Zero-day attack

Results: 269



#Item
21Windows XP / System software / McAfee / Microsoft Windows / Companies listed on the New York Stock Exchange / Zero-day attack / Vulnerability / Microsoft Security Essentials / Malware / Computer security / Antivirus software / Software

Solution Brief McAfee Application Control Extends the  Life of Legacy Microsoft Windows XP System

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-22 07:04:03
22Software testing / Hacking / Vulnerability / Zero-day attack / Patch / Social vulnerability / Common Vulnerabilities and Exposures / Exploit / Responsible disclosure / Computer security / Cyberwarfare / Computer network security

0-Day Patch Exposing Vendors (In)security Performance Stefan Frei, Bernhard Tellenbach, and Bernhard Plattner Computer Engineering and Networks Laboratory (TIK) Swiss Federal Institute of Technology, ETH Zurich {stefan.f

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:28
23Computing / Hacking / Spamming / Electronic commerce / Secure communication / Denial-of-service attack / Zero-day attack / Vulnerability / Attack / Computer network security / Cyberwarfare / Computer security

Infrastructure Security 1. Infrastructure Security The PlugX RAT Used in Targeted Attacks In this report, we discuss the PlugX RAT used in targeted attacks, and look at examples of

Add to Reading List

Source URL: www.iij.ad.jp

Language: English - Date: 2015-05-20 03:08:06
24Computer security / Computer file formats / Software testing / Zero-day attack / Vulnerability / Buffer overflow / Uncontrolled format string / String / File format / Computing / Cyberwarfare / Computer network security

The Art of File Format Fuzzing In September 2004, much hype was made of a buffer overflow vulnerability that existed in the Microsoft engine responsible for processing JPEG files. While the resulting vulnerability itself

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
25Computer network security / Failure / Zero-day attack / Buffer overflow / Vulnerability / Cyberwarfare / Computer security / Software testing

0002b510h: 0002b520h: 0002b530h: 0002b540h: 0002b550h: 0002b560h:

Add to Reading List

Source URL: www.blackhat.com

Language: English
26Security / Malware / Vulnerability / Threat / Computer insecurity / Zero-day attack / Attack / Database security / Cloud computing / Computer network security / Cyberwarfare / Computer security

PDF Document

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 02:20:33
27Risk / Computer network security / Software testing / Software bugs / Hacking / Vulnerability / Zero-day attack / Social vulnerability / Code audit / Cyberwarfare / Computer security / Failure

PDF Document

Add to Reading List

Source URL: www.recurity-labs.com

Language: English - Date: 2011-08-05 09:47:22
28Software / Zero-day attack / Avira / Antivirus software / Computer security / System software

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:28
29Espionage / Advanced persistent threat / Malware / Stuxnet / Zero-day attack / Adversary / Denial-of-service attack / Threat / Phishing / Cyberwarfare / Computer network security / Computer security

PDF Document

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2013-08-18 09:57:52
30Security / Malware / Vulnerability / Threat / Computer insecurity / Zero-day attack / Attack / Database security / Cloud computing / Computer network security / Cyberwarfare / Computer security

PDF Document

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 02:20:33
UPDATE