Bots and malware
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2015’
Nsa hiding undetectable spyware in hard drives worldwide
ICS CERT- Incidence Reports
[IJET-V1I2P2] Authors :Karishma Pandey, Madhura Naik, Junaid Qamar,Mahendra Patil
Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,
ICS-CERT_Monitor_Sep2014-Feb2015.pdf
Equation Group : Advanced Secretive Computer Espionage Group
ITSec Malicious Software