Back to Results
First PageMeta Content
Security / Risk / Hacking / Software testing / Vulnerability / Zero-day attack / Social vulnerability / Exploit / Full disclosure / Computer security / Computer network security / Cyberwarfare


►►EXPOSING THE SECURITY WEAKNESSES WE TEND TO OVERLOOK As security analysts we often get asked the question: “What threats and vulnerabilities do you expect we will see in the future?” This is a very interesting
Add to Reading List

Document Date: 2013-09-24 06:53:36


Open Document

File Size: 528,70 KB

Share Result on Facebook

Company

Outpost24 / Microsoft / /

Country

Sweden / /

Event

Person Communication and Meetings / /

Facility

USB port / /

IndustryTerm

transportation / system processing work orders / energy plants / financial systems / few vulnerable systems / still systems / vulnerability management / corporate network / security products / important systems / internet-exposed vulnerable systems / people travel / Internet-facing machines / vulnerable systems / important tool / /

OperatingSystem

Microsoft Windows / /

Person

Martin Jartelius / David Jacoby / /

Position

system administrator / security researcher / Kaspersky researcher / receptionist / /

Technology

ethernet / firewall / PDF / /

SocialTag