software security

Results: 17991



#Item
311Computing / Software / Computer architecture / Smartphones / Mobile app / Google Play / Recommender system / Personal /  Inc. / Android / IOS / Internet privacy

Mobile App Recommendations with Security and Privacy Awareness Hengshu Zhu1 Hui Xiong2∗

Add to Reading List

Source URL: staff.ustc.edu.cn

Language: English - Date: 2014-11-13 08:20:35
312Software / SCADA / Computing / Computer network security / Computer security / WinCC / Control engineering / CVSS / S7 / Countermeasure / Vulnerability

Siemens Security Advisory by Siemens ProductCERT SSA: Vulnerabilities in SIMATIC WinCC, PCS 7 and WinCC Runtime Professional Publication Date

Add to Reading List

Source URL: www.siemens.com

Language: English - Date: 2016-08-11 10:42:00
313Malware / Computer security / Software / Antivirus software / Rogue software / Malwarebytes / Scareware / Ransomware / Computer virus / Rogue security software / Zero-day / Marcin Kleczynski

C A S E S T U DY At United Bank, there is no payoff for ransomware Bank uses Malwarebytes to prevent malware and exploits from cashing in Business profile

Add to Reading List

Source URL: pl.malwarebytes.com

Language: English - Date: 2016-07-06 12:41:45
314Computing / Computer access control / Software / Cryptography / Internet Explorer / Login / Password / Authentication / Transport Layer Security / HTTP cookie

Tel: E-mail: 1. DIGITAL CERTIFICATE AUTHENTICATION 1.a. Technical requirements 

Add to Reading List

Source URL: internetbanking.ro

Language: English - Date: 2014-11-05 04:27:13
315Microsoft / Computing / Software / Password / Security / Form / Outlook.com / Email / Registered user / Online shopping

How To Submit An Online RMA http://www.datalogic.com INDEX INSTRUCTIONS MANUAL HOW TO ACCESS THE SERVICE

Add to Reading List

Source URL: www.datalogic.com

Language: English - Date: 2014-05-14 02:33:40
316Software / Antivirus software / Freeware / Cloud clients / News aggregators / Proprietary software / AV-Comparatives / Avast Software / Comparison of antivirus software / ESET / Avira / Google Chrome

Security Surveywww.av-comparatives.org IT Security Survey 2016

Add to Reading List

Source URL: www.codilime.com

Language: English - Date: 2016-04-05 08:57:15
317User interface techniques / Software / Computing / Security / E-commerce / Cybercrime / Point and click / Form / Join / Computer security / Click consonant

lefttop00 HCM Security User Permission Form To request access, please complete this form, obtain the appropriate approval, and email to . If a requested Role is added that den

Add to Reading List

Source URL: nmdfa.state.nm.us

Language: English - Date: 2016-05-10 10:59:56
318Computer security / Cyberwarfare / Software / Antivirus software / Malwarebytes / Malware / Computer virus / Ransomware / Zero-day / Rootkit / Marcin Kleczynski

C A S E S T U DY Agnico Eagle Mines Ltd. strikes gold with Malwarebytes Malwarebytes proactively blocks exploits from entering and digging in Business profile

Add to Reading List

Source URL: fr.malwarebytes.com

Language: English - Date: 2016-07-21 17:43:42
319Computer security / Software / Cyberwarfare / Antivirus software / Malwarebytes / Malware / Rootkit / Computer virus / Avira / Ransomware / Spyware / Zero-day

C A S E S T U DY Gallup-McKinley County Schools successfully defends against ransomware Malwarebytes is a critical part of maintaining a safe learning environment Business profile

Add to Reading List

Source URL: pl.malwarebytes.com

Language: English - Date: 2016-07-06 12:41:45
320Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Zero-day / Avira / Marcin Kleczynski

C A S E S T U DY When it comes to malware defense, Gilbane Building Company nails it Gilbane crushes malware and exploits on its endpoints with Malwarebytes Endpoint Security

Add to Reading List

Source URL: pl.malwarebytes.com

Language: English - Date: 2016-07-07 18:40:15
UPDATE