Security News

http://arstechnica.com/security/2014/11/highly-advanced-backdoor-trojan-cased-high-profile-targets-for-years/ By Dan Goodin Ars Technica Nov 23 2014

http://abcnews.go.com/US/trojan-horse-bug-lurking-vital-us-computers-2011/story?id=26737476 By JACK CLOHERTY and PIERRE THOMAS ABC News Nov 6, 2014

http://www.computerworld.com/s/article/9248567/New_banking_Trojan_Zberp_offers_the_worst_of_Zeus_and_Carberp By Lucian Constantin IDG News Service May 26, 2014

http://www.v3.co.uk/v3-uk/news/2337382/middle-eastern-hackers-use-remote-access-trojan-to-infect-24-000-machines-worldwide By Alastair Stevenson V3.co.uk 01 Apr 2014

http://news.techworld.com/security/3503842/marussia-formula-1-teams-race-testing-disrupted-by-trojan-malware/ By John E Dunn Techworld 25 February 2014

http://www.informationweek.com/security/vulnerabilities-and-threats/i2ninja-trojan-taps-anonymized-darknet/d/d-id/1112730 By Mathew J. Schwartz InformationWeek 11/21/2013

http://arstechnica.com/security/2013/09/researchers-can-slip-an-undetectable-trojan-into-intels-ivy-bridge-cpus/ By Dan Goodin Ars Technica Sept 18 2013

http://news.techworld.com/security/3468265/north-korea-prime-suspect-after-crude-trojan-aimed-at-south-korean-think-tanks/ By John E Dunn Techworld 11 September 2013


http://english.donga.com/srv/service.php3?biid=2013080143238 Dong-A Ilbo AUGUST 01, 2013