Cyber-attack

Results: 386



#Item
101Software bugs / Computer errors / Assembly languages / Buffer overflow / Stack buffer overflow / Denial-of-service attack / Stack / Call stack / Address space layout randomization / Computing / Software engineering / Computer programming

Automatic Diagnosis and Response to Memory Corruption Vulnerabilities Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris Bookholt Cyber Defense Laboratory Department of Computer Science North Carolina State University

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:02
102Communications protocol / ANT / Key distribution / Man-in-the-middle attack / Cryptography / Public-key cryptography / Message authentication code

Practical Broadcast Authentication in Sensor Networks ∗ Donggang Liu Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University {dliu,pning}@ncsu.edu

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:12
103Security / Computer security / Hacking / Military technology / Stuxnet / Malware / Attack / Cyberterrorism / Cyber-security regulation / Cyberwarfare / Computer crimes / Computer network security

PDF Document

Add to Reading List

Source URL: www.rolandberger.com

Language: English - Date: 2015-03-05 01:27:15
104Security / Computing / Antivirus software / Denial-of-service attack / Internet Relay Chat / Computer insecurity / Whitelist / Cloud computing / Application firewall / Computer network security / Cyberwarfare / Computer security

Foresight ReleasesCloud-Based Website Security Platform Foresight-AIRFirst Product to Protect Organizations’ Network, Host, and Application Layers from Cyber Attacks of All Types, While Ensuring OptimalSite Performance

Add to Reading List

Source URL: www.sentrix.com

Language: English - Date: 2014-09-01 03:58:10
105Denial-of-service attack / Internet Relay Chat / LAND / Computing / Denial-of-service attacks / Computer network security / Cyberwarfare

National Cyber Security Centre NCSC Security Advisory 06 May 2015

Add to Reading List

Source URL: www.ncsc.govt.nz

Language: English - Date: 2015-05-05 19:23:05
106Mobile banking / Saudi Arabia / Bank / Core banking / Booz Allen Hamilton / Asia / Computer crimes / Malware

Survey sheds light on Saudi Arabia’s evolving online & mobile banking risks Financial services are the most lucrative target for cyber criminals. A financially motivated attack is reported every 14 seconds in the GCC c

Add to Reading List

Source URL: mena.boozallen.com

Language: English - Date: 2015-04-24 05:20:23
107ISO standards / Ubiquitous computing / Gemalto / Card reader / EMV / ExpressCard / Universal Serial Bus / Laptop / USB flash drive / Smart cards / Computer hardware / Computing

IDBridge PC-Link readers The leading link to secure access Cyber attack and identity theft continue to increase and become more sophisticated as businesses harness the power of online services for business applications.

Add to Reading List

Source URL: www.gemalto.com

Language: English - Date: 2014-08-04 10:51:23
108Computer network security / Military intelligence / Intelligence analysis / Computer security / Crime prevention / Threat / Central Intelligence Agency / Defense Intelligence Agency / Intelligence cycle management / National security / Security / Cyberwarfare

THREAT INTELLIGENCE MAKING SENSE OF THREAT INTELLIGENCE UNDERSTANDING HOW TO LEVERAGE THREAT INTELLIGENCE WITHIN THE CYBER SECURITY ATTACK DETECTION AND RESPONSE PROCESS

Add to Reading List

Source URL: www.tier-3.com

Language: English - Date: 2015-01-14 19:38:20
109Identity theft / Credit report monitoring / AllClear ID / Credit freeze / Credit card / Credit bureau / Credit history / Experian / Equifax / Financial economics / Credit / Fair and Accurate Credit Transactions Act

Anthem has provided information on how to immediately enroll in no-cost credit protection services to all members who may be potentially impacted by the cyber-attack. Human Resources is sharing this information with pote

Add to Reading List

Source URL: www.hrs.colostate.edu

Language: English - Date: 2015-02-15 19:41:03
110Crime prevention / Computer network security / Cyberwarfare / Information security / Attack / National Security Agency / Cyber-security regulation / Cyber security standards / Security / Computer security / National security

Justifying Security Spending

Add to Reading List

Source URL: www.e-cop.net

Language: English - Date: 2011-04-26 10:50:34
UPDATE