Security bug

Results: 244



#Item
1

Red of ring and gears with malware bug a computer virus inside on binary code background.Vector illustration security technology concept.

Add to Reading List

Source URL: selabs.uk

    2

    Red of ring and gears with malware bug a computer virus inside on binary code background.Vector illustration security technology concept.

    Add to Reading List

    Source URL: selabs.uk

      3

      U.S. Senate Subcommittee on Data Security and Bug Bounties: SUMMARY OF WRITTEN TESTIMONY AND HACKERONE STATEMENTS In February 2018, HackerOne was invited to testify in front of the U.S. Senate Subcommittee on Consumer Pr

      Add to Reading List

      Source URL: www.hackerone.com

      - Date: 2018-03-30 11:50:00
        4

        Leveraging Semantic Signatures for Bug Search in Binary Programs Jannik Pewny† , Felix Schuster† , Christian Rossow‡ , Lukas Bernhard† , Thorsten Holz† † Horst Görtz Institute for IT-Security (HGI)

        Add to Reading List

        Source URL: www.ei.rub.de

        - Date: 2014-10-22 03:57:33
          5

          Your Data Security is Our Priority The ownCloud Security Bug Bounty Program ownCloud is proud to be an open-source company, and we believe in transparency and the importance of community. With 800+ contributors and over

          Add to Reading List

          Source URL: owncloud.com

          - Date: 2015-08-28 07:39:40
            6Cyberwarfare / Computer security / Computer network security / Security / Vulnerability / Zero-day / Software bug

            Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response Zhen Huang Mariana D’Angelo

            Add to Reading List

            Source URL: www.eecg.toronto.edu

            Language: English - Date: 2016-03-14 12:44:49
            7Internet security / Software bugs / Shellshock / Software testing / Bash / Avaya / Vulnerability / Common Vulnerabilities and Exposures / POODLE

            INI  Applications  and  the   “Shellshock”  bug  in  BASH   This document is intended to assist in the description, diagnosis, and remediation of the BASH bug known as “Shellshock” as it relates to syste

            Add to Reading List

            Source URL: www.interactivenw.com

            Language: English - Date: 2014-10-07 15:06:31
            8Computer network security / Computer security / Cryptography / Cyberwarfare / National security / Secure communication / Agile software development / Vulnerability / Application security / Software bug / Software

            roguewave_automotive-developer-guide2016_vf

            Add to Reading List

            Source URL: www.roguewave.com

            Language: English - Date: 2016-03-09 11:01:17
            9Computer network security / Software testing / Hacking / Computer security / Veracode / Common Weakness Enumeration / Vulnerability / Application security / Security testing / Software quality / CVSS / Software bug

            Veracode Summary Report Summary Report As of 18 Mar 2016 Prepared for: Prepared on:

            Add to Reading List

            Source URL: owncloud.com

            Language: English - Date: 2016-04-06 15:04:57
            10Computer network security / Hacking / Software testing / Computer security / Vulnerability / Cross-site scripting / SQL injection / Program analysis / Web application security / Penetration test / Application security / Software bug

            Questions Developers Ask While Diagnosing Potential Security Vulnerabilities with Static Analysis Justin Smith, Brittany Johnson, and Emerson Murphy-Hill Bill Chu and Heather Richter Lipford

            Add to Reading List

            Source URL: www4.ncsu.edu

            Language: English - Date: 2015-07-31 17:48:16
            UPDATE