Cyberwarfare

Results: 11990



#Item
11Computer security / Cyberwarfare / Software / Antivirus software / Malwarebytes / Malware / Ransomware / Computer virus / Rootkit / Zero-day / Marcin Kleczynski / IObit

C A S E S T U DY Electrical contracting firm short-circuits malware threats Briggs Electric uses Malwarebytes to remediate CryptoLocker and prevent malware from shocking its systems

Add to Reading List

Source URL: pt.malwarebytes.com

Language: English - Date: 2016-07-07 18:41:23
12Security / Cyberwarfare / Crime prevention / Cryptography / Information governance / National security / Computer network security / Computer security

Lawson Security Gain Momentum with Lawson Foundation 9.0 (LSF9) Security System

Add to Reading List

Source URL: www.ksols.com

Language: English - Date: 2014-10-14 22:33:10
13Computer security / Security / Cyberwarfare / Software testing / Cybercrime / Computer network security / Hacking / Cryptography / Vulnerability / Responsible disclosure / Phishing / Security testing

RESPONSIBLE DISCLOSURE POLICY    1.  General  Information.  The  SiteLock,  LLC   (“SiteLock”)  Responsible  Disclosure  Policy  details  the  process  by  which  SiteLock  publicly  discloses 

Add to Reading List

Source URL: www.sitelock.com

Language: English - Date: 2016-07-05 10:59:14
14Security / Computer security / Computing / HackerOne / Cloud storage / Cyberwarfare / OwnCloud / Vulnerability

owncloud_Case-Study_with_HackerOne_v5

Add to Reading List

Source URL: oc.owncloud.com

Language: English - Date: 2016-07-16 05:34:16
15Security / Prevention / Cyberwarfare / Safety / National security / Cybercrime / E-commerce / Computer security / Resilience / Cyberterrorism / Insurance / Cyber-Insurance

Testimony of Peter J. Beshar Before the Presidential Commission on Enhancing National Cybersecurity

Add to Reading List

Source URL: www.marsh.com

Language: English - Date: 2016-05-16 15:41:54
16Security / Cyberwarfare / Computer network security / Computer security / National security / Cybercrime / Cryptography / University of California / Merced /  California / Threat

Wednesday,  October  2 8,  2 015  at  1 2:37:42  PM  Pacific  Daylight  Time Subject: Mandatory  Cyber  Security  Awareness  Training  by  Jan.  31,  2016 Date: Friday

Add to Reading List

Source URL: it.ucmerced.edu

Language: English - Date: 2015-12-01 12:48:01
17Security / Computer network security / Cyberwarfare / Computer security / Cybercrime / Cryptography / Threat

Experimental  Challenges  in  Cyber  Security:   A  Story  of  Provenance  and  Lineage  for  Malware   Tudor  Dumitraș                  

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-08-22 18:12:38
18Security / Cyberwarfare / E-commerce / Internet bot / Credential stuffing / Computer security / Malaysia Airlines / Airline

F100 Airline Case Study INTERNATIONAL AIRLINE FIGHTS FARE SCRAPERS

Add to Reading List

Source URL: www.shapesecurity.com

Language: English - Date: 2016-08-12 14:49:29
19Cyberwarfare / Security / Computer security / Cybercrime / National security / Computer network security / Cryptography / Cyber-security regulation / Cybersecurity CS5L CMM

Security  is  Not  a  Commodity:   The  Road  Forward  for  Cybersecurity  Research   Stefan  Savage   UC  San  Diego    

Add to Reading List

Source URL: cra.org

Language: English - Date: 2016-03-07 14:51:02
20Computing / Cyberwarfare / Cybercrime / Spamming / Computer security / Computer network security / Identity theft / Phishing / Malware / Computer virus / Carbanak / Email spam

TABLE OF CONTENTS Introduction 2 Key findings

Add to Reading List

Source URL: www.group-ib.com

Language: English - Date: 2016-03-17 04:17:16
UPDATE