Computer worm

Results: 494



#Item
121Security / Malware / Hacking / Software testing / Buffer overflow / Address space layout randomization / Computer worm / Attack / Vulnerability / Computer security / Cyberwarfare / Computer network security

Sting: An End-to-End Self-healing System for Defending against Zero-day Worm Attacks on Commodity Software James Newsome David Brumley

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
122Cyberwarfare / Computer network security / Actuarial science / Patch / Vulnerability / Computer worm / Attack / Social vulnerability / Transdermal patch / Security / Computer security / Risk

VOLUME THREE · ISSUE TWO Secure Business Quarterly: Defining the Value of Strategic Security ILLUSTRATION: JUD GUITTEAU

Add to Reading List

Source URL: www.homeport.org

Language: English - Date: 2014-06-11 12:01:38
123Antivirus software / Rogue software / Scareware / Computer virus / Spyware / Computer worm / Avira / Linux malware / Avast! / Malware / System software / Software

MALWARE PREVENTION Are your computers riddled with spyware, viruses, malware or bots? Has your browser been hijacked, your passwords secretly recorded by someone in Russia? How would you know? Your computer may be infect

Add to Reading List

Source URL: www.jknutson.com

Language: English - Date: 2010-02-15 17:45:10
124Rogue software / Antivirus software / Social engineering / Scareware / Spyware / Computer worm / MS Antivirus / Trojan horse / Rogue security software / Malware / System software / Software

FREE Consumer Awareness Guide: How To Keep Your Computer Safe From Crippling Pop-ups, Viruses, Spyware, & Spam, While Avoiding Expensive Computer Repair Bills Do you constantly get hammered by pop-up ads that come from

Add to Reading List

Source URL: www.rosebudtech.com

Language: English - Date: 2012-08-14 16:39:50
125Cyberwarfare / Computer network security / Malware / Spyware / Social engineering / Web threat / Botnet / Computer worm / Anti-spam techniques / Espionage / Spamming / Computing

Internet Safety for Kids & Families The Basics of Web Threats Web Threats: Web threats are malicious software programs such as spyware, adware, trojan horse programs, bots, viruses, or worms, etc. that

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2011-12-06 20:06:01
126Failure / Code Red / Hacking / Software testing / Vulnerability / Buffer overflow / Computer virus / Computer worm / Attack / Cyberwarfare / Computer security / Computer network security

Microsoft Word - PrestonLoftonEiC.doc

Add to Reading List

Source URL: www.mcandl.com

Language: English - Date: 2012-06-07 14:18:01
127Windows Server / Windows / Email archiving / Backup / NTFS / Enterprise content management / File system / Computer file / Operating system / Computing / Microsoft Windows / System software

FileLock – Simplify Compliance A cost-effective solution for data archiving PRODUCT HIGHLIGHTS ■ Compliant – Files are WORM locked following predefined policies.

Add to Reading List

Source URL: www.newwavetech.com

Language: English - Date: 2015-04-20 05:09:48
128Malware / Hacking / Software testing / Buffer overflow / Vulnerability / Computer worm / Computer virus / Social vulnerability / Cyberwarfare / Computer security / Failure

Sting: An End-to-End Self-Healing System for Defending against Internet Worms David Brumley1 , James Newsome2 , and Dawn Song3 1 2 3

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
129Software / Web threat / Microsoft Security Essentials / Computer worm / Rogue security software / Conficker / Targeted threat / Linux malware / Norton Internet Security / Malware / System software / Antivirus software

Security Threat Report 2012 Seeing the Threats Through the Hype www.getadvanced.net

Add to Reading List

Source URL: www.getadvanced.net

Language: English - Date: 2013-04-16 08:43:36
130Computing / Phishing / Social engineering / Crimeware / Email spam / Spam / Anti-Phishing Working Group / Computer worm / Spamming / Internet / Malware

Phishing Activity Trends Report 4 Quarter 2012 th

Add to Reading List

Source URL: docs.apwg.org

Language: English - Date: 2013-04-24 08:29:57
UPDATE