Zero-day

Results: 689



#Item
331Hewlett-Packard / Computer security / Data security / Vulnerability / Social vulnerability / Information security / Computing / Security / Technology

  ZERO DAY INITIATIVE RESEARCHER AGREEMENT Welcome to Hewlett-Packard Company’s Zero Day Initiative (“ZDI”) researcher program (“Program”). This Program is governed by this researcher agreement (“Researcher

Add to Reading List

Source URL: zerodayinitiative.com

Language: English - Date: 2014-07-16 14:48:14
332Pollution / Industrial ecology / Food waste / Biodegradable waste / Food waste in the United Kingdom / Zero waste / Environment / Waste / Waste management

Food Waste Discussion Read the following: Information A: An extract from a news report on June 4th, 2013 June 5 is World Environment Day, this year s theme is to promote against food wastage and loss, therefore: Think.

Add to Reading List

Source URL: foodwaste.foe.org.hk

Language: English - Date: 2014-10-30 05:52:00
333Computing / Malware / Multi-agent systems / Spamming / Zero-day attack / Vulnerability / Botnet / Attack / Rootkit / Cyberwarfare / Computer security / Computer network security

Threat Report H2 2012 Protecting the irreplaceable | www.f-secure.com

Add to Reading List

Source URL: www.f-secure.com

Language: English - Date: 2014-08-28 23:31:48
334Cyberwarfare / Computing / Multi-agent systems / Spamming / Malware / Zero-day attack / Computer virus / Botnet / Linux malware / Computer network security / Antivirus software / Computer security

Zero-Day Exploit CAN WE DEFEND AGAINST IT? www.network-box.com Real Time Threats

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2013-03-11 03:10:30
335Waste containers / Plastics / Recycling / Plastic recycling / Kerbside collection / Plastic / Bin bag / Polystyrene / Zero waste / Waste management / Sustainability / Technology

Plastic Recycling Fact Sheet July 2009 Plastic Recycling Plastics are the most common rubbish item found on Clean Up Australia Day, representing over 30% of all rubbish collected over the past 10 years7. This includes dr

Add to Reading List

Source URL: www.cleanup.org.au

Language: English - Date: 2010-11-17 18:56:24
336Computer security / Computer network security / Antivirus software / Spamming / Rootkit / Computer worm / Computer virus / Spyware / Zero-day attack / System software / Cyberwarfare / Malware

Threat Summaries Volume 1: [removed]

Add to Reading List

Source URL: www.f-secure.com

Language: English - Date: 2014-09-19 05:29:33
337Cyberwarfare / Risk / National security / Vulnerability / Zero-day attack / Social vulnerability / Information security / Threat / Malware / Computer network security / Security / Computer security

www.strasan.com Strasan MyCSO: Proactive Threat and Vulnerability Monitoring Securing Small to Medium Enterprises Strasan’s MyCSO Vulnerability Manager combines

Add to Reading List

Source URL: strasan.com

Language: English - Date: 2011-10-22 12:30:40
338Cyberwarfare / Computing / Multi-agent systems / Spamming / Malware / Zero-day attack / Computer virus / Botnet / Linux malware / Computer network security / Antivirus software / Computer security

Zero-Day Exploit CAN WE DEFEND AGAINST IT? www.network-box.com Real Time Threats

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2013-03-11 03:10:31
339Cyberwarfare / Computing / Multi-agent systems / Spamming / Malware / Zero-day attack / Computer virus / Botnet / Linux malware / Computer network security / Antivirus software / Computer security

Zero-Day Exploit CAN WE DEFEND AGAINST IT? www.network-box.com Real Time Threats

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2013-03-11 03:10:32
340Computer network security / Hacking / Software testing / Vulnerability / Zero-day attack / Patch / Transdermal patch / United States Computer Emergency Readiness Team / Patch Tuesday / Computer security / Cyberwarfare / Computing

PATCH MANAGEMENT February 2008 © The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-03-29 08:30:08
UPDATE