Security bug

Results: 244



#Item
101F Y14 N av y P R O G R A M S  Mk 54 Lightweight Torpedo Executive Summary •	 The Navy and DOT&E completed OT&E for the Mk 54 lightweight torpedo with Block Upgrade (BUG) tactical

F Y14 N av y P R O G R A M S Mk 54 Lightweight Torpedo Executive Summary • The Navy and DOT&E completed OT&E for the Mk 54 lightweight torpedo with Block Upgrade (BUG) tactical

Add to Reading List

Source URL: www.dote.osd.mil

Language: English - Date: 2015-01-08 18:19:36
102Building Bridges between Dev and AppSec

Building Bridges between Dev and AppSec

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 12:08:52
103ANATOMY OF A SHELLSHOCK ATTACK “Shellshock” is the name of a serious bug in Bash, a shell commonly used in computers running Linux, UNIX and OS X. Shellshock could allow an attacker to execute malicious commands acro

ANATOMY OF A SHELLSHOCK ATTACK “Shellshock” is the name of a serious bug in Bash, a shell commonly used in computers running Linux, UNIX and OS X. Shellshock could allow an attacker to execute malicious commands acro

Add to Reading List

Source URL: sophos.files.wordpress.com

Language: English - Date: 2014-10-06 17:36:14
104Protect your business from the bash bug There has been considerable media coverage about the bash bug. This includes reports from software security firms that hackers are using the bug to target Australian companies.

Protect your business from the bash bug There has been considerable media coverage about the bash bug. This includes reports from software security firms that hackers are using the bug to target Australian companies.

Add to Reading List

Source URL: www.cert.gov.au

Language: English - Date: 2015-01-23 10:38:34
105Security Analysis of the Diebold AccuBasic Interpreter David Wagner David Jefferson Matt Bishop Voting Systems Technology Assessment Advisory Board (VSTAAB) with the assistance of:

Security Analysis of the Diebold AccuBasic Interpreter David Wagner David Jefferson Matt Bishop Voting Systems Technology Assessment Advisory Board (VSTAAB) with the assistance of:

Add to Reading List

Source URL: votingsystems.cdn.sos.ca.gov

Language: English - Date: 2014-12-02 18:09:19
106Additional Items to Consider Adding to an Emergency Supply Kit:  ❑ Prescription medications and glasses ❑ Infant formula and diapers ❑ Pet food and extra water for your pet ❑ Important family documents such as co

Additional Items to Consider Adding to an Emergency Supply Kit: ❑ Prescription medications and glasses ❑ Infant formula and diapers ❑ Pet food and extra water for your pet ❑ Important family documents such as co

Add to Reading List

Source URL: redsismica.uprm.edu

Language: English - Date: 2013-08-20 10:11:31
107Additional Items to Consider Adding to an Emergency Supply Kit:  q Prescription medications and glasses q Infant formula and diapers q Pet food and extra water for your pet q Important family documents such as copies of

Additional Items to Consider Adding to an Emergency Supply Kit: q Prescription medications and glasses q Infant formula and diapers q Pet food and extra water for your pet q Important family documents such as copies of

Add to Reading List

Source URL: www.benningtonpolice.com

Language: English - Date: 2011-11-12 13:55:09
108Additional Items to Consider Adding to an Emergency Supply Kit:  q Prescription medications and glasses q Infant formula and diapers q Pet food and extra water for your pet q Important family documents such as copies of

Additional Items to Consider Adding to an Emergency Supply Kit: q Prescription medications and glasses q Infant formula and diapers q Pet food and extra water for your pet q Important family documents such as copies of

Add to Reading List

Source URL: www.few.org

Language: English - Date: 2014-12-01 11:36:46
109HSARPA Cyber Security R&D

HSARPA Cyber Security R&D

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2013-01-02 14:26:40
110Computer network security / System administration / Hacking / Software testing / Vulnerability / Ps / Id / Computer security / Operating system / Software / Computing / Unix

STEPS FOR BUSINESS TO PROTECT AGAINST BASH BUG 26 September 2014 Businesses are urged to protect their IT systems against the Bourne Again Shell (BASH) vulnerability that could allow unauthorised users to access and mani

Add to Reading List

Source URL: www.cert.gov.au

Language: English - Date: 2014-12-10 16:01:52