Duqu

Results: 51



#Item
11Stuxnet / Duqu / United States Cyber Command / International Multilateral Partnership Against Cyber Threats / Cyberwarfare in the United States / Military-digital complex / Cyberwarfare / War / Technology

                                                   APLN    

Add to Reading List

Source URL: a-pln.org

Language: English - Date: 2014-11-04 17:17:01
12Duqu / Stuxnet / Malware / SCADA / Computer insecurity / Cooperative Cyber Defence Centre of Excellence / United States Cyber Command / Stars virus / Cyberwarfare in the United States / Cyberwarfare / Technology / Computer security

THE RUSI JOURNAL CYBER-WEAPONS Thomas Rid and Peter MCBurney What are cyber-weapons? Instruments of code-borne attack span a wide spectrum, from

Add to Reading List

Source URL: www.rusi.org

Language: English - Date: 2012-02-23 11:13:36
13Security / United States Cyber Command / Stuxnet / Computer crime / Cyberterrorism / National Security Agency / Duqu / Computer security / Information warfare / Cyberwarfare / Military science / War

IRIE International Review of Information Ethics VolIngo Ruhmann:

Add to Reading List

Source URL: www.i-r-i-e.net

Language: English - Date: 2014-05-21 07:52:15
14Software / Stuxnet / Shellcode / Windows NT 4.0 / Microsoft Windows / Cyberwarfare / System software / Duqu

Note: Because Type 1 font programs were originally produced and were carefully checked only within Adobe Systems, Type 1 BuildChar was designed with the expectation that only errorfree Type 1 font programs would be prese

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2013-03-19 04:58:41
15Computer network security / Computer security / Stuxnet / Duqu / Rootkit / Zero-day attack / Advanced persistent threat / Internet security / Antivirus software / Cyberwarfare / Malware / System software

Weaponized Malware: A Clear and Present Danger Weaponized malware and advanced persistent threats raise the bar on endpoint security. Originally intended for cyber-espionage and cyber-warfare, these sophisticated attacks

Add to Reading List

Source URL: www.e92plus.com

Language: English - Date: 2014-01-23 09:10:43
16Malware / Hardware virtualization / Rootkit / Hypervisor / Hyper-V / Xen / Antivirus software / Duqu / Paravirtualization / System software / Software / Virtual machines

Scalability, Fidelity and Stealth in the DRAKVUF Dynamic Malware Analysis System Tamas K. Lengyel Steve Maresca

Add to Reading List

Source URL: www.sec.in.tum.de

Language: English - Date: 2014-09-01 11:00:03
17Computer network security / Multi-agent systems / Cyberwarfare / Botnets / Duqu / Stuxnet / Grum botnet / Spam / FireEye /  Inc. / Computing / Spamming / Internet

Microsoft PowerPoint - !2012 HKCERT.v2.ppt

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2012-10-26 00:43:02
18Hacking / Military technology / Computer crimes / Military science / Stuxnet / Duqu / United States Cyber Command / Cyber / Malware / Cyberwarfare / War / Electronic warfare

Cyber warfare threat rapidly increasing: Experts

Add to Reading List

Source URL: labrisnetworks.com

Language: English - Date: 2015-03-02 03:06:26
19Computer network security / Multi-agent systems / Cyberwarfare / Botnets / Duqu / Stuxnet / Grum botnet / Spam / FireEye /  Inc. / Computing / Spamming / Internet

Microsoft PowerPoint - !2012 HKCERT.v2.ppt

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2012-10-26 00:42:00
20

臺灣電腦網路危機處理暨協調中心 (TWCERT/CC) 惡意程式-Duqu 簡介 目錄 前言...........................................................................................................................

Add to Reading List

Source URL: www.cert.org.tw

Language: Chinese - Date: 2014-12-18 10:30:15
    UPDATE