software security

Results: 17991



#Item
941

Privilege Escalation via Antivirus Software A security vulnerability in the software component McAfee Security Agent, which is part of the antivirus software McAfee VirusScan Enterprise, can be leveraged in attacks again

Add to Reading List

Source URL: www.syss.de

Language: English - Date: 2014-09-03 07:21:19
    942Cyberwarfare / Computer security / Computing / Malware / Computer network security / Computer viruses / Hacking / Zero-day / Botnet / Antivirus software / Vulnerability

    THE MITRE CORPORATION THE MAEC™ LANGUAGE OVERVIEW DESIREE BECK, IVAN KIRILLOV, PENNY CHASE, MITRE JUNE 12, 2014

    Add to Reading List

    Source URL: maecproject.github.io

    Language: English - Date: 2016-06-15 18:10:07
    943

    OT provides the latest OTA technology to Telefónica Spain Colombes, France, April 7, 2016 Oberthur Technologies (OT), a leading global provider of embedded security software products, services and solutions today announ

    Add to Reading List

    Source URL: www.oberthur.com

    Language: English - Date: 2016-04-07 10:03:54
      944Ethernet / NetFlow / Computing / Network switch / System software / Information technology management / Local area networks / Network management / Computer network security

      Distributed Computing Prof. R. Wattenhofer Classifying Usage of LAN Ports In recent years, technologies such as

      Add to Reading List

      Source URL: www.tik.ee.ethz.ch

      Language: English - Date: 2015-12-23 06:49:21
      945Software / System software / Utility software / Installation software / Windows Installer / Installation / Email / Windows Vista / Norton Internet Security / EMCO Remote Installer

      LogToMail Documentation I.

      Add to Reading List

      Source URL: www.softfluent.com

      Language: English - Date: 2015-10-14 13:29:40
      946Cyberwarfare / Code injection / Machine code / Return-oriented programming / Privilege escalation / Uncontrolled format string / Computer security / Virtualization

      I Control Your Code Attack Vectors through the Eyes of Software-based Fault Isolation Mathias Payer <>

      Add to Reading List

      Source URL: hexhive.github.io

      Language: English - Date: 2016-06-13 11:08:40
      947Engineering / Computing / Technology / Computer systems / Systems engineering / Cyber-physical system / Systems Modeling Language / Internet of things / Object Process Methodology / Computer security / Model-based testing / Systems design

      Software and System Engineering for Cyber-Physical Systems: technical challenges and collaboration opportunities 26 January 2016 – IRIT Toulouse http://www.cpse-labs.eu/news_item6.php Workshop goals

      Add to Reading List

      Source URL: www.erts2016.org

      Language: English - Date: 2016-01-07 12:52:40
      948Software / System software / Computer architecture / Virtual memory / Memory management / Data compression / Data deduplication / Data management / Kernel same-page merging / X86-64 / Covert channel / Kernel

      Security Implications of Memory Deduplication in a Virtualized Environment Jidong Xiao∗ , Zhang Xu∗ , Hai Huang† , Haining Wang∗ ∗ The † IBM

      Add to Reading List

      Source URL: www.cs.wm.edu

      Language: English - Date: 2013-05-30 14:58:15
      949System administration / Information technology / Computing / Data security / Downtime / Failure / Information technology management / Maintenance / High availability / Backup / Availability / Veeam Software

      veeamup_ulli_infograph_15_fr

      Add to Reading List

      Source URL: dl.dropboxusercontent.com

      Language: English
      950Computing / Computer security / Technology / Content-control software / Webroot / MicroAge / Malware / Intel / Internet of things

      WEBROOT CUSTOMER CASE STUDY » MICROAGE MicroAge Partners with Webroot to Deliver Cloud-based Mobile Security BACKGROUND

      Add to Reading List

      Source URL: webroot-cms-cdn.s3.amazonaws.com

      Language: English - Date: 2016-02-25 11:51:21
      UPDATE