-
1
-
-
85075099727
-
-
June
-
Safe Browsing API, June 2007. See http://code.google.com/apis/safebrowsing/.
-
(2007)
Safe Browsing API
-
-
-
2
-
-
85075099738
-
-
May
-
Safe Browsing diagnostic page, May 2008. See http://www.google.com/safebrowsing/diagnostic? site=yoursite.com.
-
(2008)
Safe Browsing Diagnostic Page
-
-
-
3
-
-
85075109846
-
-
November last visited February 13, 2010
-
Virus Detail: Win32/FakeAV Family, November 2008. http://www.ca.com/securityadvisor/virusinfo/virus.aspx?id=74100, last visited February 13, 2010.
-
(2008)
Virus Detail: Win32/FakeAV Family
-
-
-
4
-
-
78651531810
-
-
December last visited February 13, 2010
-
Federal Trade Commission. Court halts bogus computer scans, December 2008. http://www.ftc.gov/opa/2008/12/winsoftware.shtm, last visited February 13, 2010.
-
(2008)
Court Halts Bogus Computer Scans
-
-
-
5
-
-
85075101682
-
-
September last visited February 13, 2010
-
R. Ferguson. New York Times pushes Fake AV malvertisement, September 2009. http://countermeasures.trendmicro.eu/ new-york-times-pushes-fake-av-malvertisement/, last visited February 13, 2010.
-
(2009)
New York Times Pushes Fake AV Malvertisement
-
-
Ferguson, R.1
-
6
-
-
77952338717
-
A framework for detection and measurement of phishing attacks
-
New York, NY, USA, ACM
-
S. Garera, N. Provos, M. Chew, and A. D. Rubin. A framework for detection and measurement of phishing attacks. In WORM ’07: Proceedings of the 2007 ACM workshop on Recurring malcode, pages 1–8, New York, NY, USA, 2007. ACM.
-
(2007)
WORM ’07: Proceedings of the 2007 ACM Workshop on Recurring Malcode
, pp. 1-8
-
-
Garera, S.1
Provos, N.2
Chew, M.3
Rubin, A.D.4
-
7
-
-
85075111951
-
-
last visited February 13
-
Microsoft Security. Watch out for fake virus alerts. http://www.microsoft.com/security/antivirus/ rogue.aspx, last visited February 13, 2010.
-
(2010)
Watch out for Fake Virus Alerts
-
-
-
9
-
-
80053650188
-
All your iframes point to us
-
N. Provos, P. Mavrommatis, M. A. Rajab, and F. Monrose. All your iframes point to us. In USENIX Security Symposium, pages 1–16, 2008.
-
(2008)
USENIX Security Symposium
, pp. 1-16
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.A.3
Monrose, F.4
-
10
-
-
78650593419
-
CyberCrime 2.0: When the cloud turns dark
-
N. Provos, M. A. Rajab, and P. Mavrommatis. Cybercrime 2.0: When the cloud turns dark. Queue, 7(2):46–47, 2009.
-
(2009)
Queue
, vol.7
, Issue.2
, pp. 46-47
-
-
Provos, N.1
Rajab, M.A.2
Mavrommatis, P.3
-
12
-
-
85075110699
-
-
January last visited February 13, 2010
-
C.-A. Skinner. Fake Antivirus Scam Hits Facebook, January 2010. http://www.pcworld.com/article/188147/fake_antivirus_scam_hits_facebook.html, last visited February 13, 2010.
-
(2010)
Fake Antivirus Scam Hits Facebook
-
-
Skinner, C.-A.1
-
14
-
-
66249095839
-
-
October last visited February 13, 2010
-
J. Stewart. Rogue antivirus dissected, October 2008. http://www.secureworks.com/research/threats/rogue- antivirus- part- 1/?threat= rogue- antivirus- part- 1, last visited February 13, 2010.
-
(2008)
Rogue Antivirus Dissected
-
-
Stewart, J.1
-
15
-
-
85075102555
-
Symantec report on rogue security software
-
October last visited February 13, 2010
-
Symantec, Inc. Symantec report on rogue security software. White paper, Symantec Enterprise Security, October 2009. http://www4.symantec.com/Vrt/wl?tu_id= XuOB125692283892572210, last visited February 13, 2010.
-
(2009)
White Paper, Symantec Enterprise Security
-
-
|