Computer security software

Results: 11097



#Item
161Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Avira / Computer virus / Zero-day / Marcin Kleczynski

C A S E S T U DY Knutson Construction builds better malware defenses Minnesota construction company uses Malwarebytes Anti-Malware to clean up serious malware outbreak

Add to Reading List

Source URL: es.malwarebytes.com

Language: English - Date: 2016-07-07 18:34:11
162Software / Computing / Computer architecture / Computing platforms / Monolithic kernels / Kernel / Linux kernel / Address space layout randomization / Linux / Android / User space

Anatomy of a Remote Kernel Exploit Dan Rosenberg Copyright © 2011 Virtual Security Research, LLC.

Add to Reading List

Source URL: vulnfactory.org

Language: English - Date: 2012-01-16 13:38:49
163Computing / Computer access control / Software / Access control / Password / Security / User / Veterans of Foreign Wars / Login / Prepared statement / Form

DEPARTMENT REPORTING GUIDELINES

Add to Reading List

Source URL: www.vfwca.org

Language: English - Date: 2015-06-24 11:41:19
164Computer security / Cyberwarfare / Software / Antivirus software / Malwarebytes / Malware / Ransomware / Computer virus / Rootkit / Zero-day / Marcin Kleczynski / IObit

C A S E S T U DY Electrical contracting firm short-circuits malware threats Briggs Electric uses Malwarebytes to remediate CryptoLocker and prevent malware from shocking its systems

Add to Reading List

Source URL: nl.malwarebytes.com

Language: English - Date: 2016-07-07 18:38:56
165Computing / Security / Cyberwarfare / Computer security / Crime prevention / Cryptography / Information governance / National security / Application security / Cross-site request forgery / Software development kit / Vulnerability

#1 GLOBAL PAYMENTS COMPANY OPTIMIZES SECURE DEVELOPMENT PROCESS WITH PREVOTY Trusted payments provider with deeply embedded secure development culture partners with Prevoty for standardized, real-time application protect

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2016-08-18 22:09:36
166Unix / Computing / Software / System software / Digital media / Research / System administration / USENIX / Cyber-physical system / Electronic submission / Computer security

Announcement and Call for Papers 4th Workshop on Cyber Security Experimentation and Test (CSET ’11) Sponsored by USENIX, the Advanced Computing Systems Association http://www.usenix.org/cset11

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-04-25 15:59:03
167Computing / Software / Security / Data management / Cyberwarfare / Secure communication / Computer network security / Computer security / Cryptography / Big data / Git / Data security

Microsoft PowerPoint - Security _ A Big Question for Big Data.ppt [Compatibility Mode]

Add to Reading List

Source URL: www.ischool.drexel.edu

Language: English - Date: 2014-02-06 12:27:42
168Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Trusteer / Avira / Computer virus / Zero-day / Marcin Kleczynski / IObit

C A S E S T U DY Allied Food gives malware a to-go package Restaurant operator supports PCI compliance with Malwarebytes Business profile

Add to Reading List

Source URL: br.malwarebytes.com

Language: English - Date: 2016-07-07 18:30:53
169Computing / Security / Computer security / Computer network security / Application security / Data center / Arxan Technologies / Software Development Security

Arxan Best Practices White Paper 7 Key Factors of a Highly Effective Application Protection Solution Abstract: This whitepaper discusses the key factors that enable an effective application protection solution -that mit

Add to Reading List

Source URL: www.arxan.com

Language: English - Date: 2016-08-01 23:51:09
170Ransomware / Malware / Computer security / Cyberwarfare / Locky / Phishing / Trend Micro / Antivirus software / Linux.Encoder.1

SOLUTION BRIEF Trend Micro RANSOMWARE PROTECTION FOR YOUR SMALL BUSINESS

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2016-05-18 13:59:03
UPDATE