Flame: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 5: | Line 5: | ||
==Recommended Literature== | ==Recommended Literature== | ||
* [http://en.wikipedia.org/wiki/Flame_(malware) Wikipedia entry] | * [http://en.wikipedia.org/wiki/Flame_(malware) Wikipedia entry] | ||
* Kim Zetter, [http://www.wired.com/threatlevel/2012/05/flame/all/ Meet ‘Flame,’ The Massive Spy Malware Infiltrating Iranian Computers], Wired: Threat Level, 28 May 2012 | |||
* Alexander Gostev, [http://www.securelist.com/en/blog?weblogid=208193522 The Flame: Questions and Answers], SecureList, May 28, 2012 | * Alexander Gostev, [http://www.securelist.com/en/blog?weblogid=208193522 The Flame: Questions and Answers], SecureList, May 28, 2012 | ||
[[Category:Case Studies]] | [[Category:Case Studies]] |
Revision as of 11:36, 9 August 2012
This page is currently under construction. Check back for updates soon. |
Case Summary
Recommended Literature
- Wikipedia entry
- Kim Zetter, Meet ‘Flame,’ The Massive Spy Malware Infiltrating Iranian Computers, Wired: Threat Level, 28 May 2012
- Alexander Gostev, The Flame: Questions and Answers, SecureList, May 28, 2012