189:
funds transfer, the customer will always be shown, via confirmation screens, the exact payment information as keyed into the browser. The bank, however, will receive a transaction with materially altered instructions, i.e. a different destination account number and possibly amount. The use of strong
649:
Known
Trojans may be detected, blocked, and removed by antivirus software. In a 2009 study, the effectiveness of antivirus against Zeus was 23%, and again low success rates were reported in a separate test in 2011. The 2011 report concluded that additional measures on top of antivirus were needed.
725:
Secure Web
Browser: Several vendors can now provide a two-factor security solution where a Secure Web Browser is part of the solution. In this case, MitB attacks are avoided, as the user executes a hardened browser from their two-factor security device rather than executing the "infected" browser
190:
authentication tools simply creates an increased level of misplaced confidence on the part of both customer and bank that the transaction is secure. Authentication, by definition, is concerned with the validation of identity credentials. This should not be confused with transaction verification.
1323:
1750:
739:(OOB) transaction verification process. This overcomes the MitB trojan by verifying the transaction details, as received by the host (bank), to the user (customer) over a channel other than the browser; for example, an automated telephone call,
154:
The MitB threat was demonstrated by
Augusto Paes de Barros in his 2005 presentation about backdoor trends "The future of backdoors - worst of all worlds." The name "man-in-the-browser" was coined by Philipp Gühring on 27 January 2007.
817:
Web fraud detection can be implemented at the bank to automatically check for anomalous behaviour patterns in transactions. TLS Negotiation failed: FAILED_PRECONDITION: starttls error (71): 126011017202752:error:1000012e:SSL
876:). Malware is used to change the client's computer network routing to perform a classic man-in-the-middle attack. Once the routing has been changed, the malware may completely remove itself, making detection more difficult.
759:), transaction signing (to non-repudiation level), and transaction verification. The downside is that the OOB transaction verification adds to the level of the end-user's frustration with more and slower steps.
1754:
789:
suggested for installation on a mobile phone by a Zeus-infected computer. By intercepting all incoming SMSes, it defeats SMS-based banking OOB two-factor authentication on
1536:
1256:
1372:
124:. Trojans may be detected and removed by antivirus software, but a 2011 report concluded that additional measures on top of antivirus software were needed.
2152:
1489:
890:
Clickjacking tricks a web browser user into clicking on something different from what the user perceives, by means of malicious code in the webpage.
747:
with graphical cryptogram. OOB transaction verification is ideal for mass market use since it leverages devices already in the public domain (e.g.
1826:
3739:
2589:
2004:
914:
1712:
1091:(in Portuguese). Sao Paulo, Brazil: Congresso Nacional de Auditoria de Sistemas, Segurança da Informação e Governança - CNASI. Archived from
1302:
785:
ZitMo (Zeus-In-The-Mobile) is not a MitB Trojan itself (although it performs a similar proxy function on the incoming SMSes), but is mobile
3734:
1779:
1276:
1890:
1624:
1186:
2754:
2312:
2269:
1960:
924:
631:****URLZone a.k.a. Bebloh!IK, Runner.82176, Monder, ANBR, Sipay.IU, Runner.fq, PWS.y!cy, Zbot.gen20, Runner.J, BredoPk-B, Runner.EQ
1650:
1589:
1165:
2157:
1540:
3749:
3729:
1984:
1562:
76:, modify transaction content or insert additional transactions, all in a covert fashion invisible to both the user and host
3446:
2223:
1085:
1144:
3567:
2991:
97:
3724:
3698:
3076:
2582:
2243:
1932:
1914:
1902:
1869:
1419:
1035:
Fernandes, Diogo A. B.; Soares, Liliana F. B.; Gomes, João V.; Freire, Mário M.; Inácio, Pedro R. M. (2014-04-01).
794:
838:, followed by browser-session recorders that capture more data, and lastly MitBs are the most sophisticated type.
3612:
3461:
3308:
2111:
1376:
93:
89:
3343:
2556:
2045:
2035:
61:
1210:
142:
The majority of financial service professionals in a 2014 survey considered MitB to be the greatest threat to
3219:
2121:
430:
1847:
1671:
659:
Browser security software: MitB attacks may be blocked by in-browser security software such as
Cymatic.io,
3744:
3642:
3180:
3122:
2996:
2901:
2811:
2797:
2172:
1999:
1493:
755:, etc.) and requires no additional hardware devices, yet enables three-factor authentication (using voice
1874:
818:
routines:OPENSSL_internal:KEY_USAGE_BIT_INCORRECT:third_party/openssl/boringssl/src/ssl/ssl_cert.cc:431:
3693:
3662:
3587:
3577:
3537:
2926:
2682:
2575:
2350:
2305:
1953:
1236:
616:*ChromeInject a.k.a. ChromeInject.A, ChromeInject.B, Banker.IVX, Inject.NBT, Bancos-BEX, Drop.Small.abw
516:
159:
1879:
714:. Further protection can be achieved by running this alternative OS, like Linux, from a non-installed
3703:
3627:
3597:
3557:
3547:
3402:
3248:
3189:
3052:
3037:
2975:
2821:
2702:
2551:
2279:
2274:
2233:
2162:
2020:
1699:. Lecture Notes in Computer Science. Vol. 9603. Berlin, Heidelberg: Springer. pp. 405–421.
675:
85:
1468:
3542:
3527:
3491:
3441:
3426:
3243:
3224:
3199:
3127:
2866:
2826:
2745:
2228:
550:
1120:
3532:
3496:
3476:
3431:
3358:
3293:
3288:
3132:
3117:
3071:
2921:
2846:
2637:
2213:
2050:
1920:
1692:
1563:"Encyclopedia entry: Win32/Zbot - Learn more about malware - Microsoft Malware Protection Center"
1235:
Nattakant
Utakrit, School of Computer and Security Science, Edith Cowan University (2011-02-25).
1066:
457:
179:
171:
81:
1783:
1280:
1237:"Review of Browser Extensions, a Man-in-theBrowser Phishing Techniques Targeting Bank Customers"
986:
158:
A MitB Trojan works by using common facilities provided to enhance browser capabilities such as
1729:
3652:
3622:
3367:
3112:
2816:
2642:
2531:
2490:
2238:
2192:
2101:
1708:
1250:
1058:
909:
853:
847:
679:
664:
602:
589:
585:
580:
576:
167:
163:
54:
50:
3377:
3278:
3234:
2946:
2891:
2831:
2647:
2546:
2511:
2298:
2253:
2218:
1946:
1700:
1628:
1515:
1050:
736:
449:
221:
199:
186:
101:
69:
3602:
3456:
3436:
2425:
2415:
2360:
2248:
2187:
711:
445:
77:
1806:"Internet Banking & Mobile Banking users beware – ZITMO & SPITMO is here !!"
3063:
2936:
2881:
2861:
2516:
2495:
2485:
2440:
2430:
2395:
2365:
2208:
2182:
1989:
1596:
1398:
919:
790:
699:
143:
958:
17:
3718:
3313:
2876:
2836:
2806:
2657:
2521:
2455:
2420:
2410:
2405:
2375:
2345:
2167:
2086:
1994:
929:
899:
864:
A related attack that is simpler and quicker for malware authors to set up is termed
707:
674:
Alternative software: Reducing or eliminating the risk of malware infection by using
441:
3672:
3552:
3451:
3387:
3382:
3372:
3323:
3263:
2870:
2526:
2460:
2435:
2380:
2106:
2025:
1351:
1070:
1012:
885:
770:
767:
752:
293:
121:
117:
58:
3318:
1884:
1704:
3657:
3637:
3506:
3471:
3407:
3333:
3096:
2985:
2980:
2931:
2906:
2896:
2740:
2697:
2692:
2598:
2385:
2177:
2096:
1751:"'Man In The Mobile' Attacks Highlight Weaknesses In Out-Of-Band Authentication"
226:
203:
65:
1693:"How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication"
1092:
3562:
3348:
3338:
3283:
3273:
3142:
2965:
2916:
2886:
2687:
2136:
2116:
2081:
1926:
1908:
1896:
1277:"ZeuS-style banking Trojans seen as greatest threat to online banking: Survey"
1054:
831:
802:
756:
744:
175:
1062:
3397:
3392:
3253:
3086:
3081:
3042:
3011:
3006:
2970:
2911:
2764:
2480:
2370:
2126:
2076:
1037:
735:
A theoretically effective method of combating any MitB attack is through an
643:
521:
461:
73:
1730:"Commerzbank to deploy Cronto mobile phone-based authentication technology"
671:, which blocks the APIs from browser extensions and controls communication.
1439:
3647:
3511:
3328:
3258:
3214:
3209:
3091:
3016:
3001:
2450:
2400:
2355:
748:
719:
695:
683:
668:
660:
608:
269:
3607:
3592:
3466:
3204:
3137:
2955:
2856:
2536:
2390:
2131:
2040:
1969:
904:
798:
786:
715:
703:
597:
593:
453:
84:
will be successful irrespective of whether security mechanisms such as
3667:
3632:
3617:
3582:
3486:
3417:
3303:
3298:
3268:
3194:
3028:
2960:
2851:
2841:
2759:
2712:
2470:
2445:
2321:
2091:
2071:
2066:
1827:"How to protect online transactions with multi-factor authentication"
1691:
Konoth, Radhesh
Krishnan; van der Veen, Victor; Bos, Herbert (2017).
484:
398:
307:
273:
1805:
1590:"Measuring the in-the-wild effectiveness of Antivirus against Zeus"
1303:"Crafty OddJob malware leaves online bank accounts open to plunder"
3572:
3481:
2735:
2707:
2670:
2475:
2465:
2340:
805:. ZitMo may be detected by Antivirus running on the mobile device.
687:
1938:
856:
attack, but offers no protection in a man-in-the-browser attack.
185:
In a nutshell example exchange between user and host, such as an
3501:
3047:
2730:
2665:
1893:
A summary of ZeuS as a Trojan and Botnet, plus vector of attacks
100:
solutions are in place. A MitB attack may be countered by using
3168:
2785:
2609:
2571:
2567:
2294:
1942:
3147:
2677:
2335:
1187:"Facebook users targeted in Carberp man-in-the-browser attack"
740:
691:
626:***Zeus a.k.a. ZeuS, Zbot, Wsnpoem, NTOS, PRG, Kneber, Gorhax
105:
1651:"Online banking: what the BBC missed and a safety suggestion"
2290:
1013:"Web Browsers: Your Weak Link in Achieving PCI Compliance"
808:
SpitMo (SpyEye-In-The-Mobile, SPITMO) is similar to ZitMo.
1885:
Hackers outwit online banking identity security systems
1166:"Zeus not the only bank Trojan threat, users warned"
3520:
3416:
3357:
3233:
3179:
3105:
3061:
3027:
2945:
2796:
2723:
2656:
2630:
2504:
2328:
2262:
2201:
2145:
2059:
2013:
1977:
1420:"Tatanga: a new banking trojan with MitB functions"
1373:"Man-in-the-Browser attacks target the enterprise"
1345:
1343:
1341:
1339:
1036:
1870:Virus attack on HSBC Transactions with OTP Device
1418:Jozsef Gegeny; Jose Miguel Esparza (2011-02-25).
1038:"Security issues in cloud environments: a survey"
473:Smallest banking Trojan detected in wild at 20KB
1583:
1581:
1579:
1462:
1460:
1270:
1268:
1266:
781:) can defeat OOB SMS transaction verification.
1204:
1202:
952:
950:
948:
946:
944:
2583:
2306:
1954:
1695:. In Grossklags, Jens; Preneel, Bart (eds.).
1618:
1616:
1399:"Explosive financial malware targets Windows"
1371:CEO of Trusteer Mickey Boodaei (2011-03-31).
1145:"Trojan Writers Target UK Banks With Botnets"
1121:"Concepts against Man-in-the-Browser Attacks"
1084:Paes de Barros, Augusto (15 September 2005).
1043:International Journal of Information Security
987:"Threat Description: Trojan-Spy:W32/Nuklus.A"
8:
1917:The Zeus toolkit, Symantec Security Response
1672:"Use a Linux Live CD/USB for Online Banking"
1440:"Tiny 'Tinba' Banking Trojan Is Big Trouble"
1255:: CS1 maint: multiple names: authors list (
1114:
1112:
1086:"O futuro dos backdoors - o pior dos mundos"
403:successor of Zeus, widespread, low detection
1773:
1771:
3176:
3165:
2793:
2782:
2627:
2606:
2590:
2576:
2568:
2313:
2299:
2291:
1961:
1947:
1939:
1230:
1228:
1226:
208:
68:by taking advantage of vulnerabilities in
1780:"Zeus Banking Trojan Hits Android Phones"
980:
978:
976:
974:
1697:Financial Cryptography and Data Security
1211:"Trojan.PWS.ChromeInject.B Removal Tool"
1006:
1004:
1002:
567:
1875:Virus attack on ICICI Bank Transactions
1516:"Threat DescriptionTrojan-Spy:W32/Zbot"
1209:Marusceac Claudiu Florin (2008-11-28).
940:
852:SSL/PKI etc. may offer protection in a
2005:Timeline of computer viruses and worms
1910:Zeus: King of crimeware toolkits Video
1623:Richard S. Westmoreland (2010-10-20).
1535:Hyun Choi; Sean Kiernan (2008-07-24).
1248:
915:Timeline of computer viruses and worms
198:Examples of MitB threats on different
1928:Boy-in-the-Browser Cyber Attack Video
1905:Entrust President and CEO Bill Conner
1880:Virus attack on Citibank Transactions
7:
1848:"Threat Advisory Boy in the Browser"
1490:"Crimeware Kit Emerges for Mac OS X"
1119:Gühring, Philipp (27 January 2007).
731:Out-of-band transaction verification
1397:www.net-security.org (2011-05-11).
524:kit similar to Zeus, not widespread
104:transaction verification, although
1778:Schwartz, Mathew J. (2011-07-13).
1537:"Trojan.Wsnpoem Technical Details"
1322:Symantec Marc Fossi (2008-01-23).
1275:Symantec Marc Fossi (2010-12-08).
182:can detect some of these methods.
25:
2270:Computer and network surveillance
1921:How safe is online banking? Audio
1749:Chickowski, Ericka (2010-10-05).
1011:Quarri Technologies, Inc (2011).
925:Transaction authentication number
621:**Torpig a.k.a. Sinowal, Anserin
127:A related, simpler attack is the
1728:Finextra Research (2008-11-13).
1649:Horowitz, Michael (2012-02-06).
1469:"The Mac OS X Virus That Wasn't"
959:"The Evolution of Proxy Trojans"
108:verification can be defeated by
27:Internet browser security threat
834:are the most primitive form of
1985:Comparison of computer viruses
1:
3740:Social engineering (security)
2224:Data loss prevention software
1825:Sartain, Julie (2012-02-07).
1488:Fisher, Dennis (2011-05-02).
1185:Curtis, Sophie (2012-01-18).
957:Bar-Yosef, Noa (2010-12-30).
1804:Balan, Mahesh (2009-10-14).
1705:10.1007/978-3-662-54970-4_24
1467:Borean, Wayne (2011-05-24).
210:Man-in-the-Browser examples
3735:Hacking (computer security)
1670:Purdy, Kevin (2009-10-14).
1164:Dunn, John E (2010-10-12).
1143:Dunn, John E (2010-07-03).
98:three-factor authentication
3766:
2244:Intrusion detection system
1539:. Symantec. Archived from
883:
845:
690:, or mobile OSes Android,
3689:
3613:Internet Explorer for Mac
3175:
3164:
2792:
2781:
2626:
2605:
2112:Privacy-invasive software
1324:"Banking with Confidence"
1301:Ted Samson (2011-02-22).
1055:10.1007/s10207-013-0208-7
678:or using alternatives to
630:
625:
620:
615:
556:widespread, low detection
419:widespread, low detection
1898:Man-In-The-Browser Video
1561:Microsoft (2010-04-30).
706:, etc., and/or browsers
2122:Rogue security software
1588:Trusteer (2009-09-14).
985:F-Secure (2007-02-11).
726:from their own machine.
357:keeps bank session open
2158:Classic Mac OS viruses
2000:List of computer worms
1846:Imperva (2010-02-14).
162:(a feature limited to
160:Browser Helper Objects
49:), a form of Internet
18:Sunspot (Trojan horse)
3750:Web security exploits
3730:Computing terminology
676:portable applications
3598:IBM Home Page Reader
2552:Operation: Bot Roast
2280:Operation: Bot Roast
1543:on February 23, 2010
1496:on September 5, 2011
2229:Defensive computing
2146:By operating system
1625:"Antisource - ZeuS"
1602:on November 6, 2011
813:Web fraud detection
511:IE, Firefox, Opera
211:
2542:Man-in-the-browser
2214:Antivirus software
2060:Malware for profit
2031:Man-in-the-browser
1978:Infectious malware
1352:"Trusteer Rapport"
866:boy-in-the-browser
860:Boy-in-the-browser
517:Weyland-Yutani BOT
469:Tiny Banker Trojan
209:
180:Antivirus software
168:browser extensions
129:boy-in-the-browser
31:Man-in-the-browser
3725:Computing culture
3712:
3711:
3685:
3684:
3681:
3680:
3368:Internet Explorer
3160:
3159:
3156:
3155:
2777:
2776:
2773:
2772:
2565:
2564:
2532:Internet security
2288:
2287:
2239:Internet security
2193:HyperCard viruses
2102:Keystroke logging
2092:Fraudulent dialer
2036:Man-in-the-middle
1891:Antisource - ZeuS
1714:978-3-662-54970-4
910:Threat (computer)
854:man-in-the-middle
848:Man-in-the-middle
842:Man-in-the-middle
775:man-in-the-mobile
763:Man-in-the-Mobile
743:, or a dedicated
680:Microsoft Windows
665:Microsoft Windows
654:Hardened software
635:
634:
566:
565:
200:operating systems
164:Internet Explorer
120:infection on the
110:man-in-the-mobile
55:man-in-the-middle
16:(Redirected from
3757:
3177:
3166:
2892:Samsung Internet
2794:
2783:
2628:
2607:
2592:
2585:
2578:
2569:
2547:Network security
2512:Browser security
2315:
2308:
2301:
2292:
2254:Network security
2219:Browser security
1963:
1956:
1949:
1940:
1929:
1911:
1899:
1858:
1857:
1855:
1854:
1843:
1837:
1836:
1834:
1833:
1822:
1816:
1815:
1813:
1812:
1801:
1795:
1794:
1792:
1791:
1782:. Archived from
1775:
1766:
1765:
1763:
1762:
1753:. Archived from
1746:
1740:
1739:
1737:
1736:
1725:
1719:
1718:
1688:
1682:
1681:
1679:
1678:
1667:
1661:
1660:
1658:
1657:
1646:
1640:
1639:
1637:
1636:
1627:. Archived from
1620:
1611:
1610:
1608:
1607:
1601:
1595:. Archived from
1594:
1585:
1574:
1573:
1571:
1570:
1558:
1552:
1551:
1549:
1548:
1532:
1526:
1525:
1523:
1522:
1511:
1505:
1504:
1502:
1501:
1492:. Archived from
1485:
1479:
1478:
1476:
1475:
1464:
1455:
1454:
1452:
1451:
1436:
1430:
1429:
1427:
1426:
1415:
1409:
1408:
1406:
1405:
1394:
1388:
1387:
1385:
1384:
1375:. Archived from
1368:
1362:
1361:
1359:
1358:
1347:
1334:
1333:
1331:
1330:
1319:
1313:
1312:
1310:
1309:
1298:
1292:
1291:
1289:
1288:
1279:. Archived from
1272:
1261:
1260:
1254:
1246:
1244:
1243:
1232:
1221:
1220:
1218:
1217:
1206:
1197:
1196:
1194:
1193:
1182:
1176:
1175:
1173:
1172:
1161:
1155:
1154:
1152:
1151:
1140:
1134:
1133:
1131:
1130:
1125:
1116:
1107:
1106:
1104:
1103:
1097:
1090:
1081:
1075:
1074:
1040:
1032:
1026:
1025:
1023:
1022:
1017:
1008:
997:
996:
994:
993:
982:
969:
968:
966:
965:
954:
568:
272:users redeeming
222:Operating system
212:
187:Internet banking
174:(for example in
70:browser security
21:
3765:
3764:
3760:
3759:
3758:
3756:
3755:
3754:
3715:
3714:
3713:
3708:
3677:
3603:IBM WebExplorer
3516:
3412:
3353:
3229:
3171:
3152:
3101:
3057:
3023:
2941:
2788:
2769:
2719:
2652:
2622:
2601:
2596:
2566:
2561:
2500:
2329:Notable botnets
2324:
2319:
2289:
2284:
2263:Countermeasures
2258:
2249:Mobile security
2197:
2188:Palm OS viruses
2153:Android malware
2141:
2055:
2051:Zombie computer
2009:
1973:
1967:
1927:
1909:
1897:
1866:
1861:
1852:
1850:
1845:
1844:
1840:
1831:
1829:
1824:
1823:
1819:
1810:
1808:
1803:
1802:
1798:
1789:
1787:
1777:
1776:
1769:
1760:
1758:
1748:
1747:
1743:
1734:
1732:
1727:
1726:
1722:
1715:
1690:
1689:
1685:
1676:
1674:
1669:
1668:
1664:
1655:
1653:
1648:
1647:
1643:
1634:
1632:
1622:
1621:
1614:
1605:
1603:
1599:
1592:
1587:
1586:
1577:
1568:
1566:
1560:
1559:
1555:
1546:
1544:
1534:
1533:
1529:
1520:
1518:
1513:
1512:
1508:
1499:
1497:
1487:
1486:
1482:
1473:
1471:
1466:
1465:
1458:
1449:
1447:
1438:
1437:
1433:
1424:
1422:
1417:
1416:
1412:
1403:
1401:
1396:
1395:
1391:
1382:
1380:
1370:
1369:
1365:
1356:
1354:
1349:
1348:
1337:
1328:
1326:
1321:
1320:
1316:
1307:
1305:
1300:
1299:
1295:
1286:
1284:
1274:
1273:
1264:
1247:
1241:
1239:
1234:
1233:
1224:
1215:
1213:
1208:
1207:
1200:
1191:
1189:
1184:
1183:
1179:
1170:
1168:
1163:
1162:
1158:
1149:
1147:
1142:
1141:
1137:
1128:
1126:
1123:
1118:
1117:
1110:
1101:
1099:
1098:on July 6, 2011
1095:
1088:
1083:
1082:
1078:
1034:
1033:
1029:
1020:
1018:
1015:
1010:
1009:
1000:
991:
989:
984:
983:
972:
963:
961:
956:
955:
942:
938:
896:
888:
882:
862:
850:
844:
829:
824:
822:Related attacks
815:
765:
733:
656:
647:
640:
196:
152:
78:web application
64:that infects a
28:
23:
22:
15:
12:
11:
5:
3763:
3761:
3753:
3752:
3747:
3742:
3737:
3732:
3727:
3717:
3716:
3710:
3709:
3707:
3706:
3701:
3696:
3690:
3687:
3686:
3683:
3682:
3679:
3678:
3676:
3675:
3670:
3665:
3660:
3655:
3650:
3645:
3640:
3635:
3630:
3625:
3620:
3615:
3610:
3605:
3600:
3595:
3590:
3585:
3580:
3575:
3570:
3565:
3560:
3555:
3550:
3545:
3540:
3535:
3530:
3524:
3522:
3518:
3517:
3515:
3514:
3509:
3504:
3499:
3494:
3489:
3484:
3479:
3474:
3469:
3464:
3459:
3454:
3449:
3444:
3439:
3434:
3429:
3423:
3421:
3414:
3413:
3411:
3410:
3405:
3400:
3395:
3390:
3385:
3380:
3375:
3370:
3364:
3362:
3355:
3354:
3352:
3351:
3346:
3341:
3336:
3331:
3326:
3321:
3316:
3311:
3306:
3301:
3296:
3291:
3286:
3281:
3276:
3271:
3266:
3261:
3256:
3251:
3246:
3240:
3238:
3231:
3230:
3228:
3227:
3222:
3217:
3212:
3207:
3202:
3197:
3192:
3186:
3184:
3173:
3172:
3169:
3162:
3161:
3158:
3157:
3154:
3153:
3151:
3150:
3145:
3140:
3135:
3130:
3125:
3120:
3115:
3109:
3107:
3103:
3102:
3100:
3099:
3094:
3089:
3084:
3079:
3074:
3068:
3066:
3059:
3058:
3056:
3055:
3050:
3045:
3040:
3034:
3032:
3025:
3024:
3022:
3021:
3020:
3019:
3014:
3009:
3004:
2999:
2988:
2983:
2978:
2973:
2968:
2963:
2958:
2952:
2950:
2943:
2942:
2940:
2939:
2934:
2929:
2924:
2919:
2914:
2909:
2904:
2899:
2894:
2889:
2884:
2879:
2874:
2864:
2862:Microsoft Edge
2859:
2854:
2849:
2844:
2839:
2834:
2829:
2824:
2819:
2814:
2809:
2803:
2801:
2790:
2789:
2786:
2779:
2778:
2775:
2774:
2771:
2770:
2768:
2767:
2762:
2757:
2752:
2751:
2750:
2749:
2748:
2738:
2727:
2725:
2721:
2720:
2718:
2717:
2716:
2715:
2710:
2705:
2700:
2695:
2685:
2680:
2675:
2674:
2673:
2662:
2660:
2654:
2653:
2651:
2650:
2645:
2640:
2634:
2632:
2624:
2623:
2621:
2620:
2617:
2614:
2610:
2603:
2602:
2597:
2595:
2594:
2587:
2580:
2572:
2563:
2562:
2560:
2559:
2554:
2549:
2544:
2539:
2534:
2529:
2524:
2519:
2517:Computer virus
2514:
2508:
2506:
2502:
2501:
2499:
2498:
2493:
2488:
2483:
2478:
2473:
2468:
2463:
2458:
2453:
2448:
2443:
2438:
2433:
2428:
2423:
2418:
2413:
2408:
2403:
2398:
2393:
2388:
2383:
2378:
2373:
2368:
2363:
2358:
2353:
2348:
2343:
2338:
2332:
2330:
2326:
2325:
2320:
2318:
2317:
2310:
2303:
2295:
2286:
2285:
2283:
2282:
2277:
2272:
2266:
2264:
2260:
2259:
2257:
2256:
2251:
2246:
2241:
2236:
2231:
2226:
2221:
2216:
2211:
2209:Anti-keylogger
2205:
2203:
2199:
2198:
2196:
2195:
2190:
2185:
2183:Mobile malware
2180:
2175:
2170:
2165:
2160:
2155:
2149:
2147:
2143:
2142:
2140:
2139:
2134:
2129:
2124:
2119:
2114:
2109:
2104:
2099:
2094:
2089:
2084:
2079:
2074:
2069:
2063:
2061:
2057:
2056:
2054:
2053:
2048:
2043:
2038:
2033:
2028:
2023:
2017:
2015:
2011:
2010:
2008:
2007:
2002:
1997:
1992:
1990:Computer virus
1987:
1981:
1979:
1975:
1974:
1968:
1966:
1965:
1958:
1951:
1943:
1937:
1936:
1924:
1918:
1906:
1894:
1888:
1882:
1877:
1872:
1865:
1864:External links
1862:
1860:
1859:
1838:
1817:
1796:
1767:
1741:
1720:
1713:
1683:
1662:
1641:
1612:
1575:
1553:
1527:
1506:
1480:
1456:
1431:
1410:
1389:
1363:
1335:
1314:
1293:
1262:
1222:
1198:
1177:
1156:
1135:
1108:
1076:
1049:(2): 113–170.
1027:
998:
970:
939:
937:
934:
933:
932:
927:
922:
920:Security token
917:
912:
907:
902:
895:
892:
884:Main article:
881:
878:
861:
858:
846:Main article:
843:
840:
828:
825:
823:
820:
814:
811:
810:
809:
806:
791:Windows Mobile
764:
761:
732:
729:
728:
727:
723:
700:Windows Mobile
672:
655:
652:
646:
641:
639:
636:
633:
632:
628:
627:
623:
622:
618:
617:
613:
612:
606:
600:
583:
574:
564:
563:
560:
557:
554:
547:
546:
543:
540:
538:
532:
531:
528:
525:
519:
513:
512:
509:
506:
504:
497:
496:
493:
490:
488:
481:
480:
477:
474:
471:
465:
464:
438:
435:
433:
427:
426:
423:
420:
417:
411:
410:
407:
404:
401:
395:
394:
391:
388:
386:
380:
379:
376:
373:
371:
365:
364:
361:
358:
355:
349:
348:
345:
342:
340:
334:
333:
330:
327:
325:
319:
318:
315:
312:
310:
304:
303:
300:
297:
291:
284:
283:
280:
277:
266:
260:
259:
256:
253:
251:
245:
244:
241:
238:
236:
230:
229:
224:
219:
216:
195:
192:
151:
148:
144:online banking
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
3762:
3751:
3748:
3746:
3745:Trojan horses
3743:
3741:
3738:
3736:
3733:
3731:
3728:
3726:
3723:
3722:
3720:
3705:
3702:
3700:
3697:
3695:
3692:
3691:
3688:
3674:
3671:
3669:
3666:
3664:
3661:
3659:
3656:
3654:
3651:
3649:
3646:
3644:
3641:
3639:
3636:
3634:
3631:
3629:
3626:
3624:
3621:
3619:
3616:
3614:
3611:
3609:
3606:
3604:
3601:
3599:
3596:
3594:
3591:
3589:
3586:
3584:
3581:
3579:
3576:
3574:
3571:
3569:
3566:
3564:
3561:
3559:
3556:
3554:
3551:
3549:
3546:
3544:
3541:
3539:
3536:
3534:
3531:
3529:
3526:
3525:
3523:
3519:
3513:
3510:
3508:
3505:
3503:
3500:
3498:
3495:
3493:
3490:
3488:
3485:
3483:
3480:
3478:
3475:
3473:
3470:
3468:
3465:
3463:
3462:Nokia Symbian
3460:
3458:
3455:
3453:
3450:
3448:
3445:
3443:
3440:
3438:
3435:
3433:
3430:
3428:
3425:
3424:
3422:
3419:
3415:
3409:
3406:
3404:
3401:
3399:
3396:
3394:
3391:
3389:
3386:
3384:
3381:
3379:
3376:
3374:
3371:
3369:
3366:
3365:
3363:
3360:
3356:
3350:
3347:
3345:
3342:
3340:
3337:
3335:
3332:
3330:
3327:
3325:
3322:
3320:
3317:
3315:
3314:PirateBrowser
3312:
3310:
3309:Mozilla suite
3307:
3305:
3302:
3300:
3297:
3295:
3292:
3290:
3287:
3285:
3282:
3280:
3277:
3275:
3272:
3270:
3267:
3265:
3262:
3260:
3257:
3255:
3252:
3250:
3247:
3245:
3242:
3241:
3239:
3236:
3232:
3226:
3223:
3221:
3218:
3216:
3213:
3211:
3208:
3206:
3203:
3201:
3198:
3196:
3193:
3191:
3188:
3187:
3185:
3182:
3178:
3174:
3167:
3163:
3149:
3146:
3144:
3141:
3139:
3136:
3134:
3131:
3129:
3126:
3124:
3121:
3119:
3116:
3114:
3111:
3110:
3108:
3104:
3098:
3095:
3093:
3090:
3088:
3085:
3083:
3080:
3078:
3075:
3073:
3070:
3069:
3067:
3065:
3060:
3054:
3051:
3049:
3046:
3044:
3041:
3039:
3036:
3035:
3033:
3030:
3026:
3018:
3015:
3013:
3010:
3008:
3005:
3003:
3000:
2998:
2995:
2994:
2993:
2989:
2987:
2984:
2982:
2979:
2977:
2974:
2972:
2969:
2967:
2964:
2962:
2959:
2957:
2954:
2953:
2951:
2948:
2944:
2938:
2935:
2933:
2930:
2928:
2925:
2923:
2920:
2918:
2915:
2913:
2910:
2908:
2905:
2903:
2900:
2898:
2895:
2893:
2890:
2888:
2885:
2883:
2880:
2878:
2875:
2872:
2868:
2865:
2863:
2860:
2858:
2855:
2853:
2850:
2848:
2845:
2843:
2840:
2838:
2835:
2833:
2830:
2828:
2825:
2823:
2820:
2818:
2815:
2813:
2810:
2808:
2807:Google Chrome
2805:
2804:
2802:
2799:
2795:
2791:
2784:
2780:
2766:
2763:
2761:
2758:
2756:
2753:
2747:
2744:
2743:
2742:
2739:
2737:
2734:
2733:
2732:
2729:
2728:
2726:
2722:
2714:
2711:
2709:
2706:
2704:
2701:
2699:
2696:
2694:
2691:
2690:
2689:
2686:
2684:
2681:
2679:
2676:
2672:
2669:
2668:
2667:
2664:
2663:
2661:
2659:
2658:Web standards
2655:
2649:
2646:
2644:
2641:
2639:
2636:
2635:
2633:
2629:
2625:
2618:
2615:
2612:
2611:
2608:
2604:
2600:
2593:
2588:
2586:
2581:
2579:
2574:
2573:
2570:
2558:
2555:
2553:
2550:
2548:
2545:
2543:
2540:
2538:
2535:
2533:
2530:
2528:
2525:
2523:
2522:Computer worm
2520:
2518:
2515:
2513:
2510:
2509:
2507:
2505:Main articles
2503:
2497:
2494:
2492:
2489:
2487:
2484:
2482:
2479:
2477:
2474:
2472:
2469:
2467:
2464:
2462:
2459:
2457:
2454:
2452:
2449:
2447:
2444:
2442:
2439:
2437:
2434:
2432:
2429:
2427:
2424:
2422:
2419:
2417:
2414:
2412:
2409:
2407:
2404:
2402:
2399:
2397:
2394:
2392:
2389:
2387:
2384:
2382:
2379:
2377:
2374:
2372:
2369:
2367:
2364:
2362:
2359:
2357:
2354:
2352:
2349:
2347:
2344:
2342:
2339:
2337:
2334:
2333:
2331:
2327:
2323:
2316:
2311:
2309:
2304:
2302:
2297:
2296:
2293:
2281:
2278:
2276:
2273:
2271:
2268:
2267:
2265:
2261:
2255:
2252:
2250:
2247:
2245:
2242:
2240:
2237:
2235:
2232:
2230:
2227:
2225:
2222:
2220:
2217:
2215:
2212:
2210:
2207:
2206:
2204:
2200:
2194:
2191:
2189:
2186:
2184:
2181:
2179:
2176:
2174:
2173:MacOS malware
2171:
2169:
2168:Linux malware
2166:
2164:
2161:
2159:
2156:
2154:
2151:
2150:
2148:
2144:
2138:
2135:
2133:
2130:
2128:
2125:
2123:
2120:
2118:
2115:
2113:
2110:
2108:
2105:
2103:
2100:
2098:
2095:
2093:
2090:
2088:
2087:Form grabbing
2085:
2083:
2080:
2078:
2075:
2073:
2070:
2068:
2065:
2064:
2062:
2058:
2052:
2049:
2047:
2044:
2042:
2039:
2037:
2034:
2032:
2029:
2027:
2024:
2022:
2019:
2018:
2016:
2012:
2006:
2003:
2001:
1998:
1996:
1995:Computer worm
1993:
1991:
1988:
1986:
1983:
1982:
1980:
1976:
1971:
1964:
1959:
1957:
1952:
1950:
1945:
1944:
1941:
1934:
1930:
1925:
1922:
1919:
1916:
1912:
1907:
1904:
1900:
1895:
1892:
1889:
1886:
1883:
1881:
1878:
1876:
1873:
1871:
1868:
1867:
1863:
1849:
1842:
1839:
1828:
1821:
1818:
1807:
1800:
1797:
1786:on 2012-07-06
1785:
1781:
1774:
1772:
1768:
1757:on 2012-03-01
1756:
1752:
1745:
1742:
1731:
1724:
1721:
1716:
1710:
1706:
1702:
1698:
1694:
1687:
1684:
1673:
1666:
1663:
1652:
1645:
1642:
1631:on 2012-01-20
1630:
1626:
1619:
1617:
1613:
1598:
1591:
1584:
1582:
1580:
1576:
1564:
1557:
1554:
1542:
1538:
1531:
1528:
1517:
1510:
1507:
1495:
1491:
1484:
1481:
1470:
1463:
1461:
1457:
1446:. 31 May 2012
1445:
1441:
1435:
1432:
1421:
1414:
1411:
1400:
1393:
1390:
1379:on 2011-12-08
1378:
1374:
1367:
1364:
1353:
1346:
1344:
1342:
1340:
1336:
1325:
1318:
1315:
1304:
1297:
1294:
1283:on 2011-08-08
1282:
1278:
1271:
1269:
1267:
1263:
1258:
1252:
1238:
1231:
1229:
1227:
1223:
1212:
1205:
1203:
1199:
1188:
1181:
1178:
1167:
1160:
1157:
1146:
1139:
1136:
1122:
1115:
1113:
1109:
1094:
1087:
1080:
1077:
1072:
1068:
1064:
1060:
1056:
1052:
1048:
1044:
1039:
1031:
1028:
1014:
1007:
1005:
1003:
999:
988:
981:
979:
977:
975:
971:
960:
953:
951:
949:
947:
945:
941:
935:
931:
930:DNS hijacking
928:
926:
923:
921:
918:
916:
913:
911:
908:
906:
903:
901:
900:Form grabbing
898:
897:
893:
891:
887:
879:
877:
875:
871:
867:
859:
857:
855:
849:
841:
839:
837:
836:proxy trojans
833:
827:Proxy trojans
826:
821:
819:
812:
807:
804:
800:
796:
792:
788:
784:
783:
782:
780:
776:
772:
771:mobile Trojan
769:
762:
760:
758:
754:
750:
746:
742:
738:
730:
724:
721:
717:
713:
709:
705:
701:
697:
693:
689:
685:
681:
677:
673:
670:
666:
662:
658:
657:
653:
651:
645:
642:
637:
629:
624:
619:
614:
610:
607:
604:
601:
599:
595:
591:
587:
584:
582:
578:
575:
573:
570:
569:
561:
558:
555:
552:
549:
548:
544:
541:
539:
537:
534:
533:
529:
526:
523:
520:
518:
515:
514:
510:
507:
505:
502:
499:
498:
494:
491:
489:
486:
483:
482:
478:
475:
472:
470:
467:
466:
463:
459:
455:
451:
447:
443:
440:IE, Firefox,
439:
436:
434:
432:
429:
428:
424:
421:
418:
416:
413:
412:
408:
405:
402:
400:
397:
396:
392:
389:
387:
385:
382:
381:
377:
374:
372:
370:
367:
366:
362:
359:
356:
354:
351:
350:
346:
343:
341:
339:
336:
335:
331:
328:
326:
324:
321:
320:
316:
313:
311:
309:
306:
305:
301:
298:
295:
292:
289:
286:
285:
281:
278:
275:
271:
267:
265:
262:
261:
257:
254:
252:
250:
247:
246:
242:
239:
237:
235:
232:
231:
228:
225:
223:
220:
217:
214:
213:
207:
205:
201:
193:
191:
188:
183:
181:
177:
173:
169:
165:
161:
156:
149:
147:
145:
140:
138:
134:
130:
125:
123:
119:
115:
111:
107:
103:
99:
95:
91:
87:
83:
79:
75:
71:
67:
63:
60:
57:(MITM), is a
56:
52:
48:
44:
40:
36:
32:
19:
3673:WorldWideWeb
3388:MediaBrowser
3383:GreenBrowser
3264:Firefox Lite
3170:Discontinued
2648:Privacy mode
2599:Web browsers
2557:Trojan horse
2541:
2046:Trojan horse
2030:
2026:Clickjacking
1851:. Retrieved
1841:
1830:. Retrieved
1820:
1809:. Retrieved
1799:
1788:. Retrieved
1784:the original
1759:. Retrieved
1755:the original
1744:
1733:. Retrieved
1723:
1696:
1686:
1675:. Retrieved
1665:
1654:. Retrieved
1644:
1633:. Retrieved
1629:the original
1604:. Retrieved
1597:the original
1567:. Retrieved
1556:
1545:. Retrieved
1541:the original
1530:
1519:. Retrieved
1509:
1498:. Retrieved
1494:the original
1483:
1472:. Retrieved
1448:. Retrieved
1443:
1434:
1423:. Retrieved
1413:
1402:. Retrieved
1392:
1381:. Retrieved
1377:the original
1366:
1355:. Retrieved
1327:. Retrieved
1317:
1306:. Retrieved
1296:
1285:. Retrieved
1281:the original
1240:. Retrieved
1214:. Retrieved
1190:. Retrieved
1180:
1169:. Retrieved
1159:
1148:. Retrieved
1138:
1127:. Retrieved
1100:. Retrieved
1093:the original
1079:
1046:
1042:
1030:
1019:. Retrieved
990:. Retrieved
962:. Retrieved
889:
886:Clickjacking
880:Clickjacking
873:
869:
865:
863:
851:
835:
830:
816:
778:
774:
768:Mobile phone
766:
753:mobile phone
734:
663:Rapport for
648:
571:
562:IE, Firefox
535:
500:
495:IE, Firefox
479:IE, Firefox
468:
425:IE, Firefox
414:
409:IE, Firefox
383:
378:IE, Firefox
369:Silentbanker
368:
363:IE, Firefox
352:
337:
332:IE, Firefox
322:
296:impersonator
294:Greasemonkey
288:ChromeInject
287:
282:IE, Firefox
263:
258:IE, Firefox
248:
243:IE, Firefox
233:
204:web browsers
197:
184:
172:user scripts
157:
153:
141:
136:
132:
128:
126:
122:mobile phone
113:
109:
62:Trojan horse
46:
42:
38:
34:
30:
29:
3699:Comparisons
3658:ThunderHawk
3638:NetPositive
3578:Edge Legacy
3507:WebPositive
3472:Opera Coast
3334:Swiftweasel
3097:qutebrowser
2986:Tor Browser
2981:SlimBrowser
2746:third-party
2698:Web storage
2693:WebAssembly
2178:Macro virus
2163:iOS malware
2137:Web threats
2097:Infostealer
2014:Concealment
737:out-of-band
150:Description
102:out-of-band
66:web browser
53:related to
3719:Categories
3344:Timberwolf
3339:TenFourFox
3284:Kazehakase
3274:Ghostzilla
3143:Opera Mini
3077:DuckDuckGo
2966:GNU IceCat
2736:Encryption
2688:JavaScript
2643:Extensions
2491:ZeroAccess
2202:Protection
2117:Ransomware
2082:Fleeceware
1853:2015-03-12
1832:2012-02-08
1811:2012-02-05
1790:2012-02-04
1761:2012-02-09
1735:2012-02-08
1677:2012-02-04
1656:2012-02-08
1635:2012-02-05
1606:2012-02-05
1569:2012-02-05
1565:. Symantec
1547:2012-02-05
1521:2012-02-05
1514:F-secure.
1500:2012-02-03
1474:2012-02-08
1450:2016-02-28
1425:2012-02-03
1404:2012-02-06
1383:2012-02-03
1357:2012-02-03
1350:Trusteer.
1329:2008-07-30
1308:2012-02-06
1287:2012-02-03
1242:2012-02-03
1216:2012-02-05
1192:2012-02-03
1171:2012-02-03
1150:2012-02-08
1129:2008-07-30
1102:2009-06-12
1021:2012-02-05
992:2012-02-03
964:2012-02-03
936:References
832:Keyloggers
803:BlackBerry
757:biometrics
745:mobile app
638:Protection
234:Agent.DBJP
176:JavaScript
72:to modify
3623:Line Mode
3447:Google TV
3403:SpaceTime
3398:NetCaptor
3393:NeoPlanet
3279:IceDragon
3254:Classilla
3087:Lunascape
3082:Konqueror
3043:GNOME Web
3012:SeaMonkey
3007:Pale Moon
2971:LibreWolf
2922:ungoogled
2912:Supermium
2765:WebSocket
2724:Protocols
2703:IndexedDB
2638:Bookmarks
2619:protocols
2616:standards
2481:Vulcanbot
2371:Conficker
2127:Scareware
2077:Crimeware
1923:BBC Click
1887:BBC Click
1444:msnbc.com
1063:1615-5270
644:Antivirus
522:crimeware
462:Konqueror
80:. A MitB
74:web pages
3694:Category
3648:Skweezer
3643:Netscape
3568:Deepfish
3512:xombrero
3329:Swiftfox
3259:Conkeror
3215:SalamWeb
3210:Rockmelt
3123:Ladybird
3092:NetFront
3017:Waterfox
3002:K-Meleon
2997:Basilisk
2902:Sleipnir
2812:Chromium
2631:Features
2613:Features
2451:Slenfbot
2416:Mariposa
2401:Koobface
2361:Bredolab
2356:BASHLITE
2275:Honeypot
2234:Firewall
2021:Backdoor
1251:cite web
894:See also
773:spyware
749:landline
720:Live USB
696:ChromeOS
684:Mac OS X
669:Mac OS X
661:Trusteer
609:Mac OS X
530:Firefox
527:Mac OS X
458:Netscape
302:Firefox
276:vouchers
270:Facebook
268:targets
194:Examples
3653:Skyfire
3608:IBrowse
3593:HotJava
3588:Gazelle
3538:Arachne
3467:OmniWeb
3457:Mercury
3437:Dolphin
3378:Deepnet
3220:Sputnik
3205:Redcore
3138:NetSurf
2956:Firefox
2927:Vivaldi
2882:Puffin
2857:Maxthon
2832:Coc Coc
2741:Cookies
2537:Malware
2486:Waledac
2441:Rustock
2431:Metulji
2396:Kelihos
2391:Gumblar
2366:Cutwail
2322:Botnets
2132:Spyware
2041:Rootkit
1970:Malware
1935:Imperva
1933:YouTube
1915:YouTube
1903:YouTube
1071:3330144
905:IT risk
799:Symbian
795:Android
787:malware
716:live CD
704:Symbian
605:: other
603:Windows
598:Firefox
594:Firefox
586:Windows
577:Windows
559:Windows
542:Windows
536:Yaludle
508:Windows
501:URLZone
492:Windows
476:Windows
454:Maxthon
437:Windows
431:Tatanga
422:Windows
415:Sunspot
406:Windows
390:Windows
375:Windows
360:Windows
344:Windows
329:Windows
314:Windows
299:Windows
279:Windows
264:Carberp
255:Windows
240:Windows
227:Browser
218:Details
118:malware
92:and/or
3668:WinWAP
3663:Vision
3633:MSN TV
3628:Mosaic
3618:KidZui
3583:ELinks
3558:Charon
3548:Blazer
3487:Shiira
3477:Origyn
3420:-based
3418:WebKit
3361:-based
3359:MSHTML
3324:Strata
3304:Minimo
3299:MicroB
3269:Galeon
3249:Camino
3244:Beonex
3237:-based
3195:Citrio
3190:Beaker
3183:-based
3064:engine
3062:Multi-
3038:Safari
3031:-based
3029:WebKit
2990:Gecko
2976:Midori
2961:Floorp
2949:-based
2937:Yandex
2907:SRWare
2871:Mobile
2852:Falkon
2842:Dooble
2837:Comodo
2800:-based
2787:Active
2760:WebRTC
2713:WebGPU
2527:Malbot
2471:Torpig
2456:Srizbi
2446:Sality
2421:Mega-D
2411:Lethic
2406:Kraken
2376:Donbot
2346:Asprox
2107:Malbot
2072:Botnet
2067:Adware
1972:topics
1711:
1069:
1061:
801:, and
708:Chrome
611:: any
592:&
485:Torpig
450:Safari
442:Chrome
399:SpyEye
353:OddJob
338:Nuklus
308:Clampi
274:e-cash
82:attack
51:threat
3573:Dillo
3543:Arena
3533:Amaya
3528:abaco
3521:Other
3492:Steel
3482:QtWeb
3442:Fluid
3427:Arora
3294:Lotus
3235:Gecko
3225:Torch
3200:Flock
3181:Blink
3128:Links
3106:Other
3053:Orion
2992:forks
2947:Gecko
2932:Whale
2877:Otter
2867:Opera
2827:Brave
2822:Avast
2798:Blink
2708:WebGL
2476:Virut
2466:TDL-4
2461:Storm
2436:Nitol
2426:Mirai
2381:Festi
2351:Bagle
2341:Akbot
1600:(PDF)
1593:(PDF)
1124:(PDF)
1096:(PDF)
1089:(PDF)
1067:S2CID
1016:(PDF)
779:MitMo
718:, or
712:Opera
688:Linux
682:like
446:Opera
384:Silon
249:Bugat
114:MitMo
59:proxy
3704:List
3553:Cake
3502:Uzbl
3497:surf
3452:Iris
3432:BOLT
3319:Pogo
3289:Kylo
3133:Lynx
3118:Flow
3048:iCab
2897:Silk
2847:Epic
2755:OCSP
2731:HTTP
2666:HTML
2496:Zeus
2386:Grum
1709:ISBN
1257:link
1059:ISSN
874:BITB
870:BitB
667:and
551:Zeus
503:****
323:Gozi
215:Name
202:and
170:and
137:BITB
133:BitB
94:two-
39:MitB
35:MITB
3408:ZAC
3373:AOL
3148:w3m
3113:eww
3072:360
2817:Arc
2683:DOM
2678:CSS
2336:3ve
1931:on
1913:on
1901:on
1701:doi
1051:doi
872:or
741:SMS
710:or
692:iOS
596:or
572:Key
553:***
545:IE
452:,
393:IE
347:IE
317:IE
178:).
166:),
139:).
106:SMS
96:or
90:PKI
86:SSL
47:MiB
43:MIB
3721::
3563:CM
3349:xB
2917:UC
2887:QQ
2671:v5
1770:^
1707:.
1615:^
1578:^
1459:^
1442:.
1338:^
1265:^
1253:}}
1249:{{
1225:^
1201:^
1111:^
1065:.
1057:.
1047:13
1045:.
1041:.
1001:^
973:^
943:^
797:,
793:,
751:,
702:,
698:,
694:,
686:,
590:IE
588::
581:IE
579::
487:**
460:,
456:,
448:,
444:,
206::
146:.
135:,
116:)
45:,
41:,
37:,
2873:)
2869:(
2591:e
2584:t
2577:v
2314:e
2307:t
2300:v
1962:e
1955:t
1948:v
1856:.
1835:.
1814:.
1793:.
1764:.
1738:.
1717:.
1703::
1680:.
1659:.
1638:.
1609:.
1572:.
1550:.
1524:.
1503:.
1477:.
1453:.
1428:.
1407:.
1386:.
1360:.
1332:.
1311:.
1290:.
1259:)
1245:.
1219:.
1195:.
1174:.
1153:.
1132:.
1105:.
1073:.
1053::
1024:.
995:.
967:.
868:(
777:(
722:.
290:*
131:(
112:(
88:/
33:(
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.