Cyberwarfare

Results: 11990



#Item
831Privilege escalation / Lenovo / Vulnerability / Code signing / Malware / Privilege / Access token / Ring / Computer security / Computing / Cyberwarfare

IOActive Security Advisory Title Lenovo’s System Update Uses a Predictable Security Token Severity

Add to Reading List

Source URL: ioactive.com

Language: English
832Institutional investors / Electronic warfare / Military technology / Insurance / Economics / Protection and indemnity insurance / Cyberwarfare / Risk purchasing group / Types of insurance / Financial economics / Financial institutions

SEAWORTHINESS AND CYBER SECURITY – THE HIDDEN THREAT TO SHIPPING INSURING CYBER IN THE MARITIME INDUSTRY 23 JULY 2014

Add to Reading List

Source URL: www.seasecurity.org

Language: English - Date: 2014-07-24 03:54:18
833Cyberwarfare / Bletchley Park / NCR Corporation / Alan Turing / Bombe / Enigma machine / Reflector / Known-plaintext attack / Plugboard / Cryptography / Espionage / Rotor machines

The Tentatve List of Enigma and Other Machine Usages, formatted by Tony Sale. (c) JulyMarch l945 page 1 TENTATIVE LIST OF ENIGMA AND OTHER

Add to Reading List

Source URL: www.codesandciphers.org.uk

Language: English - Date: 2013-08-19 02:11:19
834Computer network security / Cryptographic software / Password policy / Cyberwarfare / Password notification email / Password / Security / Computer security

Common Error Messages ・ Login Window Message Cause Invalid credentials

Add to Reading List

Source URL: engine.kubota.co.jp

Language: English - Date: 2015-03-30 00:20:16
835Computer security / Cyberwarfare / Security / Risk / Vulnerability / Social vulnerability

Defence TNO | Knowledge for business Research and technology

Add to Reading List

Source URL: www.tno.nl

Language: English - Date: 2015-06-18 06:01:30
836Computer network security / Software testing / Hacking / Vulnerability / CVSS / Cross-site scripting / Cross-site request forgery / Code injection / SQL injection / Cyberwarfare / Computer security / Computing

Web Application Scan Document Revision Initial Report Prepared By: AppCheck-NG

Add to Reading List

Source URL: appcheck-ng.com

Language: English - Date: 2014-09-08 05:22:28
837Software bugs / Shellcode / Len Sassaman / Buffer overflow / USENIX / ;login: / Address space layout randomization / RSA / David Brumley / Cryptography / Cyberwarfare / Computer security

The Danger of Unrandomized Code EDWAR D J . SCHWART Z Of Headless User Accounts and Restricted Shells JAN SCHAUMANN

Add to Reading List

Source URL: www.usenix.org

Language: English
838Software testing / Security / Hacking / Vulnerability / Attack / Password / Security risk / Social engineering / RSA / Computer network security / Cyberwarfare / Computer security

TRESPASS: Plug-and-Play Attacker Profiles for Security Risk Analysis Wolter Pieters∗† , Dina Hadˇziosmanovi´c∗ , Aleksandr Lenin‡ , Lorena Montoya† , and Jan Willemson‡ ∗ Delft University of Technology,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-05-07 16:20:44
839Cyberwarfare / Unified threat management / Fortinet / WatchGuard / Firebox / Network security / Deep packet inspection / Firewall / Computer network security / Computing / Computer security

WatchGuard Firebox M300 TB150528D 2June2015

Add to Reading List

Source URL: www.watchguard.com

Language: English - Date: 2015-06-02 20:44:43
840Computer worms / Cyberwarfare / Warhol worm / Data security / Intrusion detection system / SQL Slammer / Snort / Botnet / Anomaly detection / Computer network security / System software / Software

Stuart Staniford, PhD 812 Irish Settlement Rd, Freeville, NYoffice/fax (cell/voicemail)

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English
UPDATE