Cyberwarfare

Results: 11990



#Item
561E-commerce / Cybercrime / Cyberwarfare / Computer network security / Computer security / Cryptography / Consumer privacy / Internet privacy / Privacy / Cyber-security regulation / New Jersey Cybersecurity and Communications Integration Cell

White Paper: Clearing the Red Tape Ensnaring Cybersecurity Collaboration

Add to Reading List

Source URL: internetidentity.com

Language: English - Date: 2014-07-11 18:43:09
562Computing / Computer network security / Multi-agent systems / Spamming / Concurrent computing / Cyberwarfare / Botnet / Distributed computing / Computer virus / Malware / Algorithmic trading / Antivirus software

BOT-TREK CYBER INTELLIGENCE ci.group-ib.com GROUP-IB REPORT: ANALYSIS OF ATTACKS AGAINST TRADING AND BANK CARD

Add to Reading List

Source URL: www.group-ib.ru

Language: English - Date: 2016-02-08 03:52:06
563Cyberwarfare / Computer security / Computing / Computer network security / Hacking / Software testing / Vulnerability / CERT Coordination Center / SQL injection / Cross-site scripting / CVSS / Zero-day

Reporting Status of Vulnerability-related Information about Software Products and Websites - 2nd Quarter ofApril – June) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency Respon

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2016-03-17 21:00:12
564Computer network security / Computer security / Cyberwarfare / OWASP / Computing / Application security / WebScarab

The New OWASP Testing Guide v4 Matteo Meucci OWASP Testing Guide Co-lead 17th March 2015 – Security Summit - OWASP-Italy

Add to Reading List

Source URL: www.securitysummit.it

Language: English - Date: 2015-04-08 09:33:42
565Cyberwarfare / Cryptography / Spyware / National security / Rootkits / Malware / Backdoor / Computer security

Challenges of Coordinated Linux & Android Intrusions IMF 2014 Eoghan Casey May 12, 2014

Add to Reading List

Source URL: www.imf-conference.org

Language: English - Date: 2014-05-21 12:58:37
566Computer security / Cyberwarfare / Computing / Computer network security / Software testing / Internet security / Cyber-Insurance / Vulnerability / CERT Coordination Center / Zero-day / Bug bounty program / Attack

A Comparison of Market Approaches to Software Vulnerability Disclosure Rainer B¨ ohme Technische Universit¨ at Dresden

Add to Reading List

Source URL: www.is.uni-muenster.de

Language: English - Date: 2012-12-21 05:49:44
567Computer security / Cyberwarfare / Computing / Hacking / Computer network security / Software testing / Vulnerability / CERT Coordination Center / SQL injection / Cross-site scripting / CVSS / Benjamin Kunz Mejri

Reporting Status of Vulnerability-related Information about Software Products and Websites - 4th Quarter ofOctober – December) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2016-03-17 21:00:12
568Cyberwarfare / Computer security / Security / Computer network security / Software testing / Hacking / Cryptography / Secure communication / Vulnerability

Subject: Request to Attend Trail of Bits Training Dear [DECISION MAKER], I would like to request approval to attend a Trail of Bits training course, taking place from [DATES] in [CITY]. The program offers comprehensive,

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:18
569Cryptography / Security / Cyberwarfare / Clipper chip / Key escrow / Crypto Wars / Computer security / Strong cryptography / National Security Agency / Escrow / Encryption / Secure communication

Keys Under Doormats: mandating insecurity by requiring government access to all data and communications Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2015-12-10 18:36:20
570Computer security / Cybercrime / National security / Computer network security / Cyberwarfare / Fox-IT / Threat / Supply chain attack / Outline of computer security

Fox-IT vormtaal patroon-0,3 cmyk

Add to Reading List

Source URL: www.fox-it.com

Language: English - Date: 2016-02-28 10:36:02
UPDATE