GhostNet: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 5: Line 5:
==Recommended Literature==
==Recommended Literature==
* [http://en.wikipedia.org/wiki/GhostNet Wikipedia entry]
* [http://en.wikipedia.org/wiki/GhostNet Wikipedia entry]
* John Markoff, [http://www.nytimes.com/2009/03/29/technology/29spy.html?_r=1&adxnnl=1&adxnnlx=1344535526-2wJ7Kus8PyKDSGO9NlesZQ Vast Spy System Loots Computers in 103 Countries], NY Times, Mar 28, 2009
* Shishir Nagaraja & Ross Anderson, [http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-746.pdf The snooping dragon: social-malware surveillance of the Tibetan movement], University of Cambridge Computer Laboratory Technical Report, March 2009  
* Shishir Nagaraja & Ross Anderson, [http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-746.pdf The snooping dragon: social-malware surveillance of the Tibetan movement], University of Cambridge Computer Laboratory Technical Report, March 2009  


[[Category:Case Studies]]
[[Category:Case Studies]]

Revision as of 14:07, 9 August 2012

This page is currently under construction. Check back for updates soon.

Case Summary

Recommended Literature