Computer worm

Results: 494



#Item
241Computer network security / Patch / Software maintenance / Vulnerability management / Vulnerability / Social vulnerability / Computer worm / Computer security / Cyberwarfare / Computing

Limiting Vulnerability Exposure through effective Patch Management: threat mitigation through vulnerability remediation Submitted in fulfilment of the requirements of the degree

Add to Reading List

Source URL: singe.za.net

Language: English - Date: 2007-02-05 16:42:05
242Malware / Computer worm / Morris worm / Machine learning / Fingerprint / Security / Science / Technology / Lie detection / Polygraph / Pseudoscience

Fast and Effective Worm Fingerprinting via Machine Learning Stewart Yang, Jianping Song, Harish Rajamani, Taewon Cho Yin Zhang and Raymond Mooney Department of Computer Sciences, University of Texas at Austin, Austin, TX

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2006-05-01 13:42:52
243Cross-site scripting / Cross-platform software / JavaScript / Document Object Model / OWASP / XSS worm / Computing / Cyberwarfare / Computer security

Unraveling some of the Mysteries around DOM-based XSS Dave Wichers Aspect Security, COO OWASP Boardmember OWASP Top 10 Project Lead

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-04-18 21:58:35
244Rogue software / Antivirus software / Spyware / Computer network security / Computer virus / Computer worm / Trojan horse / Privacy-invasive software / Installware / Malware / System software / Espionage

Protecting Yourself Online A Quick and Simple Guide to Information Security Joseph Guarino Owner/CEO/Sr. Consultant Evolutionary IT CISSP, LPIC, MCSE 2000, MCSE 2003, PMP www.evolutionaryit.com

Add to Reading List

Source URL: evolutionaryit.com

Language: English - Date: 2014-11-12 19:02:02
245Morris worm / Certified Wireless Network Administrator / Computing / Computer security / Welchia / Computer worms / Blaster / Cyberwarfare

Case Study - Worm’s, Virus’s and Bot’s – Attacking From Within… Phill Shade (Forensic Engineer – Merlion’s Keep Consulting) 1

Add to Reading List

Source URL: sharkfest.wireshark.org

Language: English - Date: 2012-06-26 19:23:12
246Espionage / Veracode / Backdoor / Rootkit / Computer worm / Chris Wysopal / Spyware / InterBase / Extended Copy Protection / System software / Software / Malware

Detecting "Certified Pre-owned" Software and Devices Chris Wysopal April 17, 2009

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:30
247Computer security / Multi-agent systems / Spamming / Malware / Botnets / Computer worm / Rootkit / Trojan horse / Antivirus software / Computer network security / Computing / Cyberwarfare

Unclassified DSTI/ICCP/REG[removed]Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-21 01:44:21
248System software / Multi-agent systems / Spamming / Botnets / Distributed Component Object Model / Dabber / Sasser / Zombie / Computer worm / Malware / Computing / Computer network security

Network Early Warning Systems Mike Poor [removed] © 2006 Mike Poor & Intelguardians

Add to Reading List

Source URL: www.inguardians.com

Language: English - Date: 2013-04-24 12:17:57
249Espionage / Computer network security / Antivirus software / Trojan horse / Computer worm / Botnet / Computer virus / Spyware / Rootkit / Malware / System software / Cyberwarfare

DSTI/ICCP/REG[removed]FINAL FOREWORD Addressed primarily to policy makers, this report has been developed in the course of 2007, by the OECD Working Party on Information Security and Privacy (WPISP) in partnership with t

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-21 04:20:17
250Cybercrime / Spamming / Malware / Antivirus software / Computer network security / Phishing / Transaction authentication number / Trojan horse / Computer worm / Cyberwarfare / Computer security / Social engineering

Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil T +[removed]F +[removed]

Add to Reading List

Source URL: www.csnc.ch

Language: English - Date: 2015-02-10 04:35:34
UPDATE