Zero-day

Results: 689



#Item
261Computer network security / Malware / Software testing / Zero-day attack / Vulnerability / FireEye /  Inc. / Operation Aurora / Exploit / Targeted threat / Computer security / Cyberwarfare / Hacking

WHITE PAPER LESS THAN ZERO: A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-04-30 23:03:41
262Malware / Computer security / Noah / Human geography / Computing / Client honeypot / Computer network security / Honeypot / Security

A design study for a distributed infrastructure to perform zero-day detection of cyberattacks http://www.fp6-noah.org The three-year NoAH project gathers and analyses information about the nature of Internet cyberattack

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-05-06 14:04:11
263Industrial ecology / Waste reduction / Zero waste / Electronic waste / Waste Management /  Inc / Recycling / Reuse / Resource recovery / Waste / Waste management / Sustainability / Environment

September BulletinNational Day for CRNA Friday 19th November 2010 Preparations are being made for CRNA’s first National Day. To date, the Committee, with representatives from most states, are holding monthly mee

Add to Reading List

Source URL: www.communityrecycling.com.au

Language: English - Date: 2014-02-23 19:33:29
264Computer security / Malware / Targeted threat / Messaging Security / Zero-day attack / Phishing / Stuxnet / Sourcefire / Database activity monitoring / Computer network security / Cyberwarfare / Security

A Trend Micro White Paper | DecemberCustom Defense Against Targeted Attacks Proven Protection Against Targeted Attacks and Advanced Threats

Add to Reading List

Source URL: www.trendmicro.com.ph

Language: English - Date: 2015-02-11 19:55:09
265SAINT / Vulnerability / Attack / Denial-of-service attack / Secure Shell / Vulnerability management / Zero-day attack / Computer security / Cyberwarfare / Computer network security

SAINTwriter Assessment Report Report Generated: March 21, Introduction On March 20, 2013, at 10:38 AM, a heavy vulnerability assessment was conducted using the SAINTvulnerability scanner. The scan discov

Add to Reading List

Source URL: www.saintcorporation.com

Language: English - Date: 2013-03-21 12:29:12
266Security / Malware / Vulnerability / Universal Serial Bus / Zero-day attack / Network security / BigFix / EXtensible Host Controller Interface / Computer network security / Cyberwarfare / Computer security

Endpoint Defense:
 Essential Practices Version 1.4

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2015-03-30 09:30:11
267Computer security / Espionage / Zero-day attack / Targeted threat / Spyware / Vulnerability / Phishing / Attack / Computer worm / Cyberwarfare / Computer network security / Malware

Targeted Attack Trends 2H 2013 Report A TrendLabsSM Report

Add to Reading List

Source URL: www.trendmicro.de

Language: English - Date: 2014-06-06 01:36:20
268Environmental protection / Clean Up the World / Environmentalism / Environmental education / Zero waste / Waste Management /  Inc / Clean Up Australia / World Environment Day / Environment / Litter / Environmental social science

Participant Activities in Africa Participants can be Members or Guests

Add to Reading List

Source URL: www.cleanuptheworld.org

Language: English - Date: 2009-06-11 21:57:35
269Software bugs / Process / Shellcode / Emulator / Honeypot / Buffer overflow / Client honeypot / Fork / QEMU / Computing / Software / System software

Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploits Georgios Portokalidis Herbert Bos

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2008-03-11 00:44:06
270Software / Rogue security software / Avira / Computer virus / MS Antivirus / Zero-day virus / Microsoft Security Essentials / Malware / System software / Antivirus software

Reliability Digest, NovemberThe Achilles Heel of Antivirus Chia-Wei Wang ,Chong-Kuan Chen, Shiuhpyng Shieh, Department of Computer Science, National Chiao Tung University, Hsinchu City, Taiwan

Add to Reading List

Source URL: rs.ieee.org

Language: English - Date: 2014-11-17 21:03:15
UPDATE