Malware research

Results: 246



#Item
201Security Considerations for Remote Electronic Voting over the Internet Avi Rubin AT&T Labs – Research Florham Park, NJ [removed]

Security Considerations for Remote Electronic Voting over the Internet Avi Rubin AT&T Labs – Research Florham Park, NJ [removed]

Add to Reading List

Source URL: www.electioncenter.org

Language: English - Date: 2007-03-13 00:00:00
202DON’T BE FOOLED  A new study by market research firm Vanson Bourne reveals that businesses confuse advanced evasion techniques (AETs) with advanced persistent threats (APTs)—leaving themselves vulnerable, at great co

DON’T BE FOOLED A new study by market research firm Vanson Bourne reveals that businesses confuse advanced evasion techniques (AETs) with advanced persistent threats (APTs)—leaving themselves vulnerable, at great co

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-03-27 19:37:50
203Prepared Testimony and Statement for the Record of  Joseph Pasqua Vice President of Research Symantec Corporation

Prepared Testimony and Statement for the Record of Joseph Pasqua Vice President of Research Symantec Corporation

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2010-08-05 13:18:59
204WhatWorks in Detecting and Blocking Advanced Threats: A Real Case Study at a Large Research Organization with WhatWorks is a user-to-user program in which security managers who have implemented effective internet securit

WhatWorks in Detecting and Blocking Advanced Threats: A Real Case Study at a Large Research Organization with WhatWorks is a user-to-user program in which security managers who have implemented effective internet securit

Add to Reading List

Source URL: www.meritalk.com

Language: English - Date: 2013-09-27 14:56:25
205University of Manitoba Research Suggested Practices for IT Written by Trevor Mazak September 10, 2013 Last Revised September 16, 2013 Notice: The contents of this document are highly time sensitive. Best practices today

University of Manitoba Research Suggested Practices for IT Written by Trevor Mazak September 10, 2013 Last Revised September 16, 2013 Notice: The contents of this document are highly time sensitive. Best practices today

Add to Reading List

Source URL: www.umanitoba.ca

Language: English - Date: 2014-09-04 10:16:43
206A Trend Micro Research Paper  On the Actors Behind MEVADE/SEFNIT Forward-Looking Threat Research Team

A Trend Micro Research Paper On the Actors Behind MEVADE/SEFNIT Forward-Looking Threat Research Team

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2014-07-07 15:51:43
207MARKETBRIEF  Helping to Protect the Open Campus To fulfill their functions of educating students and promoting research, college and university campuses must be open to the flow of people

MARKETBRIEF Helping to Protect the Open Campus To fulfill their functions of educating students and promoting research, college and university campuses must be open to the flow of people

Add to Reading List

Source URL: www.corp.att.com

Language: English - Date: 2008-05-29 11:07:24
208A Trend Micro Research Paper  Finding Holes Operation Emmental  David Sancho, Feike Hacquebord, and Rainer Link

A Trend Micro Research Paper Finding Holes Operation Emmental David Sancho, Feike Hacquebord, and Rainer Link

Add to Reading List

Source URL: www.securecloud.com

Language: English - Date: 2014-07-24 09:59:31
209GTCSS_2013_ETR_Front_Cover

GTCSS_2013_ETR_Front_Cover

Add to Reading List

Source URL: www.gtsecuritysummit.com

Language: English - Date: 2013-11-15 09:46:50
210PROGRAM  Introduction Innovative research can help illuminate the security problems facing people, businesses, and governments online as well as propose

PROGRAM Introduction Innovative research can help illuminate the security problems facing people, businesses, and governments online as well as propose

Add to Reading List

Source URL: www.gtcybersecuritysummit.com

Language: English - Date: 2013-09-10 01:58:16