| 2012-12-01 | An Analysis of a Fake Vodafone Bill PDF File | 路人甲 | 2799 | |
| 2012-12-01 | Malware analysis as a hobby | 路人甲 | 2476 | |
| 2012-11-30 | Crisis: The Advanced Malware | 路人甲 | 3279 | |
| 2012-11-30 | Spear-Phishing Email: Most Favored APT Attack Bait | 路人甲 | 3327 | |
| 2012-11-29 | HTTP iframe Injecting Linux Rootkit | 路人甲 | 3942 | |
| 2012-11-23 | The Future of Automated Malware Generation | 路人甲 | 2826 | |
| 2012-11-23 | Win32/Flamer: Reverse Engineering and Framework Reconstruction | 路人甲 | 3049 | |
| 2012-11-22 | Automated Malware Analysis & Deobfuscation | 路人甲 | 2695 | |
| 2012-11-21 | Gong Da / Gondad Exploit Pack Add Java CVE-2012-5076 support | 路人甲 | 2227 | |
| 2012-11-14 | 趋势:第三季度网络安全威胁报告 | 路人甲 | 2565 | |
| 2012-11-13 | Georbot Botnet – A cyber espionage campaign against Georgian Government | 路人甲 | 3840 | |
| 2012-11-13 | Information-based Dependency Matching For Behavioral Malware Analysis | 路人甲 | 2715 | |
| 2012-11-06 | IT Threat Evolution: Q3 2012 | 路人甲 | 2485 | |