Zero-day attack

Results: 269



#Item
11Computer security / Zero-day attack / Computing / Computer network security / Codenomicon / Security

Codenomicon-AppCheck-Symbol-Lock

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2015-06-08 10:21:10
12Computing / Software testing / Software engineering / Application security / Electronic commerce / Cross-site scripting / Vulnerability / Penetration test / Zero-day attack / Cyberwarfare / Computer security / Computer network security

Improving your Secure SDLC ( SSDLC ) with Prevoty How adding real-time application security dramatically decreases vulnerabilities February 2015

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2015-06-04 23:45:14
13Security / Software testing / Crime prevention / National security / Application firewall / Application security / Penetration test / Zero-day attack / Cross-site scripting / Computer network security / Cyberwarfare / Computer security

THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY April 2015 THE EVOLUTION

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2015-06-04 23:45:16
14Computer network security / Software testing / Hacking / Vulnerability / Mandriva Linux / Zero-day attack / WordPress / Debian / Cross-site scripting / Software / Computer security / Cyberwarfare

March April 7, 2015 The IWC CIR is an OSINT resource focusing on advanced persistent threats and other digital dangers. APTs fit into a cybercrime category directed at both business and political targets. Attack vectors

Add to Reading List

Source URL: www.informationwarfarecenter.com

Language: English - Date: 2015-04-06 16:36:04
15Security / Malware / Vulnerability / Threat / Computer insecurity / Zero-day attack / Attack / Database security / Cloud computing / Computer network security / Cyberwarfare / Computer security

TOP 10 where Security-OBLIGATED Executives should focus Introduction

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 02:20:33
16Problem solving / Vulnerability / Nash equilibrium / Zero-day attack / Social vulnerability / Extensive-form game / United States Cyber Command / Sequential equilibrium / Solution concept / Game theory / Cyberwarfare / Computer security

Would a ‘Cyber Warrior’ Protect Us? Exploring Trade-offs Between Attack and Defense of Information Systems [Position Paper] Tyler Moore, Allan Friedman and Ariel D. Procaccia Center for Research on Computation & Soci

Add to Reading List

Source URL: www.nspw.org

Language: English - Date: 2011-04-20 15:15:37
17Security / Malware / Vulnerability / Threat / Computer insecurity / Zero-day attack / Attack / Database security / Cloud computing / Computer network security / Cyberwarfare / Computer security

TOP 10 where Security-OBLIGATED Executives should focus Introduction

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 02:20:33
18Antivirus software / McAfee / Whitelist / Zero-day attack / Conficker / Spyware / Windows XP / Tencent QQ / Norton AntiVirus / Software / System software / Malware

Technical FAQ Maintain Security for XP Systems Protect end-of-life operating systems with application whitelisting.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-19 18:38:03
19Computer network security / Risk / National security / Vulnerability / Stuxnet / Social vulnerability / Zero-day attack / Security risk / Rootkit / Cyberwarfare / Security / Computer security

Microsoft PowerPoint - critis_2013_0918_advanced_risks

Add to Reading List

Source URL: www.critis2013.nl

Language: English - Date: 2013-09-21 17:44:50
20Computer security / Ransomware / Targeted threat / Zero-day attack / Rootkit / Crimeware / Trojan horse / Web threat / Linux malware / Malware / System software / Cyberwarfare

ReportThreats Predictions By McAfee Labs

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:00:32
UPDATE