von Neumann, John (1966). Arthur W. Burks (ed.). Theory of self-reproducing automata (PDF). University of Illinois Press. Retrieved June 12, 2010. /wiki/John_von_Neumann
Benford, Gregory. "The Scarred Man Returns". Gregory Benford. Archived from the original on 2022-09-30. Retrieved 2021-09-12. https://web.archive.org/web/20220930021524/http://www.gregorybenford.com/extra/the-scarred-man-returns/
Chen, Thomas; Robert, Jean-Marc (2004). "The Evolution of Viruses and Worms". Archived from the original on 2009-05-17. Retrieved 2009-02-16. https://web.archive.org/web/20090517083356/http://vx.netlux.org/lib/atc01.html
Russell, Deborah; Gangemi, G T (1991). Computer Security Basics. O'Reilly. p. 86. ISBN 0-937175-71-4. 0-937175-71-4
Davis, Alan M. (July–August 2006). "First Virus?". IEEE Software. 23 (4): 8–10. doi:10.1109/MS.2006.101. /wiki/Doi_(identifier)
"A Taste of Computer Security". Archived from the original on 2011-09-27. Retrieved 2010-11-04. https://web.archive.org/web/20110927101813/http://www.kernelthread.com/publications/security/viruses.html
Spafford, Eugene H. (1991-09-19). "The Internet Worm Incident / Technical Report CSD-TR-933" (PDF). p. 3. Retrieved 19 December 2024. https://spaf.cerias.purdue.edu/tech-reps/933.pdf
"IMDB synopsis of Westworld". www.imdb.com. Retrieved November 28, 2015. https://www.imdb.com/title/tt0070909/synopsis
Michael Crichton (November 21, 1973). Westworld (movie). 201 S. Kinney Road, Tucson, Arizona, USA: Metro-Goldwyn-Mayer. Event occurs at 32 minutes. And there's a clear pattern here which suggests an analogy to an infectious disease process, spreading from one resort area to the next." ... "Perhaps there are superficial similarities to disease." "I must confess I find it difficult to believe in a disease of machinery.{{cite AV media}}: CS1 maint: location (link) /wiki/Template:Cite_AV_media
"The very first viruses: Creeper, Wabbit and Brain", Daniel Snyder, InfoCarnivore, May 30, 2010,
http://infocarnivore.com/the-very-first-viruses-creeper-wabbit-and-brain/
"ANIMAL Source Code". Fourmilab.ch. 1996-08-13. Retrieved 2012-03-29. http://www.fourmilab.ch/documents/univac/animalsrc.html
"The Animal Episode". Fourmilab.ch. Retrieved 2012-03-29. http://www.fourmilab.ch/documents/univac/animal.html
Craig E. Engler (1997). "The Shockwave Rider". Classic Sci-Fi Reviews. Archived from the original on 2008-07-03. Retrieved 2008-07-28. https://web.archive.org/web/20080703121956/http://www.scifi.com/sfw/issue48/classic.html
Ryan, Thomas J. (1977). The Adolescence of P-1 (1st ed.). New York: Macmillan. ISBN 0-02-606500-2.
0-02-606500-2
"First virus hatched as a practical joke". The Sydney Morning Herald (AP). 3 September 2007. Retrieved 9 September 2013. https://www.smh.com.au/articles/2007/09/01/1188671795625.html?page=fullpage#contentSwap2
Fred Cohen (1983-11-03). "Computer Viruses – Theory and Experiments". eecs.umich.edu. Retrieved 2012-03-29. http://www.eecs.umich.edu/%7Eaprakash/eecs588/handouts/cohen-viruses.html
Thompson, Ken (August 1984). "Reflections on Trusting Trust". Communications of the ACM. 27 (8): 761–763. doi:10.1145/358198.358210. S2CID 34854438. https://doi.org/10.1145%2F358198.358210
Leyden, John (January 19, 2006). "PC virus celebrates 20th birthday". The Register. Retrieved March 21, 2011. https://www.theregister.co.uk/2006/01/19/pc_virus_at_20/
Szor, Peter (2005). The Art of Computer Virus Research and Defense. Symantec Press / Addison-Wesley Professional. ISBN 978-0-321-30454-4. 978-0-321-30454-4
Wentworth, Rob (July 1996). "Computer Virus!" (reprinted from The Digital Viking). Twin Cities PC User Group. Archived from the original on 24 December 2013. Retrieved 9 September 2013. https://web.archive.org/web/20131224165244/http://uanr.com/articles/virus.html
Wentworth, Rob (July 1996). "Computer Virus!" (reprinted from The Digital Viking). Twin Cities PC User Group. Archived from the original on 24 December 2013. Retrieved 9 September 2013. https://web.archive.org/web/20131224165244/http://uanr.com/articles/virus.html
Wentworth, Rob (July 1996). "Computer Virus!" (reprinted from The Digital Viking). Twin Cities PC User Group. Archived from the original on 24 December 2013. Retrieved 9 September 2013. https://web.archive.org/web/20131224165244/http://uanr.com/articles/virus.html
"Virus.DOS.Chameleon.1260 – Securelist". Viruslist.com. Archived from the original on 2012-09-19. Retrieved 2010-07-10. https://archive.today/20120919103524/http://www.viruslist.com/en/viruses/encyclopedia?virusid=2008
"V2PX". Vil.nai.com. Archived from the original on 2009-07-22. Retrieved 2010-07-10. https://web.archive.org/web/20090722030020/http://vil.nai.com/vil/content/v_98074.htm
"What we detect – Securelist". Viruslist.com. Archived from the original on 2009-07-13. Retrieved 2010-07-10. https://web.archive.org/web/20090713092458/http://www.viruslist.com/en/viruses/encyclopedia?chapter=153311162
"Leandro", Threat Encyclopedia, Trend Micro, 9 March 2000. Retrieved 9 September 2013. http://about-threats.trendmicro.com/us//archive/malware/LEANDRO
"Freddy Virus", Virus Information Summary List, December 1992. Retrieved 9 September 2013. http://wiw.org/~meta/vsum/view.php?vir=529
"Glossary – Securelist". Viruslist.com. Retrieved 2010-07-10. http://www.viruslist.com/en/glossary?glossid=189267795
"Wscript.KakWorm". Symantec. Archived from the original on August 30, 2006. Retrieved 2012-03-29. https://web.archive.org/web/20060830014222/http://www.symantec.com/security_response/writeup.jsp?docid=2000-121908-3951-99
"Kournikova computer virus hits hard". BBC News. February 13, 2001. Retrieved April 9, 2010. http://news.bbc.co.uk/2/hi/science/nature/1167453.stm
Evers, Joris (May 3, 2002). "Kournikova virus maker appeals sentence". Retrieved 20 November 2010. http://www.computerworld.com/s/article/70752/Kournikova_virus_maker_appeals_sentence_
"Magistr - the Virus Encyclopedia". The Virus Encyclopedia. Retrieved 21 October 2021. http://virus.wikidot.com/magistr
"MyLife Worm". Antivirus.about.com. 2002-03-07. Retrieved 2012-03-29. http://antivirus.about.com/library/weekly/aa030802a.htm
"The Spread of the Sapphire/Slammer Worm". Retrieved 2012-12-14. http://www.caida.org/publications/papers/2003/sapphire/sapphire.html
"Slammed!". Wired. July 2003. Retrieved 2012-12-14. https://www.wired.com/wired/archive/11.07/slammer.html
Sevcenco, Serghei (February 10, 2006). "Symantec Security Response: Backdoor.Graybird". Symantec. Archived from the original on December 11, 2003. Retrieved 2009-03-01. https://archive.today/20031211194335/http://securityresponse1.symantec.com/sarc/sarc.nsf/html/backdoor.graybird.html
"Backdoor.Prorat". Symantec. February 13, 2007. Archived from the original on September 1, 2006. Retrieved 2009-03-01. https://web.archive.org/web/20060901033711/http://www.symantec.com/security_response/writeup.jsp?docid=2003-061315-4216-99
"Threat Description: Worm:W32/Swen". F-secure.com. Retrieved 2012-03-29. http://www.f-secure.com/v-descs/swen.shtml
"Backdoor.Win32.Agobot.gen". Securelist. Archived from the original on 2012-03-15. Retrieved 2012-03-29. https://web.archive.org/web/20120315225141/http://www.securelist.com/en/descriptions/old61021
"W32.Bolgi.Worm". Symantec. Archived from the original on January 7, 2007. Retrieved 2012-03-29. https://web.archive.org/web/20070107102105/http://www.symantec.com/security_response/writeup.jsp?docid=2003-112019-2425-99
"Threat Description:Bluetooth-Worm:SymbOS/Cabir". F-secure.com. Retrieved 2012-03-29. http://www.f-secure.com/v-descs/cabir.shtml
"SymbOS.Cabir". Symantec. Archived from the original on January 2, 2007. Retrieved 2012-03-29. https://web.archive.org/web/20070102072310/http://www.symantec.com/security_response/writeup.jsp?docid=2004-061419-4412-99
"Spyware Detail Nuclear RAT 1.0b1". Computer Associates. August 16, 2004. Archived from the original on 2009-09-11. Retrieved 2009-03-01. https://web.archive.org/web/20090911091523/http://www.ca.com/securityadvisor/pest/pest.aspx?id=453078396
"Vundo". McAfee. Archived from the original on 2009-02-17. Retrieved 2009-03-01. https://web.archive.org/web/20090217105948/http://vil.nai.com/vil/content/v_127690.htm
"Backdoor.Bifrose". Symantec, Inc. October 12, 2004. Archived from the original on January 7, 2007. Retrieved 2009-02-28. https://web.archive.org/web/20070107192050/http://www.symantec.com/security_response/writeup.jsp?docid=2004-101214-5358-99
"The ZLOB Show: Trojan Poses as Fake Video Codec, Loads More Threats". Trend Micro. Retrieved 2009-02-28. http://www.trendmicro.com/vinfo/secadvisories/default6.asp?VNAME=The+ZLOB+Show%3A+Trojan+poses+as+fake+video+codec%2C+loads+more+threats
"Threat Description: Email-Worm:W32/Brontok.N". F-secure.com. Retrieved 2012-03-29. http://www.f-secure.com/v-descs/brontok_n.shtml
Peter Gutmann (31 August 2007). "World's most powerful supercomputer goes online". Full Disclosure. Retrieved 2007-11-04. http://seclists.org/fulldisclosure/2007/Aug/0520.html
Gage, Deborah (February 17, 2005). "Chinese PC virus may have hidden agenda". Seattle Post-Intelligencer. Seattle PI. Retrieved 2009-03-01. http://www.seattlepi.com/business/351670_picframevirus18.html
Kimmo (March 3, 2008). "MBR Rootkit, A New Breed of". F-Secure. Retrieved 2009-03-01. http://www.f-secure.com/weblog/archives/00001393.html
"Win32.Ntldrbot (aka Rustock)". Dr. Web Ltd. Retrieved 2009-03-01. http://www.pr.com/press-release/84130
"Virus Total". virustotal.com. July 8, 2008. Archived from the original on 2009-04-01. Retrieved 2009-03-01. https://web.archive.org/web/20090401173026/http://www.virustotal.com/analisis/a5d8b3ba9226285dd14619fd8faf12a7
"Koobface malware makes a comeback". cnet.com. April 9, 2010. Retrieved 2009-04-13. http://news.cnet.com/8301-1009_3-20002112-83.html?
Willsher, Kim (2009-02-07). "French fighter planes grounded by computer virus". The Daily Telegraph. London. Retrieved 2009-04-01. http://telegraph.co.uk/news/worldnews/europe/france/4547649/French-fighter-planes-grounded-by-computer-virus.html
Williams, Chris (2009-01-20). "MoD networks still malware-plagued after two weeks". The Register. Retrieved 2009-01-20. http://theregister.co.uk/2009/01/20/mod_malware_still_going_strong
Williams, Chris (2009-01-20). "Conficker seizes city's hospital network". The Register. Retrieved 2009-01-20. http://theregister.co.uk/2009/01/20/sheffield_conficker
"Conficker-Wurm infiziert hunderte Bundeswehr-Rechner" (in German). PC Professionell. 2009-02-16. Archived from the original on 2009-03-21. Retrieved 2009-04-01. https://web.archive.org/web/20090321171256/http://www.pc-professionell.de/news/2009/02/16/conficker_wurm_infiziert_hunderte_bundeswehr_rechner
Neild, Barry (2009-02-13). "$250K Microsoft bounty to catch worm creator". CNN. Retrieved 2009-03-29. http://www.cnn.com/2009/TECH/ptech/02/13/virus.downadup/index.html
"MS08-067: Vulnerability in Server service could allow remote code execution". Microsoft Corporation. http://support.microsoft.com/kb/958644
Dancho Danchev. "Source code for Skype eavesdropping trojan in the wild". ZDNet. https://www.zdnet.com/article/source-code-for-skype-eavesdropping-trojan-in-the-wild/
"Code for Skype Spyware Released to Thwart Surveillance". WIRED. 31 August 2009. https://www.wired.com/2009/08/skype-trojan/
Harvison, Josh (September 27, 2010). "Blackmail virus infects computers, holds information ransom". kait8.com. Archived from the original on 2016-06-11. Retrieved 20 November 2010. https://web.archive.org/web/20160611145434/http://www.kait8.com/Global/story.asp?S=13220447
"Waledac Takedown Successful". honeyblog.org. February 25, 2010. Retrieved 16 November 2012. http://honeyblog.org/archives/52-Waledac-Takedown-Successful.html
Paul, Ian (25 March 2009). "Nasty New Worm Targets Home Routers, Cable Modems". PC World. Retrieved 2009-03-26. http://www.pcworld.com/article/161941/nasty_new_worm_targets_home_routers_cable_modems.html?tk=rss_main
"Alureon trojan caused Windows 7 BSoD". microsoft.com. February 18, 2010. Retrieved 2010-02-18. http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Win32%2fAlureon
"VirusBlokAda News". Anti-virus.by. Retrieved 2012-03-29. http://anti-virus.by/en/tempo.shtml
Gregg Keizer (16 September 2010). "Is Stuxnet the 'best' malware ever?". InfoWorld. Archived from the original on 5 December 2012. Retrieved 16 September 2010. https://archive.today/20121205012450/http://www.infoworld.com/print/137598
Stuxnet virus: worm 'could be aimed at high-profile Iranian targets’, Telegraph, 23 Sep 2010 https://www.telegraph.co.uk/technology/news/8021102/Stuxnet-virus-worm-could-be-aimed-at-high-profile-Iranian-targets.html
"Possible New Rootkit Has Drivers Signed by Realtek". Kaspersky Labs. 15 July 2010. http://threatpost.com/possible-new-rootkit-has-drivers-signed-realtek-071510
"Bastard child of SpyEye/ZeuS merger appears online". The Register. 2011. Retrieved April 11, 2011. Bastard child of SpyEye/ZeuS merger appears online https://www.theregister.co.uk/2011/01/25/spyeye_zeus_merger/
"SpyEye mobile banking Trojan uses same tactics as ZeuS". The Register. 2011. Retrieved April 11, 2011. SpyEye mobile banking Trojan uses same tactics as ZeuS https://www.theregister.co.uk/2011/04/05/spyeye_mobile_trojan/
"XP AntiSpyware 2011 – Virus Solution and Removal". Precisesecurity.com. Archived from the original on May 10, 2011. Retrieved 2012-03-29. https://web.archive.org/web/20110510074804/http://www.precisesecurity.com/rogue/xp-anti-spyware-2011/
"Morto Worm Spreads to Weak Systems". blogs.appriver.com. 2011. Archived from the original on 2011-10-14. Retrieved 2011-08-31. https://web.archive.org/web/20111014022544/http://blogs.appriver.com/blog/digital-degenerate-2/morto-worm-spreads-to-weak-systems
"Morto Post Mortem: Dissecting a Worm". blog.imperva.com. 2011-09-07. Retrieved 2024-07-05. https://www.imperva.com/blog/archive/morto-post-mortem-a-worm-deep-dive/
"Laboratory of Cryptography and System Security (CrySyS)". Retrieved 4 November 2011. http://www.crysys.hu/
"Duqu: A Stuxnet-like malware found in the wild, technical report" (PDF). Laboratory of Cryptography of Systems Security (CrySyS). 14 October 2011. http://www.crysys.hu/publications/files/bencsathPBF11duqu.pdf
"Statement on Duqu's initial analysis". Laboratory of Cryptography of Systems Security (CrySyS). 21 October 2011. Archived from the original on 2 October 2012. Retrieved 25 October 2011. https://web.archive.org/web/20121002235948/http://crysys.hu/in-the-press.html
"W32.Duqu – The precursor to the next Stuxnet (Version 1.4)" (PDF). Symantec. 23 November 2011. Archived from the original (PDF) on December 13, 2011. Retrieved 30 December 2011. https://web.archive.org/web/20111213083345/http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_duqu_the_precursor_to_the_next_stuxnet.pdf
"sKyWIper: A Complex Malware for Targeted Attacks" (PDF). Budapest University of Technology and Economics. 28 May 2012. Archived from the original (PDF) on 28 May 2012. Retrieved 29 May 2012. https://web.archive.org/web/20120528142705/http://www.crysys.hu/skywiper/skywiper.pdf
"NGRBot", Enigma Software Group, 15 October 2012. Retrieved 9 September 2013. http://www.enigmasoftware.com/ngrbot-removal/
"Dissecting the NGR bot framework: IRC botnets die hard", Aditya K. Sood and Richard J. Enbody, Michigan State University, USA, and Rohit Bansal, SecNiche Security, USA, with Helen Martin1 (ed.), January 2012. Retrieved 9 September 2013. (subscription required) http://www.virusbtn.com/virusbulletin/archive/2012/01/vb201201-NGR-botnet
Goodin, Dan (2013-11-27). "New Linux worm targets routers, cameras, "Internet of things" devices". Ars Technica. Retrieved October 24, 2016. https://arstechnica.com/security/2013/11/new-linux-worm-targets-routers-cameras-internet-of-things-devices/
Sterling, Bruce (2014-01-29). "Linux.Darlloz, the Internet-of-Things worm". Wired. Retrieved 24 October 2016. https://www.wired.com/2014/01/spime-watch-linux-darlloz-internet-things-worm/
"Attack of Things!". Level 3 Threat Research Labs. 25 August 2016. Retrieved 6 November 2016. http://blog.level3.com/security/attack-of-things/
Ballano, Mario (1 Oct 2015). "Is there an Internet-of-Things vigilante out there?". Symantec. Retrieved 14 November 2016. https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=ef23b297-5cc6-4c4a-b2e7-ff41635965fe&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments
"linux.wifatch". The White Team. October 5, 2015. Retrieved 15 November 2016. https://gitlab.com/rav7teif/linux.wifatch
Cimpanu, Catalin (Oct 7, 2015). "Creators of the Benevolent Linux.Wifatch Malware Reveal Themselves". Softpedia. Retrieved 14 November 2016. http://news.softpedia.com/news/creators-of-the-benevolent-linux-wifatch-malware-reveal-themselves-493938.shtml
Oberhaus, Daniel (July 9, 2016). "Watch This Malware Turn a Computer into a Digital Hellscape". Motherboard. Retrieved July 4, 2018. https://www.vice.com/en/article/watch-this-malware-turn-a-computer-into-a-digital-hellscape/
Dean, Madeleine (August 26, 2016). "MEMZ virus: what is it and how it affects Windows PC?". Windows Report. Retrieved July 4, 2018. https://windowsreport.com/memz-virus-windows-pc/
"Ransomware: Erpresserische Schadprogramme" Archived 2016-02-21 at the Wayback Machine, bsi-fuer-buerger.de, 9 February 2016. Retrieved 10 March 2016. https://www.bsi-fuer-buerger.de/BSIFB/DE/Service/Aktuell/Informationen/Artikel/Ransomware.html
"Locky ransomware on aggressive hunt for victims", Symantec.com, 18 February 2016. Retrieved 10 March 2016. https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=5dcac8a2-6d48-4ebb-9060-f45e2fa5f465&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments
"Antivirus scan for (Locky)", virustotal.com, 16 February 2016. Retrieved 10 March 2016. https://www.virustotal.com/en/file/5e945c1d27c9ad77a2b63ae10af46aee7d29a6a43605a9bfbf35cebbcff184d8/analysis/1455638481/
danielevir (19 September 2014). "'Tiny Banker' Malware Attempted At Customers Of US Banks". Massive Alliance. Retrieved 10 September 2017. https://www.massivealliance.com/2014/09/19/tiny-banker-malware-attempted-customers-us-banks/
"Modified Tiny Banker Trojan Found Targeting Major U.S. Banks". Entrust, Inc. https://www.entrust.com/modified-tiny-banker-trojan-found-targeting-major-u-s-banks/
Jeremy Kirk (15 September 2014). "'Tiny banker' malware targets US financial institutions". PCWorld. http://www.pcworld.com/article/2684112/tiny-banker-malware-targets-us-financial-institutions.html
"'Tiny Banker' Malware Targets Dozens of Major US Financial Institutions". The State of Security. 2014-09-16. http://www.tripwire.com/state-of-security/latest-security-news/tiny-banker-malware-targets-dozens-of-major-us-financial-institutions/
"Tiny 'Tinba' Banking Trojan Is Big Trouble". msnbc.com. 2012-05-31. https://www.nbcnews.com/id/wbna47633142
"What is Pegasus spyware and how does it hack phones?". The Guardian. 18 July 2021. Retrieved 13 August 2021. https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones
The Economist, 8 October 2016, The internet of stings /wiki/The_Economist
Bonderud, Douglas (October 4, 2016). "Leaked Mirai Malware Boosts IoT Insecurity Threat Level". securityintelligence.com. Retrieved 20 October 2016. https://securityintelligence.com/news/leaked-mirai-malware-boosts-iot-insecurity-threat-level/
"Today the web was broken by countless hacked devices". theregister.co.uk. 21 October 2016. Retrieved 24 October 2016. https://www.theregister.co.uk/2016/10/21/dyn_dns_ddos_explained/
"Blame the Internet of Things for Destroying the Internet Today". Motherboard. VICE. 2016-10-21. Retrieved 27 October 2016. https://www.vice.com/en/article/blame-the-internet-of-things-for-destroying-the-internet-today/
Wong, Julia Carrie; Solon, Olivia (2017-05-12). "Massive ransomware cyber-attack hits 74 countries around the world". The Guardian. ISSN 0261-3077. Retrieved 2017-05-12. /wiki/Julia_Carrie_Wong
Solon, Olivia (2017-05-13). "'Accidental hero' finds kill switch to stop spread of ransomware cyber-attack". The Guardian. ISSN 0261-3077. Retrieved 2017-05-13. https://www.theguardian.com/technology/2017/may/13/accidental-hero-finds-kill-switch-to-stop-spread-of-ransomware-cyber-attack
Khandelwal, Swati. "It's Not Over, WannaCry 2.0 Ransomware Just Arrived With No 'Kill-Switch'". The Hacker News. Retrieved 2017-05-14. http://thehackernews.com/2017/05/wannacry-ransomware-cyber-attack.html
"Petya ransomware outbreak: Here's what you need to know". Archived from the original on June 29, 2017. Retrieved 10 September 2017. https://web.archive.org/web/20170629093754/https://www.symantec.com/connect/blogs/petya-ransomware-outbreak-here-s-what-you-need-know
"Ransom.Petya - Symantec". Symantec. Archived from the original on September 2, 2016. Retrieved 10 September 2017. https://web.archive.org/web/20160902114244/https://www.symantec.com/security_response/writeup.jsp?docid=2016-032913-4222-99
"'Petya' Ransomware Outbreak Goes Global — Krebs on Security". krebsonsecurity.com. 28 June 2017. Retrieved 10 September 2017. https://krebsonsecurity.com/2017/06/petya-ransomware-outbreak-goes-global/
"New malware steals users' money through mobile phones: Report". The Economic Times. 10 September 2017. Retrieved 10 September 2017. http://economictimes.indiatimes.com/tech/internet/new-malware-steals-users-money-through-mobile-phones-report/articleshow/60448837.cms
"Xafecopy Trojan, a new malware detected in India; it disguises itself as an app to steals money via mobile phones". Tech2. 2017-09-10. Retrieved 10 September 2017. http://www.firstpost.com/tech/news-analysis/xafecopy-trojan-a-new-malware-detected-in-india-it-disguises-itself-as-an-app-to-steals-money-via-mobile-phones-4028709.html
"Kedi RAT can steal your information and send it through gmail". https://www.techscoop.in/2017/09/KediRAT-can-steal-your-information-and.html
"Beware the Kedi RAT pretending to be a Citrix file that Gmails home". 2017-09-12. https://nakedsecurity.sophos.com/2017/09/12/beware-the-kedi-rat-pretending-to-be-a-citrix-file-that-gmails-home/
Abrams, Lawrence (February 26, 2018). "Thanatos Ransomware Is First to Use Bitcoin Cash. Messes Up Encryption". Bleeping Computer. Retrieved June 25, 2019. https://www.bleepingcomputer.com/news/security/thanatos-ransomware-is-first-to-use-bitcoin-cash-messes-up-encryption/
AMR, GReAT (8 November 2019). "Titanium: the Platinum group strikes again". Kaspersky Lab. Retrieved 9 November 2019. https://securelist.com/titanium-the-platinum-group-strikes-again/94961/
WIRED (2024-03-02). "Researchers create AI worms that can spread from one system to another". Ars Technica. Retrieved 2024-03-07. https://arstechnica.com/ai/2024/03/researchers-create-ai-worms-that-can-spread-from-one-system-to-another/
Corbet, Jonathan (2024-03-29). "A backdoor in xz". LWN. Retrieved 2024-04-03. https://lwn.net/Articles/967180/