Attack

Results: 9771



#Item
291Cryptography / Computing / Computer access control / Transport Layer Security / Public-key cryptography / Cryptographic protocols / Secure communication / Man-in-the-middle attack / Mutual authentication / Authentication / Public key infrastructure / Phishing

IdenTrustâ„¢: Beyond SSL and Multifactor Authentication Eliminating Man-in-the-Middle Attacks with IdenTrustâ„¢ A Preventative, Proactive Approach to Securing Electronic Transactions Many financial institutions believe t

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-05-01 19:01:13
292Security / Cyberwarfare / Computer security / Carnegie Mellon University / Computer network security / Cybercrime / Computer emergency response team / CERT Coordination Center / Advanced persistent threat / Threat / Attack / United States Computer Emergency Readiness Team

JPCERT/CC Activities Overview [January 1, 2016 – March 31, 2016]

Add to Reading List

Source URL: www.jpcert.or.jp

Language: English - Date: 2016-06-21 01:58:27
293Malware / Marketing / Computer security / Adware / Advertising / Deception / Internet marketing / Malvertising / Online advertising / Trustwave Holdings

WHAT IS MALVERTISING? Malicious advertising (Malvertising) is a malware attack that uses online ads to spread malicious code HOW MALVERTISNG WORKS You visit a website with an infected banner

Add to Reading List

Source URL: pl.malwarebytes.com

Language: English - Date: 2016-05-10 23:13:50
294Computing / Computer security / Computer network security / E-commerce / Cyberwarfare / Information privacy / Payment Card Industry Data Security Standard / Cogeco / Web application firewall / Application firewall / Peer 1 / Denial-of-service attack

COGECO_Peer_1_Logo_v2_WHITE

Add to Reading List

Source URL: www.cogecopeer1.com

Language: English - Date: 2016-07-20 15:41:15
295Cyberwarfare / Security / Malware / Computer security / Computer virus / Denial-of-service attack

Microsoft Word - idp-gmesdoc

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-02-02 08:44:25
296Computing / Internet / Network architecture / File sharing / Computer networking / Distributed computing architecture / Overlay network / Routing / Round-trip delay time / Peer-to-peer / Sybil attack / Tor

Secure Latency Estimation with Treeple Eric Chan-Tin and Nicholas Hopper University of Minnesota Minneapolis, MN USA {dchantin, hopper}@cs.umn.edu

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:41
297Software / Computing / Social information processing / Academia / Social networking services / Community building / Facebook / Social software / Recommender system / Internet privacy / Social network / Privacy concerns with social networking services

Chapter 1 Links Reconstruction Attack Using Link Prediction Algorithms to Compromise Social Networks Privacy Michael Fire, Gilad Katz, Lior Rokach, and Yuval Elovici1

Add to Reading List

Source URL: proj.ise.bgu.ac.il

Language: English - Date: 2012-05-05 05:45:54
298Computing / Network architecture / Computer architecture / Cyberwarfare / Computer network security / Data security / IP multicast / Overlay network / Denial-of-service attack / Anycast / Database trigger / Firewall

Towards a More Functional and Secure Network Infrastructure Daniel Adkins Karthik Lakshminarayanan Adrian Perrig Ion Stoica UC Berkeley UC Berkeley CMU

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2003-06-05 12:41:23
299Economy / Finance / Money / Financial regulation / Financial services / Investment / Cyberwarfare / Denial-of-service attack / Denial-of-service attacks / International Financial Reporting Standards / Statement of changes in equity / BlackBerry Limited

FIRST LINE OF DEFENSE PRODUCTS & SERVICES FOR REAL-TIME DDOS PROTECTION ADVANCED DDOS DEFENSE TECHNOLOGY

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2015-10-08 06:52:39
300Economy / Contract law / Types of insurance / Money / Insurance / Guarantee / Law / Definitions of terrorism / Victimology / Victims Compensation Tribunal

Compensation for the victims of acts of terrorism Attack of 14th JulyFGTI

Add to Reading List

Source URL: www.fondsdegarantie.fr

Language: English - Date: 2016-07-18 10:53:05
UPDATE