Cyber-attack

Results: 386



#Item
141Cloud infrastructure / Emerging technologies / Apache Hadoop / Big data / Virtualization / Quantum Bigfoot / RCFile / Cloud computing / Computing / Centralized computing

APPLICATIONS Symantec Research Labs contributes to BigFoot by developing solutions for cyber security. The problems of attack attribution and situational awareness require highly scalable tools to classify, correlate and

Add to Reading List

Source URL: bigfootproject.eu

Language: English - Date: 2013-11-25 05:14:35
142Computer network security / Computer security / Stuxnet / Duqu / Rootkit / Zero-day attack / Advanced persistent threat / Internet security / Antivirus software / Cyberwarfare / Malware / System software

Weaponized Malware: A Clear and Present Danger Weaponized malware and advanced persistent threats raise the bar on endpoint security. Originally intended for cyber-espionage and cyber-warfare, these sophisticated attacks

Add to Reading List

Source URL: www.e92plus.com

Language: English - Date: 2014-01-23 09:10:43
143Henrietta Secondary School / PTT Bulletin Board System / Hong Kong / .hk / Internet in Hong Kong

Prof_talk_In view of Cyber Attack_20150428

Add to Reading List

Source URL: www.hkiod.com

Language: English - Date: 2015-03-11 23:03:25
144Cyberwarfare / Computer network security / Malware / Zero-day attack / Proprietary software / Spyware / Computer security / Computer insecurity / Computer virus / Software / System software / Antivirus software

ENDPOINT SECURITY WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

Add to Reading List

Source URL: containment.comodo.com

Language: English - Date: 2015-02-23 11:56:11
145Computer network security / Computer security / Hacking / National security / United States Cyber Command / Attack / Computer crimes / Cyberwarfare / Security

OPINION PIECE Private and public sectors must pull in same direction to combat cyber crime TOBIAS FEAKIN The Weekend Australian, Defence Supplement, p4

Add to Reading List

Source URL: www.aspi.org.au

Language: English - Date: 2013-10-09 20:40:11
146Military science / Hacking / Computer network security / Computer security / Information warfare / Internet-related prefixes / Attack / Risk / Threat / Cyberwarfare / Electronic warfare / War

What Ethics Has To Do With the Regulation of Cyberwarfare by Mariarosaria Taddeo Since the first cyber-attack to Estonian websites in 2008, the debate surrounding the regulation of cyberwarfare has grown fast and has

Add to Reading List

Source URL: www.ethikundmilitaer.de

Language: English - Date: 2014-11-27 11:41:49
147Security / Software testing / Hacking / Electronic commerce / Vulnerability / Network vulnerability scan / Hydrauliska Industri AB / Attack / Social vulnerability / Computer network security / Computer security / Cyberwarfare

HIABâ„¢ Vulnerability Management for Internal Networks Market Landscape External threats like cyber crime and corporate espionage concern many organizations, however, many security breaches are caused by those with acces

Add to Reading List

Source URL: www.outpost24.com

Language: English - Date: 2013-09-06 03:49:26
148Network architecture / Shadowserver / Botnet / Denial-of-service attack / Internet-related prefixes / Malware / Computer security / Syslog / Border Gateway Protocol / Computer network security / Computing / Internet

An In-Depth Look at the Georgia-Russia Cyber Conflict of 2008

Add to Reading List

Source URL: www.shadowserver.org

Language: English - Date: 2009-01-03 16:22:01
149Security / Data security / Hacking / Secure communication / Intrusion detection system / Vulnerability / Network security / Attack / Anomaly detection / Cyberwarfare / Computer security / Computer network security

Deploying Statistical Anomaly Detection to Improve Cyber Security: Strategy, Benefits, and Results Dr. Greg Shannon, Chief Scientist, CounterStorm, Inc. There will always be new vulnerabilities in the information network

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-11 16:57:20
150Henrietta Secondary School / PTT Bulletin Board System / Hong Kong / .hk / Internet in Hong Kong

Prof_talk_In view of Cyber Attack_20150428

Add to Reading List

Source URL: hkiod.com

Language: English
UPDATE