Cyberwarfare

Results: 11990



#Item
571Security / Prevention / National security / Safety / Cybercrime / E-commerce / Cyberwarfare / Computer network security / Computer security / United States Cyber Command / Resilience / Cyber-attack

SUPERSTORM SANDY: IMPLICATIONS FOR DESIGNING A POST‑CYBER ATTACK POWER RESTORATION SYSTEM Paul Stockton Copyright © 2016 The Johns Hopkins University Applied Physics Laboratory LLC. All Rights Reserved.

Add to Reading List

Source URL: www.jhuapl.edu

Language: English - Date: 2016-03-29 09:30:55
572Computer security / Security / Cyberwarfare / Computer network security / Cryptography / Secure communication / Advanced persistent threat / Threat / Malware / SentinelOne / Damballa

Data Sheet What Makes Us Different Single pane of glass threat visibility and correlation

Add to Reading List

Source URL: go.cyphort.com

Language: English - Date: 2016-04-14 11:33:50
573Computing / ISO standards / Security / Software / Common Criteria / Cyberwarfare / Linux kernel / Kernel / Operating system / Computer security / Smart card / Toe

ICCC13 Brightsight Swieten Revised TSFI definition

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2012-09-25 07:21:09
574Ransomware / Cyberwarfare / Computer security / Security engineering / Malware / Malvertising

LUCRATIVE RANSOMWARE ATTACKS: Analysis of the CryptoWall Version 3 Threat EXECUTIVE SUMMARY The Cyber Threat Alliance (CTA) is a group of leading cybersecurity solution providers who have joined

Add to Reading List

Source URL: cyberthreatalliance.org

Language: English - Date: 2015-10-30 18:02:03
575Computing / Software / Computer security / Internet security / Computer network security / Internet privacy / Domain name system / DNS rebinding / Cyberwarfare / NoScript / Proxy server / Cross-site scripting

Protecting Browsers from DNS Rebinding Attacks Collin Jackson Adam Barth Andrew Bortz

Add to Reading List

Source URL: www.abortz.net

Language: English - Date: 2016-01-16 18:17:58
576Computer security / Address space layout randomization / Malware / Cyberwarfare

Attacker “Math” 101 Professor Dai Zovi Institute for the Advancement of Memory Corruption What is this all

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
577Cyberwarfare / Computing / Computer security / Computer network security / Internet security / Cryptography / Cybercrime / Electronic voting / Malware / Denial-of-service attack / Computer virus / Computer worm

Security Considerations for Remote Electronic Voting over the Internet Avi Rubin AT&T Labs – Research Florham Park, NJ

Add to Reading List

Source URL: avirubin.com

Language: English - Date: 2012-11-01 14:51:07
578Computing / Security engineering / Computer security / Security / Computer network security / Sqrrl / Threat / Cyberwarfare / Cybercrime / E-commerce / Big data / Information security operations center

DATASHEET SQRRL ENTERPRISE USE CASE: CYBER HUNTING Proactively uncover hidden threats through cyber hunting The days when Security Operations Center analysts could sit back and wait for alerts to come to them have long

Add to Reading List

Source URL: sqrrl.com

Language: English - Date: 2016-02-15 14:44:42
579Carnegie Mellon University / Cyberwarfare / Computer emergency response team / CERT Coordination Center / Computer security / Vulnerability / Attack

JPCERT/CC Activities Overview [July 1, 2015 – September 30, 2015]

Add to Reading List

Source URL: www.jpcert.or.jp

Language: English - Date: 2015-12-07 23:43:19
580Computing / Cyberwarfare / Computer security / Mobile Malware / Malware / Android / Shedun

Mobile Exploit Intelligence Project   Dan  Guido,  Trail  of  Bits   Mike  Arpaia,  iSEC  Partners     ShakaCon,    

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
UPDATE