Targeted threat

Results: 202



#Item
51Computer network security / Malware / Software testing / Zero-day attack / Vulnerability / FireEye /  Inc. / Operation Aurora / Exploit / Targeted threat / Computer security / Cyberwarfare / Hacking

WHITE PAPER LESS THAN ZERO: A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-05-01 03:59:23
52Targeted Attack Trends 2H 2013 Report A TrendLabsSM Report

Targeted Attack Trends 2H 2013 Report A TrendLabsSM Report

Add to Reading List

Source URL: about-threats.trendmicro.com

Language: English - Date: 2014-05-18 23:04:48
53Microsoft PowerPoint - APWG_JPCERT_201412.ppt [互換モード]

Microsoft PowerPoint - APWG_JPCERT_201412.ppt [互換モード]

Add to Reading List

Source URL: www.antiphishing.jp

Language: English - Date: 2014-12-17 21:33:43
54Data Sheet  McAfee Email Protection Advanced protection for mailboxes anywhere, anytime  Key Advantages

Data Sheet McAfee Email Protection Advanced protection for mailboxes anywhere, anytime Key Advantages

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-21 05:51:06
55Security Threat Report 2012 Seeing the Threats Through the Hype  www.getadvanced.net

Security Threat Report 2012 Seeing the Threats Through the Hype www.getadvanced.net

Add to Reading List

Source URL: www.getadvanced.net

Language: English - Date: 2013-04-16 08:43:36
56A Look at Targeted Attacks Through the Lense of an NGO Stevens Le Blond, Adina Uritesc, and Cédric Gilbert, Max Planck Institute for Software Systems (MPI-SWS); Zheng Leong Chua and Prateek Saxena, National University o

A Look at Targeted Attacks Through the Lense of an NGO Stevens Le Blond, Adina Uritesc, and Cédric Gilbert, Max Planck Institute for Software Systems (MPI-SWS); Zheng Leong Chua and Prateek Saxena, National University o

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-04-20 18:13:41
57The Slingshot Project Measuring, analyzing, and defending against targeted attacks Stevens Le Blond  Software security model

The Slingshot Project Measuring, analyzing, and defending against targeted attacks Stevens Le Blond Software security model

Add to Reading List

Source URL: www.dfn-cert.de

Language: English - Date: 2015-03-06 09:40:10
58Microsoft Word - SERT-Q4-2014-Threat-Intelligence-final-ss.docx

Microsoft Word - SERT-Q4-2014-Threat-Intelligence-final-ss.docx

Add to Reading List

Source URL: www.solutionary.com

Language: English - Date: 2015-02-10 19:26:16
59A Look at Targeted Attacks Through the Lense of an NGO Stevens Le Blond1 Zheng Leong Chua2 1 MPI-SWS  2 National

A Look at Targeted Attacks Through the Lense of an NGO Stevens Le Blond1 Zheng Leong Chua2 1 MPI-SWS 2 National

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2014-08-12 13:19:39
60ANNUAL SECURITY ROUNDUP  A Look Back at 2011 Information Is Currency  True to one of our predictions for the year, 2011

ANNUAL SECURITY ROUNDUP A Look Back at 2011 Information Is Currency True to one of our predictions for the year, 2011

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2012-03-26 02:27:51