Cyberwarfare

Results: 11990



#Item
791Computer security / Electronic warfare / Hacking / Military technology / SCADA / Cyber security standards / Cyberwarfare / Technology / Security

Can Security Certification Control Cyber Risk? November 12, 2010 Industrial devices comply with many standards, but Security certification is a relatively new area that is quickly rising in importance as devices are incr

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:14
792Cyberwarfare / Crime prevention / National security / Computer crimes / DShield / Phishing / Password / Malware / Vulnerability / Cybercrime / Computer security / Computer network security

  Reconceptualizing the Role of Security User L. Jean Camp Abstract: The Internet is not the only critical infrastructure that relies on the participation of

Add to Reading List

Source URL: www.ljean.com

Language: English - Date: 2014-06-07 19:18:24
793National security / Security / Economic Espionage Act / Industrial espionage / Technical intelligence / Sino-American relations / Chinese intelligence activity abroad / Death by China / Cyberwarfare / Trade secrets / Espionage

1 China’s Cyberespionage: The National Security Distinction and U.S. Diplomacy Greg Austin1 In January 2011, the United States and China agreed for the first time at head of state level to include cybersecurity as an

Add to Reading List

Source URL: thediplomat.com

Language: English - Date: 2015-05-21 18:14:05
794Technology / Hacking / Computer network security / Computer security / Secure communication / SCADA / Vulnerability / Automation / Security testing / Software testing / Cyberwarfare / Security

Emerson Process Management Integrates Achilles Testing June 15, 2009 Wurldtech Announces The Latest Equipment Manufacturer To Select The Award-Winning Achilles Security & Robustness Testing Platform Demonstrating Continu

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:14
795Computer crimes / Spamming / Phishing / Social engineering / Malware / Threat / Cyberwarfare / Email / Spam / Cybercrime / Internet / Computing

Data Feeds Cyber criminals launch thousands of cyber attacks every day, and compromise thousands of legitimate websites, to spread malware, capture account credentials, launch phishing attacks, and perpetrate fraud. Thes

Add to Reading List

Source URL: info.cyveillance.com

Language: English - Date: 2015-07-18 11:24:51
796Disneyland Park / Hong Kong Disneyland / Tokyo Disneyland / Tomorrowland / Cyberwarfare / Today / Resilience / Isaac Asimov / Psychological resilience / Science fiction / Literature / Magic Kingdom

10 The National/Saturday, June 6, 2015 OPINION

Add to Reading List

Source URL: theplayethic.typepad.com

Language: English - Date: 2015-06-06 05:58:06
797Antivirus software / Rootkits / Rogue software / Zeus / Spyware / Web threat / Malware / System software / Cyberwarfare

G DATA Malware Report H2 2014

Add to Reading List

Source URL: public.gdatasoftware.com

Language: English - Date: 2015-05-13 08:12:41
798Computing / Software testing / Electronic commerce / Hacking / SecurityMetrics / Penetration test / Vulnerability / Application security / Attack / Computer security / Cyberwarfare / Computer network security

SecurityMetrics Penetration Testing How do you really know if your sensitive data is secure? Even the best developers can accidentally miss secure coding steps, or fail to implement the latest secure coding practices.

Add to Reading List

Source URL: www.securitymetrics.com

Language: English - Date: 2015-07-14 12:51:45
799Data collection / Espionage / Cyberwarfare / Signals intelligence / Elbit Systems / Electronic warfare / Signals intelligence by alliances /  nations and industries / Signals intelligence operational platforms by nation / National security / Intelligence / Intelligence gathering disciplines

June 11, 2015 Paris Air Show 2015: Elbit Systems Launches Air Keeper - A Unique Airborne SIGINT and EW Solution Already operational, the new solution is suitable for cargo, transport or

Add to Reading List

Source URL: www.elbitsystems.com

Language: English - Date: 2015-06-11 07:36:05
800Computer network security / Software testing / Hacking / Vulnerability / Application security / Code injection / Qualys / Web application security / Acunetix / Computer security / Cyberwarfare / Computing

Vulnerability Factors in New Web Applications: Audit Tools, Developer Selection & Languages Jason Bau, Frank Wang, Elie Bursztein, Patrick Mutchler, John C. Mitchell Stanford University Abstract—We develop a web appli

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2013-02-22 17:29:44
UPDATE