-
1
-
-
84871138493
-
-
Retrieved from Arcot Resources - Briefs and White Papers for Online Identity Fraud Protection
-
Arcot. (2010). Protecting Online Customers from Man-in-the-Browser and Man-in-the-Middle Attacks. Retrieved from Arcot Resources - Briefs and White Papers for Online Identity Fraud Protection website: http://www.arcot.com/ resources/docs/Protection-from-MITM-&-MITB-Attacks-White-Paper.pdf
-
(2010)
Protecting Online Customers from Man-in-the-Browser and Man-in-the-Middle Attacks
-
-
-
2
-
-
84871121204
-
-
September 30 Retrieved April 5, 2011, from M86 Security Labs
-
Chechik, D. (2009, September 30). Malware Analysis - Trojan Banker URLZone/Bebloh. Retrieved April 5, 2011, from M86 Security Labs website: http://labs.m86security.com/2009/09/malware-analysistrojan-banker-urlzonebebloh/
-
(2009)
Malware Analysis - Trojan Banker URLZone/Bebloh
-
-
Chechik, D.1
-
3
-
-
84871147021
-
-
Retrieved April 3, 2011, from Internet Security and Encryption White Papers
-
Entrust. (2010). Defeating Man-in-the-Browser. Retrieved April 3, 2011, from Internet Security and Encryption White Papers website: http://www.entrust. com/resources/download.cfm/24002/
-
(2010)
Defeating Man-in-the-Browser
-
-
-
4
-
-
84871140914
-
-
Retrieved from Security Response Whitepapers Symantec Corp.
-
Falliere, N., & Chien, E. (2009). Zeus: King of the Bots. Retrieved from Security Response Whitepapers Symantec Corp. website: http://www.symantec. com/content/en/us/enterprise/media/security-response/whitepapers/ zeus-king-of-bots.pdf
-
(2009)
Zeus: King of the Bots
-
-
Falliere, N.1
Chien, E.2
-
5
-
-
84871140906
-
-
July Retrieved March 20, 2011, from M86 Security
-
Finjan. (2009, July). Cybercrime Intelligence Report, Issue no. 3. Retrieved March 20, 2011, from M86 Security website: http://www.finjan.com/ GetObject.aspx?ObjId=679
-
(2009)
Cybercrime Intelligence Report, Issue No. 3
-
-
-
6
-
-
48249138794
-
-
September 12 Retrieved March 3, 2011 CAcert.org
-
Gühring, P. (2006, September 12). Concepts against Man-in-the-Browser Attacks. Retrieved March 3, 2011, from CAcert.org website: http://www2.futureware.at/svn/sourcerer/CAcert/SecureClient.pdf
-
(2006)
Concepts Against Man-in-the-Browser Attacks
-
-
Gühring, P.1
-
7
-
-
80052624238
-
-
March 23 Retrieved March 25, 2011 Comodo Blogs
-
Hallam-Baker, P. (2011, March 23). The Recent RA Compromise. Retrieved March 25, 2011, from Comodo Blogs website: http://blogs.comodo.com/it-security/ data-security/the-recent-ra-compromise/
-
(2011)
The Recent RA Compromise
-
-
Hallam-Baker, P.1
-
8
-
-
84871138492
-
-
November 16 Retrieved from Continuity Central
-
Imperva. (2010, November 16). Top ten security trends for2011. Retrieved from Continuity Central website: http://www.continuitycentral.com/feature0830. html
-
(2010)
Top Ten Security Trends For2011
-
-
-
9
-
-
84871157781
-
-
September 12 Retrieved April 10, 2011 Tricipher
-
Litan, A., & Allan, A. (2006, September 12). Threats: Man in the Browser. Retrieved April 10, 2011, from Tricipher website: http://www.tricipher. com/threats/man-in-the-browser.html
-
(2006)
Threats: Man in the Browser
-
-
Litan, A.1
Allan, A.2
-
10
-
-
74049148313
-
-
July 22 Retrieved April 2011, from SecureTweets Blog website
-
MCRC. (2009, July 22). How a cybergang operates a network of 1.9 million infected computers. Retrieved April 2011, from SecureTweets Blog website: http://www.finjan.com/SecureTweets/Blog/post/How-a-cybergang-operates-a-network- of-19-million-infected-computers.aspx
-
(2009)
How a Cybergang Operates a Network of 1.9 Million Infected Computers
-
-
-
11
-
-
84871131980
-
-
January 8 Retrieved April 3, 2011 Symantec Security Response
-
Murchu, L. O. (2008, January 8). Trojan. Silentbanker Technical Details. Retrieved April 3, 2011, from Symantec Security Response website: http://www.symantec.com/security-response/writeup.jsp?docid=2007-121718-1009- 99&tabid=2
-
(2008)
Trojan. Silentbanker Technical Details
-
-
Murchu, L.O.1
-
12
-
-
84871125352
-
-
February 19 Retrieved April 9, 2011 threatpost: Kaspersky Lab Security News Service
-
Mushaq, A. (2010, February 19). Man in the Browser: Inside the Zeus Trojan. Retrieved April 9, 2011, from threatpost: Kaspersky Lab Security News Service website: http://threatpost.com/en-us/blogs/manbrowser-inside-zeus- trojan-021910
-
(2010)
Man in the Browser: Inside the Zeus Trojan
-
-
Mushaq, A.1
-
13
-
-
84871168522
-
-
October 31 Retrieved March 15, 2011, from Speaking of Security - The RSA Blog and Podcast website
-
RSA Fraud Action Research Labs. (2008, October 31). One Sinowal Trojan + One Gang = Hundreds of Thousands of Compromised Accounts. Retrieved March 15, 2011, from Speaking of Security - The RSA Blog and Podcast website: http://blogs.rsa.com/rsafarl/one-sinowal-trojan-one-gang-hundreds-of-thousands- of-compromised-accounts/
-
(2008)
One Sinowal Trojan + One Gang = Hundreds of Thousands of Compromised Accounts
-
-
-
14
-
-
70949098699
-
-
Retrieved April 2, 2011 Taking over the Torpig botnet website
-
Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., et al. (2009). Your Botnet is My Botnet: Analysis of a Botnet Takeover. Retrieved April 2, 2011, from Taking over the Torpig botnet website: http://www.cs.ucsb.edu/~seclab/projects/torpig/torpig.pdf
-
(2009)
Your Botnet Is My Botnet: Analysis of a Botnet Takeover
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
-
15
-
-
84871140914
-
-
Retrieved April 5, 2011, from Security Response Whitepapers Symantec Corp. website
-
Symantec. (2009). Zeus: King of the Bots. Retrieved April 5, 2011, from Security Response Whitepapers Symantec Corp. website: http://www.symantec.com/ content/en/us/enterprise/media/security-response/whitepapers/zeus-king-of-bots. pdf
-
(2009)
Zeus: King of the Bots
-
-
|