Exploit

Results: 786



#Item
741Computer-mediated communication / Polycom / Teleconferencing / Videotelephony / Vulnerability / Hotfix / OpenSSL / Exploit / Social vulnerability / Computing / Software / Computer security

SECURITY BULLETIN CVE[removed]Version 1.12 _____________________________________________________________________________________________________________________________ _________________________________________________

Add to Reading List

Source URL: www.polycom.com

Language: English - Date: 2014-07-09 02:33:00
742Computer network security / Hacking / Computer crimes / Software testing / Zero-day attack / Phishing / Vulnerability / Exploit / Cybercrime / Computer security / Cyberwarfare

C-SAWR 16 [Extract] This is an extract of the Cyber-security Information Sharing Partnership (CiSP) Situational Awareness Weekly Report (C-SAWR). CiSP members automatically receive access to the full product as well as o

Add to Reading List

Source URL: www.cert.gov.uk

Language: English - Date: 2014-05-12 05:10:41
743Patent law / Property law / European patent law / Patent offices / Business law / European Patent Convention / EU patent / Patent / Term of patent / Law / European Patent Organisation / Civil law

Why collect data on patents? Patents reflect part of a country’s inventive activity. Patents also show the country’s capacity to exploit knowledge and translate it into potential economic gains. In this context, indi

Add to Reading List

Source URL: epp.eurostat.ec.europa.eu

Language: English - Date: 2014-05-14 06:18:28
744Smartphones / Information appliances / Android software / Voter database / Mobile operating system / Internet privacy / Android / Mobile technology / BlackBerry / Software / Computing / Technology

Smartphones and Election 2012 Lillie Coney,* C. Aaron Cois,* and Beth Rosenberg* The increased prevalence of smartphones has the potential to deceive and exploit voters during the 2012 election season. The danger posed t

Add to Reading List

Source URL: epic.org

Language: English - Date: 2012-08-13 17:57:22
745South Asia / Geochemistry / Geophysics / Mineral exploration / Mineral resource classification / Survey of Bangladesh / Bangladesh / Economic geology / Political geography / Geology

Submission of Proposal on behalf of Geological Survey of Bangladesh (GSB) to ISA for Deep Sea Survey with a view to exploit Mineral Resources especially Polymetallic Nodules from deep sea bed in Areas beyond national jur

Add to Reading List

Source URL: www.isa.org.jm

Language: English - Date: 2014-06-06 16:25:54
746Waste legislation / Waste / Industrial ecology / Electronic waste / Waste Electrical and Electronic Equipment Directive / Reuse / Recycling / Computer recycling / Electronic waste by country / Waste management / Environment / European Union directives

EU waste directive Waste not, want not The EU should exploit the opportunities presented by electronic waste, says Janez Potočnik W

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2013-02-26 05:41:31
747Computing / Software testing / Hacking / Computer network security / Vulnerability / Zero-day attack / Exploit / Full disclosure / Social vulnerability / Computer security / Cyberwarfare / Risk

The Legitimate Vulnerability Market Inside the Secretive World of 0-day Exploit Sales Charlie Miller, PhD, CISSP Independent Security Evaluators www.securityevaluators.com

Add to Reading List

Source URL: weis2007.econinfosec.org

Language: English - Date: 2007-05-08 09:27:00
748Transport / Satellite navigation / GNSS applications / European Geostationary Navigation Overlay Service / Galileo / Global Positioning System / GPS signals / European Satellite Navigation Competition / Software GNSS Receiver / Satellite navigation systems / Technology / Spaceflight

© Getty/Roger Tully GNSS Applications Are you ready? Europe is! The time has come for Europe to fully exploit the potential of applications based on EGNOS and Galileo, its own global satellite navigation systems!

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2012-10-18 13:14:46
749

PALMARES 2010 Grand Prix de l’Académie des Sports Prix Serge Kampf International – Récompense l’auteur, masculin ou féminin du plus bel exploit sportif accompli dans le monde, l’année précédente. Franck CAM

Add to Reading List

Source URL: www.academie-sports.com

Language: French - Date: 2014-01-30 11:53:06
    750Web applications / Web application frameworks / Apache CXF / Hacking / XML / Vulnerability / Document Type Declaration / Spring Framework / Exploit / Computing / Java enterprise platform / Web services

    Apache CXF Security Advisory (CVE[removed]DTD based XML attacks Author: Daniel Kulp • First version: June 15, 2010 • First published: June 16, 2010 • Last updated: June 16, 2010 Summary

    Add to Reading List

    Source URL: svn.apache.org

    Language: English - Date: 2013-02-25 14:27:19
    UPDATE