Back to Results
First PageMeta Content
Security / Malware / Hacking / Stuxnet / Computer insecurity / Targeted threat / Crimeware / Vulnerability / SecurID / Cyberwarfare / Computer security / Computer network security


Securing Your Journey to the Cloud Trends in Targeted Attacks
Add to Reading List

Document Date: 2011-12-08 04:36:41


Open Document

File Size: 396,53 KB

Share Result on Facebook

Company

Lockheed Martin / Grumman / Twitter / Pacific Northwest National Laboratory / ConocoPhillips / Trend Micro / Bancos / Christian Science Monitor / Yahoo! / The Guardian / the New York Times / Baidu / Adobe / RSA / Marathon Oil / Google / Oak Ridge National Laboratory / L-3 Communications / VMWare / Microsoft / ExxonMobil / /

Country

Finland / India / Iran / Russia / United States / /

Facility

Oak Ridge National Laboratory / Pacific Northwest National Laboratory / /

IndustryTerm

encryption software / remote administration tools / Baidu Blogs / instant messaging services / civil society networks / Twitter / fake security software / software packages / energy / cyber-espionage network / well known cybercrime infrastructure / intrusion detection/prevention systems / control infrastructure / installed software / malware tools / media players / Internet users / res /

OperatingSystem

L3 / /

Organization

International Monetary Fund / U.S. government / German government / Persistence/Lateral Movement / civil society / External Action Service / European Commission / British MP / /

Person

Richard Stiennon / /

/

Position

particular threat actor / /

Product

Titan / /

ProgrammingLanguage

R / C / /

ProvinceOrState

Aurora / /

PublishedMedium

Der Spiegel / the BusinessWeek / the New York Times / The Guardian / BusinessWeek / the Christian Science Monitor / /

Region

Western Europe / /

Technology

res /

URL

www.mcafee.com/us/resources/white-papers/wp-global-energy-cyberattacks-night-dragon.pdf / www.rsa.com/node.aspx?id=3872010/01/new-approach-to-china.html / http /

SocialTag