Security testing

Results: 3214



#Item
321Computer network security / Software testing / Hacking / Vulnerability / Mandriva Linux / Zero-day attack / WordPress / Debian / Cross-site scripting / Software / Computer security / Cyberwarfare

March April 7, 2015 The IWC CIR is an OSINT resource focusing on advanced persistent threats and other digital dangers. APTs fit into a cybercrime category directed at both business and political targets. Attack vectors

Add to Reading List

Source URL: www.informationwarfarecenter.com

Language: English - Date: 2015-04-06 16:36:04
322Computing / Security / Network protocols / OWASP / HTTP / Cross-site request forgery / Cross-site scripting / HTTP cookie / Web application security / Computer security / Cyberwarfare / Computer network security

OWASP RUBY ON RAILS SECURITY GUIDE 2009 V2.0 © OWASP Foundation This document is licensed under the Creative Commons Attribution-Share Alike 3.0 license. You must attribute your version to the OWASP Testing or

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:27
323Computer network security / Software testing / OWASP / Security / Cloud computing / Web application security / Application security / Penetration test / Application firewall / Computing / Computer security / Cyberwarfare

1 2 Welcome to OWASP AppSec USA 2011, an application security conference for information security and development enthusiasts building software - which plays such a vital role in our lives - to be more

Add to Reading List

Source URL: 2011.appsecusa.org

Language: English - Date: 2011-10-02 12:13:04
324Crime prevention / National security / Computing / Software quality / Evaluation / Common Criteria / Software bug / Fuzz testing / Reliability engineering / Software testing / Security / Computer security

CHAPTER 26 System Evaluation and Assurance If it’s provably secure, it probably isn’t.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:56:48
325Software testing / Computing / Open Text Corporation / Portal software / Vulnerability / Social vulnerability / Exploit / Arbitrary code execution / Attack / Cyberwarfare / Risk / Computer security

Customer Advisory At OpenText, the security and privacy of your information is our top priority. Details OpenText is aware of and has been carefully monitoring the recent news surrounding Bourne Again Shell (Bash) remote

Add to Reading List

Source URL: techsupport.gxs.com

Language: English - Date: 2014-11-05 17:42:00
326Computing / Software testing / ECSA / Penetration test / Certified Ethical Hacker / White hat / Manu Zacharia / ELearnSecurity Certified Professional Penetration Tester / Hacking / Computer security / EC-Council

EC-Council Courses offered at TLC: CEH – Certified Ethical Hacker The Certified Ethical Hacker class will immerse the students into a hands-on environment where they will be shown how to conduct ethical hacking. They w

Add to Reading List

Source URL: www.tlclasvegas.com

Language: English - Date: 2014-07-17 13:50:45
327Computer security / Search engine optimization / Crime prevention / National security / Software testing / Vulnerability / Site map / Sitemaps / Internet forum / Web design / Cyberwarfare / Security

Detecting Insufficient Access Control in Web Applications George Noseevich, Andrew Petukhov {ngo, petand}@lvk.cs.msu.ru Security research group of the Computer Systems Lab, Computer Science Department, Lomonosov Moscow S

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:17:18
328Cyberwarfare / Hacking / Software testing / Black Hat Briefings / Penetration test / Application security / Vulnerability / Johnny Long / Cisco Systems / Computing / Computer security / Computer network security

WARNING: Computer and network vulnerabilities will be revealed. Black Hat, Europe’s premier technical ICT security event, returns in 2005 to provide solutions to your security challenges. •Share information with hund

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:16
329Security / Software testing / Data security / Metasploit Project / Rapid7 / Information security / Vulnerability / Penetration test / Security risk / Computer security / Computer network security / Cyberwarfare

Risk Visibility and Management: How IT Security Teams Can Enable Speed With Control The world rotates around the sun at a speed of 67,000 miles per hour. That can feel slow when compared to how fast organizations need t

Add to Reading List

Source URL: www.aquion.com.au

Language: English - Date: 2014-03-26 20:54:42
330Cross-platform software / Scripting languages / Remote file inclusion / Hacking / Software testing / SQL injection / HTTP cookie / PHP / Vulnerability / Computing / Software engineering / Computer security

Sept 2013 Hacker Intelligence Initiative, Monthly Trend Report #17 PHP SuperGlobals: Supersized Trouble 1. Executive Summary For a while now, the ADC research group has been looking into the implication of third-party ap

Add to Reading List

Source URL: www.imperva.com

Language: English - Date: 2013-09-03 13:41:37
UPDATE