Zero-day attack

Results: 269



#Item
81Computer network security / Computer security / Antivirus software / Proprietary software / Crime prevention / Vulnerability / Trustworthy computing / Microsoft Security Essentials / Zero-day attack / Software / Computing / Cyberwarfare

Microsoft Security Response Center (MSRC) Progress Report 2013 July 2012 – June 2013

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2013-07-24 16:07:21
82Software / Computer network security / Software testing / Proprietary software / Zero-day attack / Kaspersky Lab / Vulnerability / Arbitrary code execution / Norton Internet Security / Computer security / Antivirus software / Cyberwarfare

MRG Effitas – Comparative Assessment of Kaspersky Internet SecurityAugustComparative Assessment of Kaspersky Internet SecurityAugust 2012

Add to Reading List

Source URL: expo-itsecurity.ru

Language: English - Date: 2012-11-20 03:02:40
83Security / Malware / Vulnerability / Threat / Computer insecurity / Zero-day attack / Attack / Database security / Cloud computing / Computer network security / Cyberwarfare / Computer security

TOP 10 where Security-OBLIGATED Executives should focus Introduction

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 02:20:33
84Computing / Malware / Multi-agent systems / Spamming / Zero-day attack / Vulnerability / Botnet / Attack / Rootkit / Cyberwarfare / Computer security / Computer network security

Threat Report H2 2012 Protecting the irreplaceable | www.f-secure.com

Add to Reading List

Source URL: www.f-secure.com

Language: English - Date: 2014-08-28 23:31:48
85Cyberwarfare / Computing / Multi-agent systems / Spamming / Malware / Zero-day attack / Computer virus / Botnet / Linux malware / Computer network security / Antivirus software / Computer security

Zero-Day Exploit CAN WE DEFEND AGAINST IT? www.network-box.com Real Time Threats

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2013-03-11 03:10:30
86Computer security / Computer network security / Antivirus software / Spamming / Rootkit / Computer worm / Computer virus / Spyware / Zero-day attack / System software / Cyberwarfare / Malware

Threat Summaries Volume 1: [removed]

Add to Reading List

Source URL: www.f-secure.com

Language: English - Date: 2014-09-19 05:29:33
87Cyberwarfare / Risk / National security / Vulnerability / Zero-day attack / Social vulnerability / Information security / Threat / Malware / Computer network security / Security / Computer security

www.strasan.com Strasan MyCSO: Proactive Threat and Vulnerability Monitoring Securing Small to Medium Enterprises Strasan’s MyCSO Vulnerability Manager combines

Add to Reading List

Source URL: strasan.com

Language: English - Date: 2011-10-22 12:30:40
88Cyberwarfare / Computing / Multi-agent systems / Spamming / Malware / Zero-day attack / Computer virus / Botnet / Linux malware / Computer network security / Antivirus software / Computer security

Zero-Day Exploit CAN WE DEFEND AGAINST IT? www.network-box.com Real Time Threats

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2013-03-11 03:10:31
89Cyberwarfare / Computing / Multi-agent systems / Spamming / Malware / Zero-day attack / Computer virus / Botnet / Linux malware / Computer network security / Antivirus software / Computer security

Zero-Day Exploit CAN WE DEFEND AGAINST IT? www.network-box.com Real Time Threats

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2013-03-11 03:10:32
90Computer network security / Hacking / Software testing / Vulnerability / Zero-day attack / Patch / Transdermal patch / United States Computer Emergency Readiness Team / Patch Tuesday / Computer security / Cyberwarfare / Computing

PATCH MANAGEMENT February 2008 © The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-03-29 08:30:08
UPDATE