Lastline

Results: 9



#Item
1

PDF Document

Add to Reading List

Source URL: go.lastline.com

    2

    D ATA S H E E T Lastline Enterprise: Protect Email, Web, Network or Cloud Traffic from Advanced Malware Detect the Malware that Slips Past Your Security Controls Lastline® Enterprise™ delivers unmatched detection of

    Add to Reading List

    Source URL: go.lastline.com

    Language: English
      3

      HOLD THAT THOUGHT !! / PG- 8 Special Edition LEADERSHIP

      Add to Reading List

      Source URL: go.lastline.com

      - Date: 2017-08-05 04:44:15
        4

        Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware Yan Shoshitaishvili, Ruoyu Wang, Christophe Hauser, Christopher Kruegel, Giovanni Vigna UC Santa Barbara {yans,fish,christophe,c

        Add to Reading List

        Source URL: www.lastline.com

        Language: English - Date: 2015-08-26 13:52:29
          5Computer security / Computing / Computer forensics / Mimecast / FireEye / Kaspersky Lab / Trusteer / Qualys / Dell Software / Trend Micro / Cloud computing security / Lastline

          SCAWARDS2014_honor_Horizontal

          Add to Reading List

          Source URL: static.webvid.co.uk

          Language: English - Date: 2015-06-09 10:42:45
          6Internet privacy / Technology / Computing / Mobile technology / X-Forwarded-For / Proxy server / HTTP cookie / Vodafone / IPv6 / Do Not Track / Short Message Service / Access Point Name

          Header Enrichment or ISP Enrichment? Emerging Privacy Threats in Mobile Networks Narseo Vallina-Rodriguez∗ , Srikanth Sundaresan∗ , Christian Kreibich∗† ,Vern Paxson∗‡ ∗ ICSI, † Lastline, ‡ UC Berkeley

          Add to Reading List

          Source URL: www.icir.org

          Language: English - Date: 2015-06-27 14:27:30
          7Computer security / Cyberwarfare / Computing / Computer network security / Antivirus software / Malware / Lastline / Intrusion detection system / Advanced persistent threat / Rootkit / Duqu / Computer virus

          Technical Report of MRG Effitas and CrySyS Lab An independent test of APT attack detection appliances Gábor Ács -Kurucz 1, Zoltán Balázs 2, Boldizsár Bencsáth 1 , Levente Buttyán 1 , Roland Kamarás 1 , Gábor Mo

          Add to Reading List

          Source URL: blog.mrg-effitas.com

          Language: English - Date: 2014-12-03 11:48:39
          8

          UC Santa Barbara Taming the Malicious Web Christopher Kruegel Lastline Inc. and UC Santa Barbara

          Add to Reading List

          Source URL: www2.nict.go.jp

          Language: English - Date: 2014-02-27 19:50:45
            9Mobile virtual network operator / Proxy server / Femtocell / Tru / Mobile network operator / Roaming / X-Forwarded-For / Internet Relay Chat flood / T-Mobile USA / Technology / Mobile technology / Wireless

            Beyond the Radio: Illuminating the Higher Layers of Mobile Networks Narseo Vallina-Rodriguez∗ , Srikanth Sundaresan∗ , Christian Kreibich∗† , Nicholas Weaver∗‡ , Vern Paxson∗‡ ∗ ICSI, † Lastline, ‡

            Add to Reading List

            Source URL: icir.org

            Language: English - Date: 2015-04-09 14:05:10
            UPDATE