Security hacker

Results: 424



#Item
141Hacking / Cyberwarfare / Software testing / Emirates Telecommunications Corporation / Penetration test / Hacker / Network security / Oracle Corporation / Telecommunications Regulatory Authority / Computer network security / Computing / Computer security

HITBSecConf2008 – Dubai Conference Kit Supported & Endorsed by Hack In The Box Security Conference[removed]Dubai

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:53:31
142Hacking / Cyberwarfare / Software testing / Emirates Telecommunications Corporation / Penetration test / Hacker / Network security / Oracle Corporation / Telecommunications Regulatory Authority / Computer network security / Computing / Computer security

HITBSecConf2008 – Dubai Conference Kit Supported & Endorsed by Hack In The Box Security Conference[removed]Dubai

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-26 12:53:31
143National security / Crime prevention / Hacking / Computer security / Data security / Sony / Information security / Hacker / Hack / Computing / Electronics / Security

NB awareness test on the Sony hack

Add to Reading List

Source URL: www.noticebored.com

Language: English - Date: 2015-03-12 16:52:23
144Software testing / Security / Hacking / Penetration test / Vulnerability / Hacker / Attack / Network security / HD Moore / Computer network security / Computer security / Cyberwarfare

HACK IN THE BOX SECURITY CONFERENCE 2003 SPONSORSHIP KIT HITBSecConf2003: Overview On the wave of the success of the last HITBSecConf held in 2002, HITB (M) Sdn Bhd

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:44:22
145Cyberwarfare / Computer network security / Data security / National security / Threat / Vulnerability / Information security / Hacker / Security controls / Computer security / Security / Computing

NB glossary for the Sony hack

Add to Reading List

Source URL: www.noticebored.com

Language: English - Date: 2015-03-12 16:47:56
146Sony / Videotelephony / Information security / Identity theft / Internet privacy / Hacker / Crisis management / Credit card / PlayStation Network outage / Electronics / Computing / Technology

NB staff briefing on 5 lessons from Sony

Add to Reading List

Source URL: www.noticebored.com

Language: English - Date: 2015-03-12 16:53:07
147Security / Cyberwarfare / Computer crimes / Electronic warfare / National security / Cyber spying / Hacker / Computer security / Cyberwarfare in the United States / Cybercrime / Hacking / Computing

[removed]Chinese hackers attack blue-chip groups via Forbes website - FT.com Home Africa

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2015-02-10 14:55:33
148Cyberwarfare / Computer network security / Software testing / Data security / Penetration test / Metasploit Project / Malware / Hacker / White hat / Computing / Computer security / Hacking

Microsoft Word - bh-reg-usa-09-addclass[removed]docx

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:13
149Cyberwarfare / Hacking / Software testing / Data security / Penetration test / Metasploit Project / Malware / White hat / Hacker / Computer network security / Computer security / Computing

Microsoft Word - bh-reg-usa-09-changclass[removed]docx

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:13
150Computer security / Hacker / Trojan horse / Cyberwarfare / Malware / White hat / Vulnerability / Honeynet Project / Malcon / Hacking / Computing / Electronics

Balancing the Pwn Trade Deficit Version[removed]______________________________________________ Val Smith {valsmith[at]atackresearch.com}

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:53:17
UPDATE