Security bug

Results: 244



#Item
101Mark 50 torpedo / Military technology / Destruction / Security / Mark 54 MAKO Lightweight Torpedo / Mark 46 torpedo / Torpedo / Mark 48 torpedo

F Y14 N av y P R O G R A M S Mk 54 Lightweight Torpedo Executive Summary • The Navy and DOT&E completed OT&E for the Mk 54 lightweight torpedo with Block Upgrade (BUG) tactical

Add to Reading List

Source URL: www.dote.osd.mil

Language: English - Date: 2015-01-08 18:19:36
102Computer security / Public safety / Computer network security / Security / Software bug

Building Bridges between Dev and AppSec

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 12:08:52
103Malware / Sophos / Denial-of-service attack / Shellshock / Computer virus / Cyberwarfare / Computing / Antivirus software / Computer network security / Computer security

ANATOMY OF A SHELLSHOCK ATTACK “Shellshock” is the name of a serious bug in Bash, a shell commonly used in computers running Linux, UNIX and OS X. Shellshock could allow an attacker to execute malicious commands acro

Add to Reading List

Source URL: sophos.files.wordpress.com

Language: English - Date: 2014-10-06 17:36:14
104Software bugs / Software testing / Cross-platform software / Hacking / Vulnerability / Debian / Linux kernel / Bash / Software / Computing / Computer architecture

Protect your business from the bash bug There has been considerable media coverage about the bash bug. This includes reports from software security firms that hackers are using the bug to target Australian companies.

Add to Reading List

Source URL: www.cert.gov.au

Language: English - Date: 2015-01-23 10:38:34
105Computing / Software engineering / Information society / Interpreter / Harri Hursti / Voter-verified paper audit trail / Software bug / Pointer / Hursti Hack / Electronic voting / Election fraud / Politics

Security Analysis of the Diebold AccuBasic Interpreter David Wagner David Jefferson Matt Bishop Voting Systems Technology Assessment Advisory Board (VSTAAB) with the assistance of:

Add to Reading List

Source URL: votingsystems.cdn.sos.ca.gov

Language: English - Date: 2014-12-02 18:09:19
106Emergency management / Security / Survival kit / Camping / Bleach / First aid kit / United States Department of Homeland Security / Bug-out bag / Survival skills / Disaster preparedness / Public safety

Additional Items to Consider Adding to an Emergency Supply Kit: ❑ Prescription medications and glasses ❑ Infant formula and diapers ❑ Pet food and extra water for your pet ❑ Important family documents such as co

Add to Reading List

Source URL: redsismica.uprm.edu

Language: English - Date: 2013-08-20 10:11:31
107Public safety / Security / Survival kit / Camping / Bleach / First aid kit / Bug-out bag / Survival skills / Disaster preparedness / Emergency management

Additional Items to Consider Adding to an Emergency Supply Kit: q Prescription medications and glasses q Infant formula and diapers q Pet food and extra water for your pet q Important family documents such as copies of

Add to Reading List

Source URL: www.benningtonpolice.com

Language: English - Date: 2011-11-12 13:55:09
108Public safety / Security / Survival kit / Camping / Bleach / First aid kit / Bug-out bag / Survival skills / Disaster preparedness / Emergency management

Additional Items to Consider Adding to an Emergency Supply Kit: q Prescription medications and glasses q Infant formula and diapers q Pet food and extra water for your pet q Important family documents such as copies of

Add to Reading List

Source URL: www.few.org

Language: English - Date: 2014-12-01 11:36:46
109Software bug / Static program analysis / Abstract interpretation / Formal verification / Vulnerability / Programming tool / Abstraction / Computing / Software engineering / Software quality

HSARPA Cyber Security R&D

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2013-01-02 14:26:40
110Computer network security / System administration / Hacking / Software testing / Vulnerability / Ps / Id / Computer security / Operating system / Software / Computing / Unix

STEPS FOR BUSINESS TO PROTECT AGAINST BASH BUG 26 September 2014 Businesses are urged to protect their IT systems against the Bourne Again Shell (BASH) vulnerability that could allow unauthorised users to access and mani

Add to Reading List

Source URL: www.cert.gov.au

Language: English - Date: 2014-12-10 16:01:52
UPDATE