1. Arcot. (2010). Protecting Online Customers from Man-in-the-Browser and Man-in-the-Middle Attacks. Retrieved from Arcot Resources - Briefs and White Papers for Online Identity Fraud Protection website: http://www.arcot.com/resources/docs/ Protection_from_MITM_&_MITB_Attacks_White_Paper.pdf
2. Chechik, D. (2009, September 30). Malware Analysis – Trojan Banker URLZone/Bebloh. Retrieved April 5, 2011, from M86 Security Labs website: http://labs.m86security.com/ 2009/09/malware-analysis-trojan-banker-urlzonebebloh/
3. Entrust. (2010). Defeating Man-in-the-Browser. Retrieved April 3, 2011, from Internet Security and Encryption White Papers website: http://www.entrust.com/resources/download.cfm/24002/
4. Falliere, N., & Chien, E. (2009). Zeus: King of the Bots. Retrieved from Security Response Whitepapers Symantec Corp. website: http://www.symantec.com/content/en/us/ enterprise/media/security_response/whitepapers/zeus_king_of_bots.pdf
5. Finjan. (2009, July). Cybercrime Intelligence Report, Issue no. 3. Retrieved March 20, 2011, from M86 Security website: http://www.finjan.com/GetObject.aspx?ObjId=679