Difference between revisions of "GhostNet"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 5: Line 5:
 
==Recommended Literature==
 
==Recommended Literature==
 
* [http://en.wikipedia.org/wiki/GhostNet Wikipedia entry]
 
* [http://en.wikipedia.org/wiki/GhostNet Wikipedia entry]
 +
* John Markoff, [http://www.nytimes.com/2009/03/29/technology/29spy.html?_r=1&adxnnl=1&adxnnlx=1344535526-2wJ7Kus8PyKDSGO9NlesZQ Vast Spy System Loots Computers in 103 Countries], NY Times, Mar 28, 2009
 
* Shishir Nagaraja & Ross Anderson, [http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-746.pdf The snooping dragon: social-malware surveillance of the Tibetan movement], University of Cambridge Computer Laboratory Technical Report, March 2009  
 
* Shishir Nagaraja & Ross Anderson, [http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-746.pdf The snooping dragon: social-malware surveillance of the Tibetan movement], University of Cambridge Computer Laboratory Technical Report, March 2009  
  
 
[[Category:Case Studies]]
 
[[Category:Case Studies]]

Revision as of 18:07, 9 August 2012

This page is currently under construction. Check back for updates soon.

Case Summary

Recommended Literature