Operation Aurora

Results: 52



#Item
1Computing / Business / Technology / American brands / Cybercrime / SecureWorks / Phishing / Operation Aurora / Dell

A Longitudinal Study of the Little Endian That Could Andrew White Senior Security Researcher Secureworks

Add to Reading List

Source URL: files.sans.org

Language: English - Date: 2016-04-15 13:43:25
2Quantum information science / Quantum computing / Models of computation / Fault-tolerant computer systems / Emerging technologies / Quantum error correction / Quantum circuit / Qubit / GottesmanKnill theorem / Quantum operation / Pauli matrices / Quantum gate

Fault-tolerant Quantum Computing Bryan Eastin Northrop Grumman Corporation Aurora, CO December 2014

Add to Reading List

Source URL: www.qec14.ethz.ch

Language: English - Date: 2014-12-19 04:03:41
3Electronic warfare / Hacking / Computer security / Advanced persistent threat / SCADA / Stuxnet / Malware / Operation Aurora / Computer crime / Cybercrime / Technology / Cyberwarfare

ThetaRay_Logo_Options_Draft7

Add to Reading List

Source URL: www.thetaray.com

Language: English - Date: 2014-12-06 20:04:03
4Computer security / Computing / McAfee VirusScan / Computer network security / Malware / Threat / Host Based Security System / Operation Aurora / McAfee / Software / Antivirus software

PDF Document

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-10-27 01:18:20
5Computer network security / Malware / Software testing / Zero-day attack / Vulnerability / FireEye /  Inc. / Operation Aurora / Exploit / Targeted threat / Computer security / Cyberwarfare / Hacking

WHITE PAPER LESS THAN ZERO: A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-04-30 23:03:41
6McAfee / Hacking / Computer network security / Antivirus software / SCADA / Vulnerability / Operation Aurora / Threat / Host Based Security System / Cyberwarfare / Computer security / Security

Data Sheet McAfee Embedded Control System integrity, change control, and policy compliance in one solution for integrated control systems

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-28 13:56:11
7Computer network security / Malware / Software testing / Zero-day attack / Vulnerability / FireEye /  Inc. / Operation Aurora / Exploit / Targeted threat / Computer security / Cyberwarfare / Hacking

WHITE PAPER LESS THAN ZERO: A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-05-01 03:59:23
8Computer security / Cyberwarfare / McAfee SiteAdvisor / Malware / Blended threat / Threat / Operation Aurora / McAfee / Antivirus software / Software

Solution Brief Abuse of Trust Preying upon those who trust. The adage “trust is earned, not given” rings true; we have all seen examples of

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-12-05 18:25:30
9Computer security / Cyberwarfare / McAfee SiteAdvisor / Malware / Blended threat / Threat / Operation Aurora / McAfee / Antivirus software / Software

Solution Brief Abuse of Trust Preying upon those who trust. The adage “trust is earned, not given” rings true; we have all seen examples of

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-12-05 18:25:30
10Computer security / Cyberwarfare / McAfee SiteAdvisor / Malware / Blended threat / Threat / Operation Aurora / McAfee / Antivirus software / Software

Solution Brief Abuse of Trust Preying upon those who trust. The adage “trust is earned, not given” rings true; we have all seen examples of

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-12-05 18:25:30
UPDATE