: Bitcoin mining goes peer-to-peer + (August 19, 2011)
- Xpaj Botnet intercepts up to 87 million searches per year + (August 26, 2011)
- Morto worm sets a (DNS) record + (August 31, 2011)
- Analysis: Malware Win32/Rimecud.B + (September 5, 2011)
- Microsoft neutralizes Kelihos botnet, names defendant in case + (September 27, 2011)
- Hodprot: hot to bot + (October 5, 2011)
- VOlk-botnet takes over Latin America + (October 12, 2011)
- The mystery of Duqu: part one + (October 20, 2011)
- Get gamed and rue the day... + (23:40:00, 25 October 2011)
- Apple took 3 years to fix Finfisher trojan hole + (November 2011)
- An analysis of underground forums + (November 2, 2011)
- Esthost taken down - Biggest cybercriminal takedown in history + (November 9, 2011)
- The mystery of Duqu: part five + (November 15, 2011)
- International cyber ring that infected millions of computers dismantled + (November 19, 2011)
- Cracking into the new P2P variant of Zeusbot/Spyeye + (November 28, 2011)
- The mystery of Duqu: part six (the command and control servers) + (November 30, 2011)
- Advancing the fight against botnets with consumer notifications + (December 5, 2011)
- Evolution of Win32Carberp: going deeper + (December 5, 2011)
- Proactive detection of network security incidents + (December 7, 2011)
- Traffic direction systems as malware distribution tools + (December 12, 2011)
- Disorderly conduct: localized malware impersonates the police + (December 19, 2011)
- Malware 2 - from infection to persistence + (January 2012)
- DNS: a botnet dialect + (2012)
- SKyWIper: A complex malware for targeted attacks + (2012)
- Dorkbot: conquistando Latinoamérica + (2012)
- Malware hunting with the Sysinternals tools + (2012)
- Unveiling the network criminal infrastructure of TDSS/TDL4 - DGAv14: a case study on a new TDSS/TDL4 variant + (2012)
- Cracking the encrypted C&C protocol of the ZeroAccess botnet + (2012)
- Industrial espionage and targeted attacks: understanding the characteristics of an escalating threat + (2012)
- Learning stateful models for network honeypots + (2012)
- ZeuS – P2P+DGA variant – mapping out and understanding the threat + (January 4, 2012)
- Ramnit goes social + (January 5, 2012)
- A peek inside the PickPocket botnet + (January 6, 2012)
- Acquisition and analysis of volatile memory from Android devices + (February 2012)
- Reveton.A + (February 1, 2012)
- TDL4 reloaded: Purple Haze all in my brain + (February 3, 2012)
- Android.Bmaster: A million-dollar mobile botnet + (February 9, 2012)