Back to Results
First PageMeta Content
Computer network security / Computer security / Stuxnet / Duqu / Rootkit / Zero-day attack / Advanced persistent threat / Internet security / Antivirus software / Cyberwarfare / Malware / System software


Weaponized Malware: A Clear and Present Danger Weaponized malware and advanced persistent threats raise the bar on endpoint security. Originally intended for cyber-espionage and cyber-warfare, these sophisticated attacks
Add to Reading List

Document Date: 2014-01-23 09:10:43


Open Document

File Size: 519,52 KB

Share Result on Facebook

Company

the New York Times / Wiley Rein / LinkedIn / Gartner / Wall Street Journal / Skype / Google / Halliburton / Verizon / Symantec / Microsoft / /

Country

Germany / Iran / Peru / United States / China / India / /

IndustryTerm

good device-control solution / wireless connection / patch management solution / patches across your entire network / oil-reserve maps / removable devices / detection technologies / Internet Security Threat Report / energy / technology con / proxy server / ington law / patent law firms / individual applications / manufacturing / disparate solutions / /

OperatingSystem

Stux / Microsoft Windows / /

Organization

National Security Agency / China’s military / Federal Bureau of Investigation / U.S. intelligence / European Union / Swiss army / /

Person

Shawn Henry / Barack Obama / Recruiting Source / Keith Flame / /

/

Position

President / Job Title Executive Sales Media R&D Senior Management Administrative Assistant / engineer / Director / hunter / executive / controller / /

ProgrammingLanguage

Visual Basic / /

ProvinceOrState

Manitoba / /

PublishedMedium

the Wall Street Journal / the New York Times / /

Technology

LAN / AV / safeguarding technology / mobile device / operating systems / detection technologies / encryption / proxy server / Bluetooth / /

SocialTag