Cyber-attack

Results: 386



#Item
61Cyberwarfare / Malware / Computer security / Computer network security / Deception / Rootkits / Zero-day / Computer virus / Ransomware / SentinelOne / Antivirus software / Computer worm

Malware and Exploits: An Introduction to Two Prominent Attack Vectors IN TODAY’S CYBER THREAT LANDSCAPE, NOT ALL ATTACKS ARE CREATED EQUAL Whether you’re a security practitioner focused on safeguarding your organizat

Add to Reading List

Source URL: www.sentinelone.com

Language: English - Date: 2016-05-23 01:13:39
62Security / Prevention / Cyberwarfare / Computer security / National security / Computer network security / Crime prevention / Cryptography / Threat / Cyber threat intelligence / Cyber-attack / Information security

The Importance of Cyber Threat Intelligence to a Strong Security Posture Sponsored by Webroot Independently conducted by Ponemon Institute LLC Publication Date: March 2015

Add to Reading List

Source URL: webroot-cms-cdn.s3.amazonaws.com

Language: English - Date: 2016-02-25 11:51:52
63

RED TEAM OPERATIONS. CONFIDENCE RESTORED. Are Your Information Security Investments Performing? Improve risk management through effective cyber defence and preparedness to deal with a real-world attack.

Add to Reading List

Source URL: www.cyberdefensemagazine.com

Language: English - Date: 2016-06-01 17:13:53
    64Computer security / Cyberwarfare / Computing / Computer network security / Software testing / Internet security / Cyber-Insurance / Vulnerability / CERT Coordination Center / Zero-day / Bug bounty program / Attack

    A Comparison of Market Approaches to Software Vulnerability Disclosure Rainer B¨ ohme Technische Universit¨ at Dresden

    Add to Reading List

    Source URL: www.is.uni-muenster.de

    Language: English - Date: 2012-12-21 05:49:44
    65Security / Prevention / National security / Safety / Cybercrime / E-commerce / Cyberwarfare / Computer network security / Computer security / United States Cyber Command / Resilience / Cyber-attack

    SUPERSTORM SANDY: IMPLICATIONS FOR DESIGNING A POST‑CYBER ATTACK POWER RESTORATION SYSTEM Paul Stockton Copyright © 2016 The Johns Hopkins University Applied Physics Laboratory LLC. All Rights Reserved.

    Add to Reading List

    Source URL: www.jhuapl.edu

    Language: English - Date: 2016-03-29 09:30:55
    66Cyberwarfare / Computer security / Computer network security / Cybercrime / National security / Cyber-attack / Denial-of-service attack / Malware / Stuxnet / Botnet / Attack / Spyware

    Global Mapping of Cyber Attacks Ghita Mezzour, L. Richard Carley, Kathleen M. Carley 2014 CMU-ISR

    Add to Reading List

    Source URL: www.casos.cs.cmu.edu

    Language: English
    67Computing / Internet / Cryptography / Cybercrime / Internet Standards / Internet protocols / Cyberwarfare / National security / Denial-of-service attack / Computer security / Border Gateway Protocol / DNS spoofing

    Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents Yang Liu1 , Armin Sarabi1 , Jing Zhang1 , Parinaz Naghizadeh1 Manish Karir2 , Michael Bailey3 , Mingyan Liu1,2 1 EECS Department, University of Michiga

    Add to Reading List

    Source URL: mdbailey.ece.illinois.edu

    Language: English - Date: 2015-08-05 18:31:26
    68

    Information protection Frequently Asked Questions What happened? On January 27, 2015, we discovered that malware had been installed on some of Aurora’s workstations and servers via a sophisticated cyber attack. Immedia

    Add to Reading List

    Source URL: krebsonsecurity.com

    Language: English - Date: 2015-03-18 11:21:28
      69

      CBEST/STAR Threat Intelligence Systemically-important financial institutions that form part of the UK’s Critical National Infrastructure need to remain resilient to cyber attack. To help them achieve this, the Bank o

      Add to Reading List

      Source URL: www.digitalshadows.com

      Language: English - Date: 2016-03-04 15:48:27
        70Control engineering / Architecture Analysis & Design Language / Architecture description language / Software architecture / Systems architecture / Resilient control systems / Embedded system / Cyber-physical system / Computer security / Simulink / Networked control system / Control theory

        Towards Synthesis of Platform-aware Attack-Resilient Control Systems ∗ Extended Abstract Miroslav Pajic1

        Add to Reading List

        Source URL: www.georgejpappas.org

        Language: English - Date: 2013-05-22 16:56:10
        UPDATE