Hijacking

Results: 635



#Item
171Firefox / Yahoo! Mail / Uniform resource locator / URL redirection / Meta refresh / Software / Cross-platform software / JavaScript

2010 Cross Site URL Hijacking by using Error Object in Mozilla Firefox By: Soroush Dalili

Add to Reading List

Source URL: soroush.secproject.com

Language: English - Date: 2012-11-26 11:16:58
172Social media / Twitter / Android software / Social information processing / Web 2.0 / Email spam / Spam / TweetDeck / Malware / Computing / World Wide Web / Internet

Consequences of Connectivity: Characterizing Account Hijacking on Twitter † Kurt Thomas †

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2014-09-09 16:02:08
173Routing / Internet protocols / Internet standards / Border Gateway Protocol / IP hijacking / Router / Traceroute / Network architecture / Internet / Computing

The End of Undetected BGP Route Hijacking (Detecting malicious behavior using global data analytics) 19 May 2014 Speaker LINX 85

Add to Reading List

Source URL: research.dyn.com

Language: English - Date: 2014-07-16 14:37:23
174Dispute resolution / Internet ethics / .nz / New Zealand media / Domain name / Mediation / Trademark / Plaintiff / Domain hijacking / Domain name system / Internet / Internet governance

Ref: Title: Date Issued: Status: DRS

Add to Reading List

Source URL: dnc.org.nz

Language: English - Date: 2014-09-29 19:49:23
175Technology / Twitter / Malware / Phishing / Email spam / T.co / Identity theft / Spam / Internet / Spamming / Computing

Consequences of Compromise: Characterizing Account Hijacking on Twitter Frank Li UC Berkeley

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2014-11-05 22:43:48
176Routing protocols / Internet standards / Routing / Internet protocols / Border Gateway Protocol / Router / IP hijacking / Multiprotocol BGP / Network architecture / Internet / Computing

Defending Against BGP Man-In-The-Middle Attacks

Add to Reading List

Source URL: research.dyn.com

Language: English - Date: 2014-07-27 14:30:18
177Pay per click search engines / Electronic commerce / Advertising / Computer network security / Click fraud / Online advertising / Botnet / AdWords / Ad serving / Internet / Internet marketing / Computing

The ZeroAccess Auto-Clicking and Search-Hijacking Click Fraud Modules (Technical Report) †∗ †∗

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2014-09-30 19:09:50
178Internet protocols / Domain name system / Internet standards / Routing protocols / Public-key cryptography / Border Gateway Protocol / Domain Name System Security Extensions / IP hijacking / DNS spoofing / Network architecture / Internet / Computing

Internet Resilience in France 2013 Document produced by the ANSSI with the participation of the Afnic. Research and authoring by: François Contat, Mathieu Feuillet, Pierre Lorinquer, Samia M’timet,

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2015-03-11 14:09:01
179Uniform Domain-Name Dispute-Resolution Policy / Domain name / Domain tasting / Whois / Cybersquatting / .com / Trademark / Melbourne IT / Domain hijacking / Internet / Domain name system / .au

2007 NAMES POLICY PANEL Fifth Meeting 10 July 2007, 00pm Maddocks Lawyers, Melbourne MINUTES Present:

Add to Reading List

Source URL: auda.org.au

Language: English - Date: 2015-03-09 21:13:12
180Learning management systems / Educational technology / Cryptographic protocols / Secure communication / HTTP / Moodle / Session hijacking / Password / Virtual learning environment / Learning / Software / Educational software

International Journal of Information Technology and Knowledge Management January-June 2011, Volume 4, No. 1, ppINVESTIGATION ON SECURITY IN LMS MOODLE Sheo Kumar1 & Kamlesh Dutta2

Add to Reading List

Source URL: www.csjournals.com

Language: English - Date: 2010-10-19 00:34:09
UPDATE