Cyberwarfare

Results: 11990



#Item
451Cyberwarfare / Computer network security / Hacker culture / Hacking / Cybercrime / Security hacker / Computer security / Rootkit / Hackers: Heroes of the Computer Revolution / Internet security / Firewall / Hacker

Teaching the Principles of the Hacker Curriculum to Undergraduates Sergey Bratus Anna Shubina

Add to Reading List

Source URL: www.ists.dartmouth.edu

Language: English - Date: 2010-01-25 17:05:27
452Cyberwarfare / United States Department of Homeland Security / Cybercrime / Computer security / International Multilateral Partnership Against Cyber Threats / National Cyber Security Division / United States Computer Emergency Readiness Team

CONTINUOUS DIAGNOSTICS & MITIGATION PROGRAM The growing number of cyber attacks on Federal government networks are sophisticated, aggressive, and dynamic. A recent cybersecurity report* disclosed that over 90 percent of

Add to Reading List

Source URL: blog.qualys.com

Language: English - Date: 2016-01-18 23:50:24
453Cyberwarfare / Trojan horses / Spyware / Computer access control / Surveillance / Hacking Team / Exploit / Citizen Lab / Vupen / Morgan Marquis-Boire / FinFisher / Proxy server

The Citizen Lab Research Brief FebruaryMapping Hacking Team’s “Untraceable” Spyware

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2015-03-18 14:57:35
454Antivirus software / Computer network security / Cyberwarfare / ESET / Malware / David Harley / Computer virus / Sality / Stuxnet / Computer security / Internet security / Avira

March 2015 Feature Article: 50 Shades of Security Table of Contents 50 Shades of Security .................................................................................................................................

Add to Reading List

Source URL: virusradar.com

Language: English - Date: 2015-06-02 02:58:26
455Cyberwarfare / Rootkit / Privilege escalation / Unified Extensible Firmware Interface / Vulnerability / Computer security / Arbitrary code execution / Exploit / Mitre Corporation / BIOS / Windows 8 / Mitre

Extreme Privilege Escalation on Windows 8/UEFI Systems

Add to Reading List

Source URL: www.mitre.org

Language: English - Date: 2014-08-06 10:41:42
456Cyberwarfare / Cryptography / Crime prevention / National security / Computer network security / Dropper / Denial-of-service attack / Backdoor / Intel / Computer security / Malware / Recreational Software Advisory Council

SESSION ID: SPO1-T09 Christiaan Beek Disrupting Adversarial Success— Giving the Bad Guys No Sleep

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2016-02-28 09:30:14
457Computer network security / Computer security / Cryptography / Cyberwarfare / National security / Secure communication / Agile software development / Vulnerability / Application security / Software bug / Software

roguewave_automotive-developer-guide2016_vf

Add to Reading List

Source URL: www.roguewave.com

Language: English - Date: 2016-03-09 11:01:17
458Cyberwarfare / Denial-of-service attacks / Computer network security / Internet Relay Chat / Distributed computing / Denial-of-service attack / International Symposium on Reliable Distributed Systems / Computer security / Peer-to-peer / Attack / UDP flood attack / Computer network

Mr. Zhang Fu PERSONAL INFORMATION Surname: Fu Given name: Zhang Date of Birth: 13 OCT 1982 Email:

Add to Reading List

Source URL: www.cse.chalmers.se

Language: English - Date: 2012-10-16 05:28:25
459Computer network security / Computer security / Crime prevention / Cryptography / Cyberwarfare / National security / Vulnerability

Greenbone Security Manager x-ray your network The Oering

Add to Reading List

Source URL: greenbone.net

Language: English - Date: 2016-08-18 03:23:24
460Cyberwarfare / Computer network security / Peer-to-peer / Botnet / Hosts / Denial-of-service attack / Public-key cryptography / Computer security / Fabric of Security

Towards Attack-Agnostic Defenses David Brumley and Dawn Song Carnegie Mellon University {dbrumley,dawnsong}@cs.cmu.edu Abstract

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
UPDATE