Computer security

Results: 47159



#Item
791Cyberwarfare / Computer security / Cybercrime / Malware / Rootkits / Cryptography / CrySyS Lab / Duqu / Stuxnet / Flame / Wiper / Ambient intelligence

Introducing the CrySyS Lab Levente Buttyán Laboratory of Cryptography and System Security (CrySyS Lab) Department of Networked Systems and Services Budapest University of Technology and Economics www.crysys.hu

Add to Reading List

Source URL: www.crysys.hu

Language: English - Date: 2016-07-26 04:36:44
792Software / Antivirus software / Computer security / System software / Malwarebytes / Malware / Zero-day / Marcin Kleczynski

C A S E S T U DY Faith Regional Health Services inoculates itself against malware Healthcare provider blocks malware and exploits with Malwarebytes Endpoint Security Business profile

Add to Reading List

Source URL: pl.malwarebytes.com

Language: English - Date: 2016-07-06 12:41:45
793Information privacy / Privacy law / Computer security / Computing / Prevention / General Data Protection Regulation / Data security / Security / IT risk / Right to be forgotten / Regulatory compliance / Data portability

pwc_master_logo_shortform

Add to Reading List

Source URL: www1.pwc.ch

Language: English - Date: 2016-07-04 03:06:01
794Computing / Cyberwarfare / Computer security / Computer network security / Spamming / Multi-agent systems / Cybercrime / Botnet / Malware / Antivirus software / Rootkit / Bitcoin

ReportThreats Predictions By McAfee® Labs™

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:00:32
795Computer security / Software / System software / Antivirus software / Zemana

Zemana AntiLogger You need smarter protection against the bad guys who are trying to steal your financial credentials, gain access to your private online accounts and even your identity. What 

Add to Reading List

Source URL: dl9.zemana.com

Language: English - Date: 2016-08-16 09:29:59
796Software / Computer access control / Password / Security / Prevention / ANI / Cursor / Icon / Point and click / Draw a Secret / Pointer

A Random Cursor Matrix to Hide Graphical Password Input Alice Boit Thomas Geimer Hochschule Bremen (University of Applied Sciences) J¨orn Loviscach∗

Add to Reading List

Source URL: www.j3l7h.de

Language: English - Date: 2009-08-23 13:49:42
797Security / Computer security / Cyberwarfare / Crime prevention / Cryptography / Information governance / National security / Formal methods / Formal / Geographic information system / Privacy / Internet privacy

Summary: the NSF Workshop on Formal Methods for Security Stephen Chong Joshua Guttman

Add to Reading List

Source URL: web.cs.wpi.edu

Language: English - Date: 2016-08-02 20:31:35
798Computer access control / Computer security / Security / Authentication / Login / User / Password

Notice 3 Dear Students, If your quota has been exceeded please use this temporary credentials as per the below username :cstd Password :Gust@#2016 ----------------------

Add to Reading List

Source URL: courseweb.sliit.lk

Language: English - Date: 2016-08-12 02:51:55
799Internet privacy / Computing / Computer security / HTTP cookie / Digital media / Privacy / Personally identifiable information / Medical privacy / P3P / Privacy concerns regarding Google

Privacy Statement Coldwell Banker The Property Shoppe Real Estate Brokerage Last modifiedColdwell Banker The Property Shoppe Real Estate Brokerage is an independently owned and

Add to Reading List

Source URL: www.pecoldwell.com

Language: English - Date: 2012-04-11 08:54:53
800Computer access control / Cryptography / Computer security / Security / Access control / Usability / Authentication / Notary / Packaging / Implicit authentication / Password

Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying Hassan Khan, Urs Hengartner, and Daniel Vogel Cheriton School of Computer Science University of Waterloo Waterloo, ON

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 12:56:58
UPDATE