Targeted threat

Results: 202



#Item
51Computer network security / Malware / Software testing / Zero-day attack / Vulnerability / FireEye /  Inc. / Operation Aurora / Exploit / Targeted threat / Computer security / Cyberwarfare / Hacking

WHITE PAPER LESS THAN ZERO: A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-05-01 03:59:23
52Computer security / Espionage / Zero-day attack / Targeted threat / Spyware / Vulnerability / Phishing / Attack / Computer worm / Cyberwarfare / Computer network security / Malware

Targeted Attack Trends 2H 2013 Report A TrendLabsSM Report

Add to Reading List

Source URL: about-threats.trendmicro.com

Language: English - Date: 2014-05-18 23:04:48
53Malware / Social engineering / Phishing / Anti-Phishing Working Group / Criminology / Transaction authentication number / Targeted threat / Identity theft / Computer crimes / Spamming / Crime

Microsoft PowerPoint - APWG_JPCERT_201412.ppt [互換モード]

Add to Reading List

Source URL: www.antiphishing.jp

Language: English - Date: 2014-12-17 21:33:43
54McAfee / Cybercrime / Internet / Phishing / Social engineering / Malware / Targeted threat / Web threat / McAfee VirusScan / Spamming / Email / Computing

Data Sheet McAfee Email Protection Advanced protection for mailboxes anywhere, anytime Key Advantages

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-21 05:51:06
55Software / Web threat / Microsoft Security Essentials / Computer worm / Rogue security software / Conficker / Targeted threat / Linux malware / Norton Internet Security / Malware / System software / Antivirus software

Security Threat Report 2012 Seeing the Threats Through the Hype www.getadvanced.net

Add to Reading List

Source URL: www.getadvanced.net

Language: English - Date: 2013-04-16 08:43:36
56Email / Cybercrime / Computer network security / Cyberwarfare / Malware / Email spam / Targeted threat / Internet security / Spam / Internet / Computing / Spamming

A Look at Targeted Attacks Through the Lense of an NGO Stevens Le Blond, Adina Uritesc, and Cédric Gilbert, Max Planck Institute for Software Systems (MPI-SWS); Zheng Leong Chua and Prateek Saxena, National University o

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-04-20 18:13:41
57Cyberwarfare / Videotelephony / Computer network security / Malware / Stuxnet / Targeted threat / Denial-of-service attack / Social engineering / Voice over IP / Software / Computing / System software

The Slingshot Project Measuring, analyzing, and defending against targeted attacks Stevens Le Blond Software security model

Add to Reading List

Source URL: www.dfn-cert.de

Language: English - Date: 2015-03-06 09:40:10
58Multi-agent systems / Spamming / Computer security / Malware / Antivirus software / Botnet / Threat / Targeted threat / Computer network security / Computing / Cyberwarfare

Microsoft Word - SERT-Q4-2014-Threat-Intelligence-final-ss.docx

Add to Reading List

Source URL: www.solutionary.com

Language: English - Date: 2015-02-10 19:26:16
59Email / Computer network security / Hacking / Spamming / Malware / Email spam / Targeted threat / Internet security / GhostNet / Computing / Internet / Cyberwarfare

A Look at Targeted Attacks Through the Lense of an NGO Stevens Le Blond1 Zheng Leong Chua2 1 MPI-SWS 2 National

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2014-08-12 13:19:39
60Smartphones / Internet ethics / Malware / Spamming / Spam / Targeted threat / SecurID / Email spam / Internet privacy / Computing / Internet / Cyberwarfare

ANNUAL SECURITY ROUNDUP A Look Back at 2011 Information Is Currency True to one of our predictions for the year, 2011

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2012-03-26 02:27:51
UPDATE