178:
funds transfer, the customer will always be shown, via confirmation screens, the exact payment information as keyed into the browser. The bank, however, will receive a transaction with materially altered instructions, i.e. a different destination account number and possibly amount. The use of strong
638:
Known
Trojans may be detected, blocked, and removed by antivirus software. In a 2009 study, the effectiveness of antivirus against Zeus was 23%, and again low success rates were reported in a separate test in 2011. The 2011 report concluded that additional measures on top of antivirus were needed.
714:
Secure Web
Browser: Several vendors can now provide a two-factor security solution where a Secure Web Browser is part of the solution. In this case, MitB attacks are avoided, as the user executes a hardened browser from their two-factor security device rather than executing the "infected" browser
179:
authentication tools simply creates an increased level of misplaced confidence on the part of both customer and bank that the transaction is secure. Authentication, by definition, is concerned with the validation of identity credentials. This should not be confused with transaction verification.
1312:
1739:
728:(OOB) transaction verification process. This overcomes the MitB trojan by verifying the transaction details, as received by the host (bank), to the user (customer) over a channel other than the browser; for example, an automated telephone call,
143:
The MitB threat was demonstrated by
Augusto Paes de Barros in his 2005 presentation about backdoor trends "The future of backdoors - worst of all worlds." The name "man-in-the-browser" was coined by Philipp Gühring on 27 January 2007.
806:
Web fraud detection can be implemented at the bank to automatically check for anomalous behaviour patterns in transactions. TLS Negotiation failed: FAILED_PRECONDITION: starttls error (71): 126011017202752:error:1000012e:SSL
865:). Malware is used to change the client's computer network routing to perform a classic man-in-the-middle attack. Once the routing has been changed, the malware may completely remove itself, making detection more difficult.
748:), transaction signing (to non-repudiation level), and transaction verification. The downside is that the OOB transaction verification adds to the level of the end-user's frustration with more and slower steps.
1743:
778:
suggested for installation on a mobile phone by a Zeus-infected computer. By intercepting all incoming SMSes, it defeats SMS-based banking OOB two-factor authentication on
1525:
1245:
1361:
113:. Trojans may be detected and removed by antivirus software, but a 2011 report concluded that additional measures on top of antivirus software were needed.
2141:
1478:
879:
Clickjacking tricks a web browser user into clicking on something different from what the user perceives, by means of malicious code in the webpage.
736:
with graphical cryptogram. OOB transaction verification is ideal for mass market use since it leverages devices already in the public domain (e.g.
1815:
3728:
2578:
1993:
903:
1701:
1080:(in Portuguese). Sao Paulo, Brazil: Congresso Nacional de Auditoria de Sistemas, Segurança da Informação e Governança - CNASI. Archived from
1291:
774:
ZitMo (Zeus-In-The-Mobile) is not a MitB Trojan itself (although it performs a similar proxy function on the incoming SMSes), but is mobile
3723:
1768:
1265:
1879:
1613:
1175:
2743:
2301:
2258:
1949:
913:
620:****URLZone a.k.a. Bebloh!IK, Runner.82176, Monder, ANBR, Sipay.IU, Runner.fq, PWS.y!cy, Zbot.gen20, Runner.J, BredoPk-B, Runner.EQ
1639:
1578:
1154:
2146:
1529:
3738:
3718:
1973:
1551:
65:, modify transaction content or insert additional transactions, all in a covert fashion invisible to both the user and host
3435:
2212:
1074:
1133:
3556:
2980:
86:
3713:
3687:
3065:
2571:
2232:
1921:
1903:
1891:
1858:
1408:
1024:
Fernandes, Diogo A. B.; Soares, Liliana F. B.; Gomes, João V.; Freire, Mário M.; Inácio, Pedro R. M. (2014-04-01).
783:
827:, followed by browser-session recorders that capture more data, and lastly MitBs are the most sophisticated type.
3601:
3450:
3297:
2100:
1365:
82:
78:
3332:
2545:
2034:
2024:
50:
1199:
131:
The majority of financial service professionals in a 2014 survey considered MitB to be the greatest threat to
3208:
2110:
419:
1836:
1660:
648:
Browser security software: MitB attacks may be blocked by in-browser security software such as
Cymatic.io,
3733:
3631:
3169:
3111:
2985:
2890:
2800:
2786:
2161:
1988:
1482:
744:, etc.) and requires no additional hardware devices, yet enables three-factor authentication (using voice
1863:
807:
routines:OPENSSL_internal:KEY_USAGE_BIT_INCORRECT:third_party/openssl/boringssl/src/ssl/ssl_cert.cc:431:
3682:
3651:
3576:
3566:
3526:
2915:
2671:
2564:
2339:
2294:
1942:
1225:
605:*ChromeInject a.k.a. ChromeInject.A, ChromeInject.B, Banker.IVX, Inject.NBT, Bancos-BEX, Drop.Small.abw
505:
148:
1868:
703:. Further protection can be achieved by running this alternative OS, like Linux, from a non-installed
3692:
3616:
3586:
3546:
3536:
3391:
3237:
3178:
3041:
3026:
2964:
2810:
2691:
2540:
2268:
2263:
2222:
2151:
2009:
1688:. Lecture Notes in Computer Science. Vol. 9603. Berlin, Heidelberg: Springer. pp. 405–421.
664:
74:
1457:
3531:
3516:
3480:
3430:
3415:
3232:
3213:
3188:
3116:
2855:
2815:
2734:
2217:
539:
1109:
3521:
3485:
3465:
3420:
3347:
3282:
3277:
3121:
3106:
3060:
2910:
2835:
2626:
2202:
2039:
1909:
1681:
1552:"Encyclopedia entry: Win32/Zbot - Learn more about malware - Microsoft Malware Protection Center"
1224:
Nattakant
Utakrit, School of Computer and Security Science, Edith Cowan University (2011-02-25).
1055:
446:
168:
160:
70:
1772:
1269:
1226:"Review of Browser Extensions, a Man-in-theBrowser Phishing Techniques Targeting Bank Customers"
975:
147:
A MitB Trojan works by using common facilities provided to enhance browser capabilities such as
1718:
3641:
3611:
3356:
3101:
2805:
2631:
2520:
2479:
2227:
2181:
2090:
1697:
1239:
1047:
898:
842:
836:
668:
653:
591:
578:
574:
569:
565:
156:
152:
43:
39:
3366:
3267:
3223:
2935:
2880:
2820:
2636:
2535:
2500:
2287:
2242:
2207:
1935:
1689:
1617:
1504:
1039:
725:
438:
210:
188:
175:
90:
58:
3591:
3445:
3425:
2414:
2404:
2349:
2237:
2176:
700:
434:
66:
1795:"Internet Banking & Mobile Banking users beware – ZITMO & SPITMO is here !!"
3052:
2925:
2870:
2850:
2505:
2484:
2474:
2429:
2419:
2384:
2354:
2197:
2171:
1978:
1585:
1387:
908:
779:
688:
132:
947:
3707:
3302:
2865:
2825:
2795:
2646:
2510:
2444:
2409:
2399:
2394:
2364:
2334:
2156:
2075:
1983:
918:
888:
853:
A related attack that is simpler and quicker for malware authors to set up is termed
696:
663:
Alternative software: Reducing or eliminating the risk of malware infection by using
430:
3661:
3541:
3440:
3376:
3371:
3361:
3312:
3252:
2859:
2515:
2449:
2424:
2369:
2095:
2014:
1340:
1059:
1001:
874:
759:
756:
741:
282:
110:
106:
47:
3307:
1873:
1693:
3646:
3626:
3495:
3460:
3396:
3322:
3085:
2974:
2969:
2920:
2895:
2885:
2729:
2686:
2681:
2587:
2374:
2166:
2085:
1740:"'Man In The Mobile' Attacks Highlight Weaknesses In Out-Of-Band Authentication"
215:
192:
54:
1682:"How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication"
1081:
3551:
3337:
3327:
3272:
3262:
3131:
2954:
2905:
2875:
2676:
2125:
2105:
2070:
1915:
1897:
1885:
1266:"ZeuS-style banking Trojans seen as greatest threat to online banking: Survey"
1043:
820:
791:
745:
733:
164:
1051:
3386:
3381:
3242:
3075:
3070:
3031:
3000:
2995:
2959:
2900:
2753:
2469:
2359:
2115:
2065:
1026:
724:
A theoretically effective method of combating any MitB attack is through an
632:
510:
450:
62:
1719:"Commerzbank to deploy Cronto mobile phone-based authentication technology"
660:, which blocks the APIs from browser extensions and controls communication.
1428:
3636:
3500:
3317:
3247:
3203:
3198:
3080:
3005:
2990:
2439:
2389:
2344:
737:
708:
684:
672:
657:
649:
597:
258:
3596:
3581:
3455:
3193:
3126:
2944:
2845:
2525:
2379:
2120:
2029:
1958:
893:
787:
775:
704:
692:
586:
582:
442:
73:
will be successful irrespective of whether security mechanisms such as
3656:
3621:
3606:
3571:
3475:
3406:
3292:
3287:
3257:
3183:
3017:
2949:
2840:
2830:
2748:
2701:
2459:
2434:
2310:
2080:
2060:
2055:
1816:"How to protect online transactions with multi-factor authentication"
1680:
Konoth, Radhesh
Krishnan; van der Veen, Victor; Bos, Herbert (2017).
473:
387:
296:
262:
1794:
1579:"Measuring the in-the-wild effectiveness of Antivirus against Zeus"
1292:"Crafty OddJob malware leaves online bank accounts open to plunder"
3561:
3470:
2724:
2696:
2659:
2464:
2454:
2329:
794:. ZitMo may be detected by Antivirus running on the mobile device.
676:
1927:
845:
attack, but offers no protection in a man-in-the-browser attack.
174:
In a nutshell example exchange between user and host, such as an
3490:
3036:
2719:
2654:
1882:
A summary of ZeuS as a Trojan and Botnet, plus vector of attacks
89:
solutions are in place. A MitB attack may be countered by using
3157:
2774:
2598:
2560:
2556:
2283:
1931:
3136:
2666:
2324:
1176:"Facebook users targeted in Carberp man-in-the-browser attack"
729:
680:
615:***Zeus a.k.a. ZeuS, Zbot, Wsnpoem, NTOS, PRG, Kneber, Gorhax
94:
1640:"Online banking: what the BBC missed and a safety suggestion"
2279:
1002:"Web Browsers: Your Weak Link in Achieving PCI Compliance"
797:
SpitMo (SpyEye-In-The-Mobile, SPITMO) is similar to ZitMo.
1874:
Hackers outwit online banking identity security systems
1155:"Zeus not the only bank Trojan threat, users warned"
3509:
3405:
3346:
3222:
3168:
3094:
3050:
3016:
2934:
2785:
2712:
2645:
2619:
2493:
2317:
2251:
2190:
2134:
2048:
2002:
1966:
1409:"Tatanga: a new banking trojan with MitB functions"
1362:"Man-in-the-Browser attacks target the enterprise"
1334:
1332:
1330:
1328:
1025:
1859:Virus attack on HSBC Transactions with OTP Device
1407:Jozsef Gegeny; Jose Miguel Esparza (2011-02-25).
1027:"Security issues in cloud environments: a survey"
462:Smallest banking Trojan detected in wild at 20KB
1572:
1570:
1568:
1451:
1449:
1259:
1257:
1255:
770:) can defeat OOB SMS transaction verification.
1193:
1191:
941:
939:
937:
935:
933:
2572:
2295:
1943:
1684:. In Grossklags, Jens; Preneel, Bart (eds.).
1607:
1605:
1388:"Explosive financial malware targets Windows"
1360:CEO of Trusteer Mickey Boodaei (2011-03-31).
1134:"Trojan Writers Target UK Banks With Botnets"
1110:"Concepts against Man-in-the-Browser Attacks"
1073:Paes de Barros, Augusto (15 September 2005).
1032:International Journal of Information Security
976:"Threat Description: Trojan-Spy:W32/Nuklus.A"
8:
1906:The Zeus toolkit, Symantec Security Response
1661:"Use a Linux Live CD/USB for Online Banking"
1429:"Tiny 'Tinba' Banking Trojan Is Big Trouble"
1244:: CS1 maint: multiple names: authors list (
1103:
1101:
1075:"O futuro dos backdoors - o pior dos mundos"
392:successor of Zeus, widespread, low detection
1762:
1760:
3165:
3154:
2782:
2771:
2616:
2595:
2579:
2565:
2557:
2302:
2288:
2280:
1950:
1936:
1928:
1219:
1217:
1215:
197:
57:by taking advantage of vulnerabilities in
1769:"Zeus Banking Trojan Hits Android Phones"
969:
967:
965:
963:
1686:Financial Cryptography and Data Security
1200:"Trojan.PWS.ChromeInject.B Removal Tool"
995:
993:
991:
556:
1864:Virus attack on ICICI Bank Transactions
1505:"Threat DescriptionTrojan-Spy:W32/Zbot"
1198:Marusceac Claudiu Florin (2008-11-28).
929:
841:SSL/PKI etc. may offer protection in a
1994:Timeline of computer viruses and worms
1899:Zeus: King of crimeware toolkits Video
1612:Richard S. Westmoreland (2010-10-20).
1524:Hyun Choi; Sean Kiernan (2008-07-24).
1237:
904:Timeline of computer viruses and worms
187:Examples of MitB threats on different
1917:Boy-in-the-Browser Cyber Attack Video
1894:Entrust President and CEO Bill Conner
1869:Virus attack on Citibank Transactions
7:
1837:"Threat Advisory Boy in the Browser"
1479:"Crimeware Kit Emerges for Mac OS X"
1108:Gühring, Philipp (27 January 2007).
720:Out-of-band transaction verification
1386:www.net-security.org (2011-05-11).
513:kit similar to Zeus, not widespread
93:transaction verification, although
1767:Schwartz, Mathew J. (2011-07-13).
1526:"Trojan.Wsnpoem Technical Details"
1311:Symantec Marc Fossi (2008-01-23).
1264:Symantec Marc Fossi (2010-12-08).
171:can detect some of these methods.
14:
2259:Computer and network surveillance
1910:How safe is online banking? Audio
1738:Chickowski, Ericka (2010-10-05).
1000:Quarri Technologies, Inc (2011).
914:Transaction authentication number
610:**Torpig a.k.a. Sinowal, Anserin
116:A related, simpler attack is the
1717:Finextra Research (2008-11-13).
1638:Horowitz, Michael (2012-02-06).
1458:"The Mac OS X Virus That Wasn't"
948:"The Evolution of Proxy Trojans"
97:verification can be defeated by
16:Internet browser security threat
823:are the most primitive form of
1974:Comparison of computer viruses
1:
3729:Social engineering (security)
2213:Data loss prevention software
1814:Sartain, Julie (2012-02-07).
1477:Fisher, Dennis (2011-05-02).
1174:Curtis, Sophie (2012-01-18).
946:Bar-Yosef, Noa (2010-12-30).
1793:Balan, Mahesh (2009-10-14).
1694:10.1007/978-3-662-54970-4_24
1456:Borean, Wayne (2011-05-24).
199:Man-in-the-Browser examples
3724:Hacking (computer security)
1659:Purdy, Kevin (2009-10-14).
1153:Dunn, John E (2010-10-12).
1132:Dunn, John E (2010-07-03).
87:three-factor authentication
3755:
2233:Intrusion detection system
1528:. Symantec. Archived from
872:
834:
679:, or mobile OSes Android,
3678:
3602:Internet Explorer for Mac
3164:
3153:
2781:
2770:
2615:
2594:
2101:Privacy-invasive software
1313:"Banking with Confidence"
1290:Ted Samson (2011-02-22).
1044:10.1007/s10207-013-0208-7
667:or using alternatives to
619:
614:
609:
604:
545:widespread, low detection
408:widespread, low detection
1887:Man-In-The-Browser Video
1550:Microsoft (2010-04-30).
695:, etc., and/or browsers
2111:Rogue security software
1577:Trusteer (2009-09-14).
974:F-Secure (2007-02-11).
715:from their own machine.
346:keeps bank session open
2147:Classic Mac OS viruses
1989:List of computer worms
1835:Imperva (2010-02-14).
151:(a feature limited to
149:Browser Helper Objects
38:), a form of Internet
3739:Web security exploits
3719:Computing terminology
665:portable applications
3587:IBM Home Page Reader
2541:Operation: Bot Roast
2269:Operation: Bot Roast
1532:on February 23, 2010
1485:on September 5, 2011
2218:Defensive computing
2135:By operating system
1614:"Antisource - ZeuS"
1591:on November 6, 2011
802:Web fraud detection
500:IE, Firefox, Opera
200:
2531:Man-in-the-browser
2203:Antivirus software
2049:Malware for profit
2020:Man-in-the-browser
1967:Infectious malware
1341:"Trusteer Rapport"
855:boy-in-the-browser
849:Boy-in-the-browser
506:Weyland-Yutani BOT
458:Tiny Banker Trojan
198:
169:Antivirus software
157:browser extensions
118:boy-in-the-browser
20:Man-in-the-browser
3714:Computing culture
3701:
3700:
3674:
3673:
3670:
3669:
3357:Internet Explorer
3149:
3148:
3145:
3144:
2766:
2765:
2762:
2761:
2554:
2553:
2521:Internet security
2277:
2276:
2228:Internet security
2182:HyperCard viruses
2091:Keystroke logging
2081:Fraudulent dialer
2025:Man-in-the-middle
1880:Antisource - ZeuS
1703:978-3-662-54970-4
899:Threat (computer)
843:man-in-the-middle
837:Man-in-the-middle
831:Man-in-the-middle
764:man-in-the-mobile
752:Man-in-the-Mobile
732:, or a dedicated
669:Microsoft Windows
654:Microsoft Windows
643:Hardened software
624:
623:
555:
554:
189:operating systems
153:Internet Explorer
109:infection on the
99:man-in-the-mobile
44:man-in-the-middle
3746:
3166:
3155:
2881:Samsung Internet
2783:
2772:
2617:
2596:
2581:
2574:
2567:
2558:
2536:Network security
2501:Browser security
2304:
2297:
2290:
2281:
2243:Network security
2208:Browser security
1952:
1945:
1938:
1929:
1918:
1900:
1888:
1847:
1846:
1844:
1843:
1832:
1826:
1825:
1823:
1822:
1811:
1805:
1804:
1802:
1801:
1790:
1784:
1783:
1781:
1780:
1771:. Archived from
1764:
1755:
1754:
1752:
1751:
1742:. Archived from
1735:
1729:
1728:
1726:
1725:
1714:
1708:
1707:
1677:
1671:
1670:
1668:
1667:
1656:
1650:
1649:
1647:
1646:
1635:
1629:
1628:
1626:
1625:
1616:. Archived from
1609:
1600:
1599:
1597:
1596:
1590:
1584:. Archived from
1583:
1574:
1563:
1562:
1560:
1559:
1547:
1541:
1540:
1538:
1537:
1521:
1515:
1514:
1512:
1511:
1500:
1494:
1493:
1491:
1490:
1481:. Archived from
1474:
1468:
1467:
1465:
1464:
1453:
1444:
1443:
1441:
1440:
1425:
1419:
1418:
1416:
1415:
1404:
1398:
1397:
1395:
1394:
1383:
1377:
1376:
1374:
1373:
1364:. Archived from
1357:
1351:
1350:
1348:
1347:
1336:
1323:
1322:
1320:
1319:
1308:
1302:
1301:
1299:
1298:
1287:
1281:
1280:
1278:
1277:
1268:. Archived from
1261:
1250:
1249:
1243:
1235:
1233:
1232:
1221:
1210:
1209:
1207:
1206:
1195:
1186:
1185:
1183:
1182:
1171:
1165:
1164:
1162:
1161:
1150:
1144:
1143:
1141:
1140:
1129:
1123:
1122:
1120:
1119:
1114:
1105:
1096:
1095:
1093:
1092:
1086:
1079:
1070:
1064:
1063:
1029:
1021:
1015:
1014:
1012:
1011:
1006:
997:
986:
985:
983:
982:
971:
958:
957:
955:
954:
943:
557:
261:users redeeming
211:Operating system
201:
176:Internet banking
163:(for example in
59:browser security
3754:
3753:
3749:
3748:
3747:
3745:
3744:
3743:
3704:
3703:
3702:
3697:
3666:
3592:IBM WebExplorer
3505:
3401:
3342:
3218:
3160:
3141:
3090:
3046:
3012:
2930:
2777:
2758:
2708:
2641:
2611:
2590:
2585:
2555:
2550:
2489:
2318:Notable botnets
2313:
2308:
2278:
2273:
2252:Countermeasures
2247:
2238:Mobile security
2186:
2177:Palm OS viruses
2142:Android malware
2130:
2044:
2040:Zombie computer
1998:
1962:
1956:
1916:
1898:
1886:
1855:
1850:
1841:
1839:
1834:
1833:
1829:
1820:
1818:
1813:
1812:
1808:
1799:
1797:
1792:
1791:
1787:
1778:
1776:
1766:
1765:
1758:
1749:
1747:
1737:
1736:
1732:
1723:
1721:
1716:
1715:
1711:
1704:
1679:
1678:
1674:
1665:
1663:
1658:
1657:
1653:
1644:
1642:
1637:
1636:
1632:
1623:
1621:
1611:
1610:
1603:
1594:
1592:
1588:
1581:
1576:
1575:
1566:
1557:
1555:
1549:
1548:
1544:
1535:
1533:
1523:
1522:
1518:
1509:
1507:
1502:
1501:
1497:
1488:
1486:
1476:
1475:
1471:
1462:
1460:
1455:
1454:
1447:
1438:
1436:
1427:
1426:
1422:
1413:
1411:
1406:
1405:
1401:
1392:
1390:
1385:
1384:
1380:
1371:
1369:
1359:
1358:
1354:
1345:
1343:
1338:
1337:
1326:
1317:
1315:
1310:
1309:
1305:
1296:
1294:
1289:
1288:
1284:
1275:
1273:
1263:
1262:
1253:
1236:
1230:
1228:
1223:
1222:
1213:
1204:
1202:
1197:
1196:
1189:
1180:
1178:
1173:
1172:
1168:
1159:
1157:
1152:
1151:
1147:
1138:
1136:
1131:
1130:
1126:
1117:
1115:
1112:
1107:
1106:
1099:
1090:
1088:
1087:on July 6, 2011
1084:
1077:
1072:
1071:
1067:
1023:
1022:
1018:
1009:
1007:
1004:
999:
998:
989:
980:
978:
973:
972:
961:
952:
950:
945:
944:
931:
927:
885:
877:
871:
851:
839:
833:
818:
813:
811:Related attacks
804:
754:
722:
645:
636:
629:
185:
141:
67:web application
53:that infects a
17:
12:
11:
5:
3752:
3750:
3742:
3741:
3736:
3731:
3726:
3721:
3716:
3706:
3705:
3699:
3698:
3696:
3695:
3690:
3685:
3679:
3676:
3675:
3672:
3671:
3668:
3667:
3665:
3664:
3659:
3654:
3649:
3644:
3639:
3634:
3629:
3624:
3619:
3614:
3609:
3604:
3599:
3594:
3589:
3584:
3579:
3574:
3569:
3564:
3559:
3554:
3549:
3544:
3539:
3534:
3529:
3524:
3519:
3513:
3511:
3507:
3506:
3504:
3503:
3498:
3493:
3488:
3483:
3478:
3473:
3468:
3463:
3458:
3453:
3448:
3443:
3438:
3433:
3428:
3423:
3418:
3412:
3410:
3403:
3402:
3400:
3399:
3394:
3389:
3384:
3379:
3374:
3369:
3364:
3359:
3353:
3351:
3344:
3343:
3341:
3340:
3335:
3330:
3325:
3320:
3315:
3310:
3305:
3300:
3295:
3290:
3285:
3280:
3275:
3270:
3265:
3260:
3255:
3250:
3245:
3240:
3235:
3229:
3227:
3220:
3219:
3217:
3216:
3211:
3206:
3201:
3196:
3191:
3186:
3181:
3175:
3173:
3162:
3161:
3158:
3151:
3150:
3147:
3146:
3143:
3142:
3140:
3139:
3134:
3129:
3124:
3119:
3114:
3109:
3104:
3098:
3096:
3092:
3091:
3089:
3088:
3083:
3078:
3073:
3068:
3063:
3057:
3055:
3048:
3047:
3045:
3044:
3039:
3034:
3029:
3023:
3021:
3014:
3013:
3011:
3010:
3009:
3008:
3003:
2998:
2993:
2988:
2977:
2972:
2967:
2962:
2957:
2952:
2947:
2941:
2939:
2932:
2931:
2929:
2928:
2923:
2918:
2913:
2908:
2903:
2898:
2893:
2888:
2883:
2878:
2873:
2868:
2863:
2853:
2851:Microsoft Edge
2848:
2843:
2838:
2833:
2828:
2823:
2818:
2813:
2808:
2803:
2798:
2792:
2790:
2779:
2778:
2775:
2768:
2767:
2764:
2763:
2760:
2759:
2757:
2756:
2751:
2746:
2741:
2740:
2739:
2738:
2737:
2727:
2716:
2714:
2710:
2709:
2707:
2706:
2705:
2704:
2699:
2694:
2689:
2684:
2674:
2669:
2664:
2663:
2662:
2651:
2649:
2643:
2642:
2640:
2639:
2634:
2629:
2623:
2621:
2613:
2612:
2610:
2609:
2606:
2603:
2599:
2592:
2591:
2586:
2584:
2583:
2576:
2569:
2561:
2552:
2551:
2549:
2548:
2543:
2538:
2533:
2528:
2523:
2518:
2513:
2508:
2506:Computer virus
2503:
2497:
2495:
2491:
2490:
2488:
2487:
2482:
2477:
2472:
2467:
2462:
2457:
2452:
2447:
2442:
2437:
2432:
2427:
2422:
2417:
2412:
2407:
2402:
2397:
2392:
2387:
2382:
2377:
2372:
2367:
2362:
2357:
2352:
2347:
2342:
2337:
2332:
2327:
2321:
2319:
2315:
2314:
2309:
2307:
2306:
2299:
2292:
2284:
2275:
2274:
2272:
2271:
2266:
2261:
2255:
2253:
2249:
2248:
2246:
2245:
2240:
2235:
2230:
2225:
2220:
2215:
2210:
2205:
2200:
2198:Anti-keylogger
2194:
2192:
2188:
2187:
2185:
2184:
2179:
2174:
2172:Mobile malware
2169:
2164:
2159:
2154:
2149:
2144:
2138:
2136:
2132:
2131:
2129:
2128:
2123:
2118:
2113:
2108:
2103:
2098:
2093:
2088:
2083:
2078:
2073:
2068:
2063:
2058:
2052:
2050:
2046:
2045:
2043:
2042:
2037:
2032:
2027:
2022:
2017:
2012:
2006:
2004:
2000:
1999:
1997:
1996:
1991:
1986:
1981:
1979:Computer virus
1976:
1970:
1968:
1964:
1963:
1957:
1955:
1954:
1947:
1940:
1932:
1926:
1925:
1913:
1907:
1895:
1883:
1877:
1871:
1866:
1861:
1854:
1853:External links
1851:
1849:
1848:
1827:
1806:
1785:
1756:
1730:
1709:
1702:
1672:
1651:
1630:
1601:
1564:
1542:
1516:
1495:
1469:
1445:
1420:
1399:
1378:
1352:
1324:
1303:
1282:
1251:
1211:
1187:
1166:
1145:
1124:
1097:
1065:
1038:(2): 113–170.
1016:
987:
959:
928:
926:
923:
922:
921:
916:
911:
909:Security token
906:
901:
896:
891:
884:
881:
873:Main article:
870:
867:
850:
847:
835:Main article:
832:
829:
817:
814:
812:
809:
803:
800:
799:
798:
795:
780:Windows Mobile
753:
750:
721:
718:
717:
716:
712:
689:Windows Mobile
661:
644:
641:
635:
630:
628:
625:
622:
621:
617:
616:
612:
611:
607:
606:
602:
601:
595:
589:
572:
563:
553:
552:
549:
546:
543:
536:
535:
532:
529:
527:
521:
520:
517:
514:
508:
502:
501:
498:
495:
493:
486:
485:
482:
479:
477:
470:
469:
466:
463:
460:
454:
453:
427:
424:
422:
416:
415:
412:
409:
406:
400:
399:
396:
393:
390:
384:
383:
380:
377:
375:
369:
368:
365:
362:
360:
354:
353:
350:
347:
344:
338:
337:
334:
331:
329:
323:
322:
319:
316:
314:
308:
307:
304:
301:
299:
293:
292:
289:
286:
280:
273:
272:
269:
266:
255:
249:
248:
245:
242:
240:
234:
233:
230:
227:
225:
219:
218:
213:
208:
205:
184:
181:
140:
137:
133:online banking
15:
13:
10:
9:
6:
4:
3:
2:
3751:
3740:
3737:
3735:
3734:Trojan horses
3732:
3730:
3727:
3725:
3722:
3720:
3717:
3715:
3712:
3711:
3709:
3694:
3691:
3689:
3686:
3684:
3681:
3680:
3677:
3663:
3660:
3658:
3655:
3653:
3650:
3648:
3645:
3643:
3640:
3638:
3635:
3633:
3630:
3628:
3625:
3623:
3620:
3618:
3615:
3613:
3610:
3608:
3605:
3603:
3600:
3598:
3595:
3593:
3590:
3588:
3585:
3583:
3580:
3578:
3575:
3573:
3570:
3568:
3565:
3563:
3560:
3558:
3555:
3553:
3550:
3548:
3545:
3543:
3540:
3538:
3535:
3533:
3530:
3528:
3525:
3523:
3520:
3518:
3515:
3514:
3512:
3508:
3502:
3499:
3497:
3494:
3492:
3489:
3487:
3484:
3482:
3479:
3477:
3474:
3472:
3469:
3467:
3464:
3462:
3459:
3457:
3454:
3452:
3451:Nokia Symbian
3449:
3447:
3444:
3442:
3439:
3437:
3434:
3432:
3429:
3427:
3424:
3422:
3419:
3417:
3414:
3413:
3411:
3408:
3404:
3398:
3395:
3393:
3390:
3388:
3385:
3383:
3380:
3378:
3375:
3373:
3370:
3368:
3365:
3363:
3360:
3358:
3355:
3354:
3352:
3349:
3345:
3339:
3336:
3334:
3331:
3329:
3326:
3324:
3321:
3319:
3316:
3314:
3311:
3309:
3306:
3304:
3303:PirateBrowser
3301:
3299:
3298:Mozilla suite
3296:
3294:
3291:
3289:
3286:
3284:
3281:
3279:
3276:
3274:
3271:
3269:
3266:
3264:
3261:
3259:
3256:
3254:
3251:
3249:
3246:
3244:
3241:
3239:
3236:
3234:
3231:
3230:
3228:
3225:
3221:
3215:
3212:
3210:
3207:
3205:
3202:
3200:
3197:
3195:
3192:
3190:
3187:
3185:
3182:
3180:
3177:
3176:
3174:
3171:
3167:
3163:
3156:
3152:
3138:
3135:
3133:
3130:
3128:
3125:
3123:
3120:
3118:
3115:
3113:
3110:
3108:
3105:
3103:
3100:
3099:
3097:
3093:
3087:
3084:
3082:
3079:
3077:
3074:
3072:
3069:
3067:
3064:
3062:
3059:
3058:
3056:
3054:
3049:
3043:
3040:
3038:
3035:
3033:
3030:
3028:
3025:
3024:
3022:
3019:
3015:
3007:
3004:
3002:
2999:
2997:
2994:
2992:
2989:
2987:
2984:
2983:
2982:
2978:
2976:
2973:
2971:
2968:
2966:
2963:
2961:
2958:
2956:
2953:
2951:
2948:
2946:
2943:
2942:
2940:
2937:
2933:
2927:
2924:
2922:
2919:
2917:
2914:
2912:
2909:
2907:
2904:
2902:
2899:
2897:
2894:
2892:
2889:
2887:
2884:
2882:
2879:
2877:
2874:
2872:
2869:
2867:
2864:
2861:
2857:
2854:
2852:
2849:
2847:
2844:
2842:
2839:
2837:
2834:
2832:
2829:
2827:
2824:
2822:
2819:
2817:
2814:
2812:
2809:
2807:
2804:
2802:
2799:
2797:
2796:Google Chrome
2794:
2793:
2791:
2788:
2784:
2780:
2773:
2769:
2755:
2752:
2750:
2747:
2745:
2742:
2736:
2733:
2732:
2731:
2728:
2726:
2723:
2722:
2721:
2718:
2717:
2715:
2711:
2703:
2700:
2698:
2695:
2693:
2690:
2688:
2685:
2683:
2680:
2679:
2678:
2675:
2673:
2670:
2668:
2665:
2661:
2658:
2657:
2656:
2653:
2652:
2650:
2648:
2647:Web standards
2644:
2638:
2635:
2633:
2630:
2628:
2625:
2624:
2622:
2618:
2614:
2607:
2604:
2601:
2600:
2597:
2593:
2589:
2582:
2577:
2575:
2570:
2568:
2563:
2562:
2559:
2547:
2544:
2542:
2539:
2537:
2534:
2532:
2529:
2527:
2524:
2522:
2519:
2517:
2514:
2512:
2511:Computer worm
2509:
2507:
2504:
2502:
2499:
2498:
2496:
2494:Main articles
2492:
2486:
2483:
2481:
2478:
2476:
2473:
2471:
2468:
2466:
2463:
2461:
2458:
2456:
2453:
2451:
2448:
2446:
2443:
2441:
2438:
2436:
2433:
2431:
2428:
2426:
2423:
2421:
2418:
2416:
2413:
2411:
2408:
2406:
2403:
2401:
2398:
2396:
2393:
2391:
2388:
2386:
2383:
2381:
2378:
2376:
2373:
2371:
2368:
2366:
2363:
2361:
2358:
2356:
2353:
2351:
2348:
2346:
2343:
2341:
2338:
2336:
2333:
2331:
2328:
2326:
2323:
2322:
2320:
2316:
2312:
2305:
2300:
2298:
2293:
2291:
2286:
2285:
2282:
2270:
2267:
2265:
2262:
2260:
2257:
2256:
2254:
2250:
2244:
2241:
2239:
2236:
2234:
2231:
2229:
2226:
2224:
2221:
2219:
2216:
2214:
2211:
2209:
2206:
2204:
2201:
2199:
2196:
2195:
2193:
2189:
2183:
2180:
2178:
2175:
2173:
2170:
2168:
2165:
2163:
2162:MacOS malware
2160:
2158:
2157:Linux malware
2155:
2153:
2150:
2148:
2145:
2143:
2140:
2139:
2137:
2133:
2127:
2124:
2122:
2119:
2117:
2114:
2112:
2109:
2107:
2104:
2102:
2099:
2097:
2094:
2092:
2089:
2087:
2084:
2082:
2079:
2077:
2076:Form grabbing
2074:
2072:
2069:
2067:
2064:
2062:
2059:
2057:
2054:
2053:
2051:
2047:
2041:
2038:
2036:
2033:
2031:
2028:
2026:
2023:
2021:
2018:
2016:
2013:
2011:
2008:
2007:
2005:
2001:
1995:
1992:
1990:
1987:
1985:
1984:Computer worm
1982:
1980:
1977:
1975:
1972:
1971:
1969:
1965:
1960:
1953:
1948:
1946:
1941:
1939:
1934:
1933:
1930:
1923:
1919:
1914:
1911:
1908:
1905:
1901:
1896:
1893:
1889:
1884:
1881:
1878:
1875:
1872:
1870:
1867:
1865:
1862:
1860:
1857:
1856:
1852:
1838:
1831:
1828:
1817:
1810:
1807:
1796:
1789:
1786:
1775:on 2012-07-06
1774:
1770:
1763:
1761:
1757:
1746:on 2012-03-01
1745:
1741:
1734:
1731:
1720:
1713:
1710:
1705:
1699:
1695:
1691:
1687:
1683:
1676:
1673:
1662:
1655:
1652:
1641:
1634:
1631:
1620:on 2012-01-20
1619:
1615:
1608:
1606:
1602:
1587:
1580:
1573:
1571:
1569:
1565:
1553:
1546:
1543:
1531:
1527:
1520:
1517:
1506:
1499:
1496:
1484:
1480:
1473:
1470:
1459:
1452:
1450:
1446:
1435:. 31 May 2012
1434:
1430:
1424:
1421:
1410:
1403:
1400:
1389:
1382:
1379:
1368:on 2011-12-08
1367:
1363:
1356:
1353:
1342:
1335:
1333:
1331:
1329:
1325:
1314:
1307:
1304:
1293:
1286:
1283:
1272:on 2011-08-08
1271:
1267:
1260:
1258:
1256:
1252:
1247:
1241:
1227:
1220:
1218:
1216:
1212:
1201:
1194:
1192:
1188:
1177:
1170:
1167:
1156:
1149:
1146:
1135:
1128:
1125:
1111:
1104:
1102:
1098:
1083:
1076:
1069:
1066:
1061:
1057:
1053:
1049:
1045:
1041:
1037:
1033:
1028:
1020:
1017:
1003:
996:
994:
992:
988:
977:
970:
968:
966:
964:
960:
949:
942:
940:
938:
936:
934:
930:
924:
920:
919:DNS hijacking
917:
915:
912:
910:
907:
905:
902:
900:
897:
895:
892:
890:
889:Form grabbing
887:
886:
882:
880:
876:
868:
866:
864:
860:
856:
848:
846:
844:
838:
830:
828:
826:
825:proxy trojans
822:
816:Proxy trojans
815:
810:
808:
801:
796:
793:
789:
785:
781:
777:
773:
772:
771:
769:
765:
761:
760:mobile Trojan
758:
751:
749:
747:
743:
739:
735:
731:
727:
719:
713:
710:
706:
702:
698:
694:
690:
686:
682:
678:
674:
670:
666:
662:
659:
655:
651:
647:
646:
642:
640:
634:
631:
626:
618:
613:
608:
603:
599:
596:
593:
590:
588:
584:
580:
576:
573:
571:
567:
564:
562:
559:
558:
550:
547:
544:
541:
538:
537:
533:
530:
528:
526:
523:
522:
518:
515:
512:
509:
507:
504:
503:
499:
496:
494:
491:
488:
487:
483:
480:
478:
475:
472:
471:
467:
464:
461:
459:
456:
455:
452:
448:
444:
440:
436:
432:
429:IE, Firefox,
428:
425:
423:
421:
418:
417:
413:
410:
407:
405:
402:
401:
397:
394:
391:
389:
386:
385:
381:
378:
376:
374:
371:
370:
366:
363:
361:
359:
356:
355:
351:
348:
345:
343:
340:
339:
335:
332:
330:
328:
325:
324:
320:
317:
315:
313:
310:
309:
305:
302:
300:
298:
295:
294:
290:
287:
284:
281:
278:
275:
274:
270:
267:
264:
260:
256:
254:
251:
250:
246:
243:
241:
239:
236:
235:
231:
228:
226:
224:
221:
220:
217:
214:
212:
209:
206:
203:
202:
196:
194:
190:
182:
180:
177:
172:
170:
166:
162:
158:
154:
150:
145:
138:
136:
134:
129:
127:
123:
119:
114:
112:
108:
104:
100:
96:
92:
88:
84:
80:
76:
72:
68:
64:
60:
56:
52:
49:
46:(MITM), is a
45:
41:
37:
33:
29:
25:
21:
3662:WorldWideWeb
3377:MediaBrowser
3372:GreenBrowser
3253:Firefox Lite
3159:Discontinued
2637:Privacy mode
2588:Web browsers
2546:Trojan horse
2530:
2035:Trojan horse
2019:
2015:Clickjacking
1840:. Retrieved
1830:
1819:. Retrieved
1809:
1798:. Retrieved
1788:
1777:. Retrieved
1773:the original
1748:. Retrieved
1744:the original
1733:
1722:. Retrieved
1712:
1685:
1675:
1664:. Retrieved
1654:
1643:. Retrieved
1633:
1622:. Retrieved
1618:the original
1593:. Retrieved
1586:the original
1556:. Retrieved
1545:
1534:. Retrieved
1530:the original
1519:
1508:. Retrieved
1498:
1487:. Retrieved
1483:the original
1472:
1461:. Retrieved
1437:. Retrieved
1432:
1423:
1412:. Retrieved
1402:
1391:. Retrieved
1381:
1370:. Retrieved
1366:the original
1355:
1344:. Retrieved
1316:. Retrieved
1306:
1295:. Retrieved
1285:
1274:. Retrieved
1270:the original
1229:. Retrieved
1203:. Retrieved
1179:. Retrieved
1169:
1158:. Retrieved
1148:
1137:. Retrieved
1127:
1116:. Retrieved
1089:. Retrieved
1082:the original
1068:
1035:
1031:
1019:
1008:. Retrieved
979:. Retrieved
951:. Retrieved
878:
875:Clickjacking
869:Clickjacking
862:
858:
854:
852:
840:
824:
819:
805:
767:
763:
757:Mobile phone
755:
742:mobile phone
723:
652:Rapport for
637:
560:
551:IE, Firefox
524:
489:
484:IE, Firefox
468:IE, Firefox
457:
414:IE, Firefox
403:
398:IE, Firefox
372:
367:IE, Firefox
358:Silentbanker
357:
352:IE, Firefox
341:
326:
321:IE, Firefox
311:
285:impersonator
283:Greasemonkey
277:ChromeInject
276:
271:IE, Firefox
252:
247:IE, Firefox
237:
232:IE, Firefox
222:
193:web browsers
186:
173:
161:user scripts
146:
142:
130:
125:
121:
117:
115:
111:mobile phone
102:
98:
51:Trojan horse
35:
31:
27:
23:
19:
18:
3688:Comparisons
3647:ThunderHawk
3627:NetPositive
3567:Edge Legacy
3496:WebPositive
3461:Opera Coast
3323:Swiftweasel
3086:qutebrowser
2975:Tor Browser
2970:SlimBrowser
2735:third-party
2687:Web storage
2682:WebAssembly
2167:Macro virus
2152:iOS malware
2126:Web threats
2086:Infostealer
2003:Concealment
726:out-of-band
139:Description
91:out-of-band
55:web browser
42:related to
3708:Categories
3333:Timberwolf
3328:TenFourFox
3273:Kazehakase
3263:Ghostzilla
3132:Opera Mini
3066:DuckDuckGo
2955:GNU IceCat
2725:Encryption
2677:JavaScript
2632:Extensions
2480:ZeroAccess
2191:Protection
2106:Ransomware
2071:Fleeceware
1842:2015-03-12
1821:2012-02-08
1800:2012-02-05
1779:2012-02-04
1750:2012-02-09
1724:2012-02-08
1666:2012-02-04
1645:2012-02-08
1624:2012-02-05
1595:2012-02-05
1558:2012-02-05
1554:. Symantec
1536:2012-02-05
1510:2012-02-05
1503:F-secure.
1489:2012-02-03
1463:2012-02-08
1439:2016-02-28
1414:2012-02-03
1393:2012-02-06
1372:2012-02-03
1346:2012-02-03
1339:Trusteer.
1318:2008-07-30
1297:2012-02-06
1276:2012-02-03
1231:2012-02-03
1205:2012-02-05
1181:2012-02-03
1160:2012-02-03
1139:2012-02-08
1118:2008-07-30
1091:2009-06-12
1010:2012-02-05
981:2012-02-03
953:2012-02-03
925:References
821:Keyloggers
792:BlackBerry
746:biometrics
734:mobile app
627:Protection
223:Agent.DBJP
165:JavaScript
61:to modify
3612:Line Mode
3436:Google TV
3392:SpaceTime
3387:NetCaptor
3382:NeoPlanet
3268:IceDragon
3243:Classilla
3076:Lunascape
3071:Konqueror
3032:GNOME Web
3001:SeaMonkey
2996:Pale Moon
2960:LibreWolf
2911:ungoogled
2901:Supermium
2754:WebSocket
2713:Protocols
2692:IndexedDB
2627:Bookmarks
2608:protocols
2605:standards
2470:Vulcanbot
2360:Conficker
2116:Scareware
2066:Crimeware
1912:BBC Click
1876:BBC Click
1433:msnbc.com
1052:1615-5270
633:Antivirus
511:crimeware
451:Konqueror
69:. A MitB
63:web pages
3683:Category
3637:Skweezer
3632:Netscape
3557:Deepfish
3501:xombrero
3318:Swiftfox
3248:Conkeror
3204:SalamWeb
3199:Rockmelt
3112:Ladybird
3081:NetFront
3006:Waterfox
2991:K-Meleon
2986:Basilisk
2891:Sleipnir
2801:Chromium
2620:Features
2602:Features
2440:Slenfbot
2405:Mariposa
2390:Koobface
2350:Bredolab
2345:BASHLITE
2264:Honeypot
2223:Firewall
2010:Backdoor
1240:cite web
883:See also
762:spyware
738:landline
709:Live USB
685:ChromeOS
673:Mac OS X
658:Mac OS X
650:Trusteer
598:Mac OS X
519:Firefox
516:Mac OS X
447:Netscape
291:Firefox
265:vouchers
259:Facebook
257:targets
183:Examples
3642:Skyfire
3597:IBrowse
3582:HotJava
3577:Gazelle
3527:Arachne
3456:OmniWeb
3446:Mercury
3426:Dolphin
3367:Deepnet
3209:Sputnik
3194:Redcore
3127:NetSurf
2945:Firefox
2916:Vivaldi
2871:Puffin
2846:Maxthon
2821:Coc Coc
2730:Cookies
2526:Malware
2475:Waledac
2430:Rustock
2420:Metulji
2385:Kelihos
2380:Gumblar
2355:Cutwail
2311:Botnets
2121:Spyware
2030:Rootkit
1959:Malware
1924:Imperva
1922:YouTube
1904:YouTube
1892:YouTube
1060:3330144
894:IT risk
788:Symbian
784:Android
776:malware
705:live CD
693:Symbian
594:: other
592:Windows
587:Firefox
583:Firefox
575:Windows
566:Windows
548:Windows
531:Windows
525:Yaludle
497:Windows
490:URLZone
481:Windows
465:Windows
443:Maxthon
426:Windows
420:Tatanga
411:Windows
404:Sunspot
395:Windows
379:Windows
364:Windows
349:Windows
333:Windows
318:Windows
303:Windows
288:Windows
268:Windows
253:Carberp
244:Windows
229:Windows
216:Browser
207:Details
107:malware
81:and/or
3657:WinWAP
3652:Vision
3622:MSN TV
3617:Mosaic
3607:KidZui
3572:ELinks
3547:Charon
3537:Blazer
3476:Shiira
3466:Origyn
3409:-based
3407:WebKit
3350:-based
3348:MSHTML
3313:Strata
3293:Minimo
3288:MicroB
3258:Galeon
3238:Camino
3233:Beonex
3226:-based
3184:Citrio
3179:Beaker
3172:-based
3053:engine
3051:Multi-
3027:Safari
3020:-based
3018:WebKit
2979:Gecko
2965:Midori
2950:Floorp
2938:-based
2926:Yandex
2896:SRWare
2860:Mobile
2841:Falkon
2831:Dooble
2826:Comodo
2789:-based
2776:Active
2749:WebRTC
2702:WebGPU
2516:Malbot
2460:Torpig
2445:Srizbi
2435:Sality
2410:Mega-D
2400:Lethic
2395:Kraken
2365:Donbot
2335:Asprox
2096:Malbot
2061:Botnet
2056:Adware
1961:topics
1700:
1058:
1050:
790:, and
697:Chrome
600:: any
581:&
474:Torpig
439:Safari
431:Chrome
388:SpyEye
342:OddJob
327:Nuklus
297:Clampi
263:e-cash
71:attack
40:threat
3562:Dillo
3532:Arena
3522:Amaya
3517:abaco
3510:Other
3481:Steel
3471:QtWeb
3431:Fluid
3416:Arora
3283:Lotus
3224:Gecko
3214:Torch
3189:Flock
3170:Blink
3117:Links
3095:Other
3042:Orion
2981:forks
2936:Gecko
2921:Whale
2866:Otter
2856:Opera
2816:Brave
2811:Avast
2787:Blink
2697:WebGL
2465:Virut
2455:TDL-4
2450:Storm
2425:Nitol
2415:Mirai
2370:Festi
2340:Bagle
2330:Akbot
1589:(PDF)
1582:(PDF)
1113:(PDF)
1085:(PDF)
1078:(PDF)
1056:S2CID
1005:(PDF)
768:MitMo
707:, or
701:Opera
677:Linux
671:like
435:Opera
373:Silon
238:Bugat
103:MitMo
48:proxy
3693:List
3542:Cake
3491:Uzbl
3486:surf
3441:Iris
3421:BOLT
3308:Pogo
3278:Kylo
3122:Lynx
3107:Flow
3037:iCab
2886:Silk
2836:Epic
2744:OCSP
2720:HTTP
2655:HTML
2485:Zeus
2375:Grum
1698:ISBN
1246:link
1048:ISSN
863:BITB
859:BitB
656:and
540:Zeus
492:****
312:Gozi
204:Name
191:and
159:and
126:BITB
122:BitB
83:two-
28:MitB
24:MITB
3397:ZAC
3362:AOL
3137:w3m
3102:eww
3061:360
2806:Arc
2672:DOM
2667:CSS
2325:3ve
1920:on
1902:on
1890:on
1690:doi
1040:doi
861:or
730:SMS
699:or
681:iOS
585:or
561:Key
542:***
534:IE
441:,
382:IE
336:IE
306:IE
167:).
155:),
128:).
95:SMS
85:or
79:PKI
75:SSL
36:MiB
32:MIB
3710::
3552:CM
3338:xB
2906:UC
2876:QQ
2660:v5
1759:^
1696:.
1604:^
1567:^
1448:^
1431:.
1327:^
1254:^
1242:}}
1238:{{
1214:^
1190:^
1100:^
1054:.
1046:.
1036:13
1034:.
1030:.
990:^
962:^
932:^
786:,
782:,
740:,
691:,
687:,
683:,
675:,
579:IE
577::
570:IE
568::
476:**
449:,
445:,
437:,
433:,
195::
135:.
124:,
105:)
34:,
30:,
26:,
2862:)
2858:(
2580:e
2573:t
2566:v
2303:e
2296:t
2289:v
1951:e
1944:t
1937:v
1845:.
1824:.
1803:.
1782:.
1753:.
1727:.
1706:.
1692::
1669:.
1648:.
1627:.
1598:.
1561:.
1539:.
1513:.
1492:.
1466:.
1442:.
1417:.
1396:.
1375:.
1349:.
1321:.
1300:.
1279:.
1248:)
1234:.
1208:.
1184:.
1163:.
1142:.
1121:.
1094:.
1062:.
1042::
1013:.
984:.
956:.
857:(
766:(
711:.
279:*
120:(
101:(
77:/
22:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.