Cyber spying

Results: 65



#Item
11Espionage / Computing / Trojan horse / Malware / Ghost Rat / Email / Computer virus / Cyber spying / Antivirus software / Spyware / Social engineering / Security

Lecture 30: Mounting Targeted Attacks with Trojans and Social Engineering — Cyber Espionage Lecture Notes on “Computer and Network Security” by Avi Kak ([removed]) April 22, 2014

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2014-04-22 16:08:25
12Security / Cyberwarfare / Computer crimes / Electronic warfare / National security / Cyber spying / Hacker / Computer security / Cyberwarfare in the United States / Cybercrime / Hacking / Computing

[removed]Chinese hackers attack blue-chip groups via Forbes website - FT.com Home Africa

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2015-02-10 14:55:33
13National security / Electronic warfare / Hacking / Computer crimes / Military technology / United States Cyber Command / Cyber spying / Industrial espionage / Information Warfare Monitor / Cyberwarfare / Cybercrime / Espionage

Hidden Arena: Cyber Competition and Conflict in Indo-Pacific Asia James Lewis Prepared for the Lowy Institute MacArthur Asia Security Project Executive summary Cyber infrastructure is critical to the global economy. Yet

Add to Reading List

Source URL: csis.org

Language: English - Date: 2013-03-07 12:35:38
14National security / Hacking / Computer crimes / Computer security / Military technology / United States Cyber Command / Weapon of mass destruction / Advanced persistent threat / Cyber spying / Cybercrime / Security / Cyberwarfare

Statement for the Record Worldwide Threat Assessment of the US Intelligence Community

Add to Reading List

Source URL: www.dni.gov

Language: English - Date: 2015-02-26 08:28:05
15National security / Hacking / Electronic warfare / Espionage / Military technology / Cyber spying / Central Intelligence Agency / Huawei / Cyberwarfare in the United States / Cyberwarfare / Cybercrime / Security

Strategy: Planning the unthinkable war:‘AirSea Battle’ and its implications for Australia

Add to Reading List

Source URL: www.aspi.org.au

Language: English - Date: 2013-10-09 20:45:34
16Security / Military science / Computer crimes / Electronic warfare / Military technology / Australian Defence Force / Cyber spying / Cyberwarfare in the United States / United States Cyber Command / Cyberwarfare / Hacking / National security

Cyber Defence and Warfare Desmond Ball and Gary Waters The 2013 Defence White Paper includes security against major cyber attacks on Australia as an element of our ‘defence of Australia’ national strategic interest.

Add to Reading List

Source URL: www.securitychallenges.org.au

Language: English - Date: 2013-07-05 06:36:59
17Politics / Asia-Pacific Economic Cooperation / Asia Pacific Parliamentary Forum / International relations

AGENDA Regional and International Situation : Politics and Security • Strengthening peace and security in the region • Cyber spying: rights to privacy and communications security

Add to Reading List

Source URL: www.23appf.ec

Language: English - Date: 2014-12-18 12:09:40
18National security / Hacking / Crime / Military technology / Computer security / Cyber spying / Internet privacy / Cyber-security regulation / National Strategy to Secure Cyberspace / Security / Cyberwarfare / Computer crimes

CYBER SECURITY STRATEGY │AN OVERVIEW © Commonwealth of Australia 2009 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without prior writ

Add to Reading List

Source URL: www.ag.gov.au

Language: English - Date: 2015-03-01 23:47:46
19Hacking / Security / Computer crimes / Electronic warfare / Military technology / United States Cyber Command / Department of Defense Strategy for Operating in Cyberspace / Information warfare / Cyber spying / Cyberwarfare / Military science / National security

1   Australian Defence Policy in the Information Age Submission for the 2015 Australian Defence White Paper Greg Austin 1

Add to Reading List

Source URL: defence.gov.au

Language: English - Date: 2014-09-29 21:59:05
20Cyberwarfare / Crime / Hacking / Computer security / Cyber spying / Internet privacy / Cyber-bullying / Cyber-security regulation / Cybercrime and countermeasures / Computer crimes / Security / National security

DOC Document

Add to Reading List

Source URL: www.ag.gov.au

Language: English - Date: 2015-03-01 23:47:46
UPDATE