Zero-day

Results: 689



#Item
231Computing / Hacking / Spamming / Electronic commerce / Secure communication / Denial-of-service attack / Zero-day attack / Vulnerability / Attack / Computer network security / Cyberwarfare / Computer security

Infrastructure Security 1. Infrastructure Security The PlugX RAT Used in Targeted Attacks In this report, we discuss the PlugX RAT used in targeted attacks, and look at examples of

Add to Reading List

Source URL: www.iij.ad.jp

Language: English - Date: 2015-05-20 03:08:06
232Computer security / Computer file formats / Software testing / Zero-day attack / Vulnerability / Buffer overflow / Uncontrolled format string / String / File format / Computing / Cyberwarfare / Computer network security

The Art of File Format Fuzzing In September 2004, much hype was made of a buffer overflow vulnerability that existed in the Microsoft engine responsible for processing JPEG files. While the resulting vulnerability itself

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
233Computer network security / Failure / Zero-day attack / Buffer overflow / Vulnerability / Cyberwarfare / Computer security / Software testing

0002b510h: 0002b520h: 0002b530h: 0002b540h: 0002b550h: 0002b560h:

Add to Reading List

Source URL: www.blackhat.com

Language: English
234Software testing / Vulnerability / Online shopping / Vendor / Full disclosure / RFPolicy / Computer security / Cyberwarfare / Hacking

Zimperium Zero Day Disclosure Policy Summary The following Zimperium Zero Day Disclosure Policy outlines how Zimperium handles responsible vulnerability disclosure to product vendors, Zimperium customers, and the general

Add to Reading List

Source URL: www.zimperium.com

Language: English - Date: 2015-05-26 05:07:50
235Security / Malware / Vulnerability / Threat / Computer insecurity / Zero-day attack / Attack / Database security / Cloud computing / Computer network security / Cyberwarfare / Computer security

PDF Document

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 02:20:33
236Risk / Computer network security / Software testing / Software bugs / Hacking / Vulnerability / Zero-day attack / Social vulnerability / Code audit / Cyberwarfare / Computer security / Failure

PDF Document

Add to Reading List

Source URL: www.recurity-labs.com

Language: English - Date: 2011-08-05 09:47:22
237Zero / Time / Gregorian calendar / Moon / Julian calendar / ISO / Calendars / Julian day / Measurement / 0 / Celestial coordinate system

PDF Document

Add to Reading List

Source URL: clearcove.ca

Language: English - Date: 2012-02-26 18:56:31
238Software / Zero-day attack / Avira / Antivirus software / Computer security / System software

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:28
239Espionage / Advanced persistent threat / Malware / Stuxnet / Zero-day attack / Adversary / Denial-of-service attack / Threat / Phishing / Cyberwarfare / Computer network security / Computer security

PDF Document

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2013-08-18 09:57:52
240Security / Malware / Vulnerability / Threat / Computer insecurity / Zero-day attack / Attack / Database security / Cloud computing / Computer network security / Cyberwarfare / Computer security

PDF Document

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 02:20:33
UPDATE