Zero-day attack

Results: 269



#Item
61Computer security / Computing / Computer network security / Companies listed on the New York Stock Exchange / Zero-day attack / Malware / Host Based Security System / Check Point Integrity / McAfee / Software / Antivirus software

Data Sheet McAfee Endpoint Protection— Advanced Suite

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-02-25 17:38:37
62Security / Risk / Software testing / Hacking / Vulnerability / Zero-day attack / Social vulnerability / Patch / IT risk / Computer security / Cyberwarfare / Computer network security

BDNA Normalize for Zero-Day Vulnerability Exposure Know Your Exposure to Zero-Day Vulnerabilities on Day One Across all of your existing IT operational tools, a single software product affected by a zero-day vulnerabili

Add to Reading List

Source URL: www.bdna.com

Language: English - Date: 2014-06-30 16:32:36
63Computer network security / Cryptography / Software testing / Electronic commerce / Computer insecurity / Vulnerability / SCADA / Application security / Zero-day attack / Cyberwarfare / Computer security / Technology

ITS America The Intelligent Transportation Society of America (ITS America) Connected Vehicle Assessment Cybersecurity and Dependable Transportation

Add to Reading List

Source URL: connectedvehicle.itsa.wikispaces.net

Language: English - Date: 2014-04-02 14:54:26
64Computing / Secure Shell / Port knocking / OpenSSH / Nmap / Firewall / Zero-day attack / Vulnerability / Exploit / Software / Computer network security / Computer security

Zero­Day Attack Prevention via  Single Packet Authorization Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org/

Add to Reading List

Source URL: www.cipherdyne.org

Language: English - Date: 2013-11-03 15:37:36
65Risk / Computer network security / Software testing / Hacking / Vulnerability / Social vulnerability / Debian / IBM / Zero-day attack / Security / Computer security / Computing

December[removed]IBM Internet Security Systems™ X-Force® Research and Development Team Vulnerability Guidelines

Add to Reading List

Source URL: www-935.ibm.com

Language: English - Date: 2008-12-05 19:31:05
66Computer network security / Computer security / Stuxnet / Duqu / Rootkit / Zero-day attack / Advanced persistent threat / Internet security / Antivirus software / Cyberwarfare / Malware / System software

Weaponized Malware: A Clear and Present Danger Weaponized malware and advanced persistent threats raise the bar on endpoint security. Originally intended for cyber-espionage and cyber-warfare, these sophisticated attacks

Add to Reading List

Source URL: www.e92plus.com

Language: English - Date: 2014-01-23 09:10:43
67Computer security / Malware / Antivirus software / Rogue software / Computer virus / Spyware / Zero-day attack / Computer worm / Password / Cyberwarfare / System software / Computer network security

Peter V. Radatti Govsec 06 Presentation GOVSEC 2006 Government Security Expo & Conference April 26, 2006 Washington, D.C.

Add to Reading List

Source URL: www.cybersoft.com

Language: English - Date: 2013-08-13 11:07:11
68Cyberwarfare / Buffer overflow / Stack buffer overflow / PaX / Memory safety / Return-to-libc attack / Address space layout randomization / Stack / Zero-day attack / Software bugs / Computer security / Computing

Chapter 1 Chapter 1 Introduction Even though memory corruption vulnerabilities are inherent to C, this language is

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2013-04-18 05:57:24
69Computing / Software testing / Hacking / Vulnerability / Buffer overflow / Intrusion prevention system / Social vulnerability / Zero-day attack / Exploit / Cyberwarfare / Computer security / Computer network security

224 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 5,

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
70Cyberwarfare / Computer security / Hacking / Software testing / Vulnerability / Malware / Windows / AutoRun / Zero-day attack / System software / Microsoft Windows / Computing

Microsoft Security Intelligence Report Volume 13 JANUARY-JUNE[removed]KEY FINDINGS

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2012-10-08 13:38:17
UPDATE