Backdoor

Results: 134



#Item
51National security / Malware / Cyberwarfare / Backdoor / Rootkits / Spyware / National Security Agency / Computer insecurity / Espionage / Cryptography / Security

Security Now! #[removed]Cryptographic Backdoors  This week on Security Now! ● ●

Add to Reading List

Source URL: www.grc.com

Language: English - Date: 2015-01-20 15:34:17
52Malware / Cryptography / Backdoor / Rootkits / Spyware / Password / One-time password / SecurID / Security / Cyberwarfare / Computer security

A Framework to Eliminate Backdoors from Response-Computable Authentication Shuaifu Dai1 , Tao Wei1,2∗ , Chao Zhang1 , Tielei Wang3 , Yu Ding1 , Zhenkai Liang4 , Wei Zou1 1 Beijing Key Lab of Internet Security Technolo

Add to Reading List

Source URL: lenx.100871.net

Language: English - Date: 2012-08-15 18:04:31
53Compilers / GNU Compiler Collection / Programming language implementation / Objective-C / Java / D / C / Backdoor / Computing / Software / Cross-platform software

Trust No-one, Not Even Yourself OR The Weak Link Might Be Your Build Tools David Maynor Research Engineer ISS X-Force R&D

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:35
54Security / Malware / Computer security / Spyware / Cryptography / Keystroke logging / Threat / Backdoor / Data breach / Espionage / Cyberwarfare / Computer network security

DBIR_Supplemental_Cover_Code_OL

Add to Reading List

Source URL: www.verizonenterprise.com

Language: English - Date: 2010-05-06 20:00:00
55Disk encryption / Malware / Cryptographic software / Computer storage / Computer security / Rootkit / RAID / Solid-state drive / Cache / Computing / Software / System software

Implementation and Implications of a Stealth Hard-Drive Backdoor Jonas Zaddach†∗ Anil Kurmus‡∗ Travis Goodspeed¶

Add to Reading List

Source URL: www.s3.eurecom.fr

Language: English - Date: 2013-10-14 04:14:22
56Waste legislation / Electronic waste / Waste Electrical and Electronic Equipment Directive / Bulky waste / Recycling / Waste disposal authority / Waste Management /  Inc / Civic amenity site / Recycling in the United Kingdom / Waste management / Environment / Waste

Preventing ‘backdoor’ charging at household waste recycling centres Government’s response to consultation March 2015 Department for Communities and Local Government

Add to Reading List

Source URL: www.gov.uk

Language: English - Date: 2015-03-04 10:44:10
57Waste legislation / Environmental Protection Act / Waste disposal authority / Recycling / Civic amenity site / Solid waste policy in the United States / Landfill in the United Kingdom / Environment / Waste management / Waste

Preventing ‘backdoor’ charging at household waste recycling centres January 2015 Department for Communities and Local Government

Add to Reading List

Source URL: www.gov.uk

Language: English - Date: 2015-01-22 10:36:10
58Spyware / Remote administration software / Trojan horses / Rootkits / Antivirus software / Computer virus / Keystroke logging / Backdoor / Back Orifice / Software / System software / Malware

TDDC03 Projects, Spring[removed]Trojans Philippe Farges, phifa124 Annick Tremblet, anntr946

Add to Reading List

Source URL: www.ida.liu.se

Language: English - Date: 2006-12-30 14:40:18
59Rootkits / Hyper-V / Backdoor / System software / Software / Hypervisor

Security Considerations in Cloud Deployments Matthew Garrett (cloud) Computing for the Enterprise

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2014-06-20 19:13:26
60Espionage / Veracode / Backdoor / Rootkit / Computer worm / Chris Wysopal / Spyware / InterBase / Extended Copy Protection / System software / Software / Malware

Detecting "Certified Pre-owned" Software and Devices Chris Wysopal April 17, 2009

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:30
UPDATE