Author: Heather Goudey | Download
Rootkits provide stealth capabilities to malware. This report examines how attackers use rootkits, and how rootkits function on affected computers.
Authors: Jaime Wong and Shannon Sabens | Download
This report examines the prevalent EyeStye family of malware.
Authors: Tareq Saade, Dan Kurc, and Holly Stewart | Download
This report provides an overview of the Win32/Poison (Poison Ivy) family of malware.
This special edition of the SIR provides an overview of the Win32/Rustock family of rootkit-enabled backdoor trojans.
Authors: Dan Kurc, Tareq Saade, Aaron Putnam, Holly Stewart | Download
This report provides an overview of the Win32/Qakbot (Qakbot) family of malware.
Authors: T.J. Campana, Joe Faulhaber, Paul Henry, Matt McCormack, Frank Simorjay, Holly Stewart | Download
This document provides an overview of the Win32/Zbot family of password-stealing trojans.
I want to...