Back to Results
First PageMeta Content
Security / Malware / Phishing / Spamming / Targeted threat / Zero-day attack / Industrial espionage / Threat / Advanced persistent threat / Computer network security / Cyberwarfare / Computer security


A Trend Micro Research Paper Suggestions to Help Companies with the Fight Against Targeted Attacks Jim Gogolinski
Add to Reading List

Document Date: 2013-09-18 04:01:02


Open Document

File Size: 549,94 KB

Share Result on Facebook

City

Reading / /

Company

Adobe / Google Aurora / Internal Threat Intelligence Group / Trend Micro Incorporated. / Microsoft / /

Country

Saudi Arabia / /

IndustryTerm

corporate infrastructure / finance network / Web proxy / software accesses / open wireless access points / large integrator / virtual private network / corporate network / mining / online banking accounts / manufacturing / attack software / event management / corporate systems / finance / malicious software / malicious software runs / target network / configured infrastructure / energy / /

Organization

Threat Intelligence / Defining Threat Intelligence / /

Person

Karl Dominguez / Kelly Jackson Higgins / /

Position

threat actor / engineer / /

Technology

home network / WAP / wireless access / DNS / firewall / VPN / network address translation / http / html / /

URL

http /

SocialTag