language:
Find link is a tool written by Edward Betts.Longer titles found: Computer security compromised by hardware failure (view), Computer security conference (view), Computer security incident management (view), Computer security model (view), Computer security policy (view), Computer security software (view), Vulnerability (computer security) (view), Exploit (computer security) (view), White hat (computer security) (view), Sandbox (computer security) (view), Full disclosure (computer security) (view), Black hat (computer security) (view), List of computer security certifications (view), Threat (computer security) (view), Logjam (computer security) (view), Blue team (computer security) (view), Shoulder surfing (computer security) (view), C-list (computer security) (view), Tom Cross (computer security) (view), Asset (computer security) (view)
searching for Computer security 216 found (3319 total)
alternate case: computer security
Impermium
(225 words)
[view diff]
no match in snippet
view article
find links to article
Impermium was a cyber-security startup company based in Redwood City, California, which provided anti-spam and account protection services for InternetRiskIQ (306 words) [view diff] no match in snippet view article find links to article
RiskIQ, Inc. was a cyber security company that was based in San Francisco, California. It provided cloud-based software as a service (SaaS) for organizationsCheck Point (1,462 words) [view diff] no match in snippet view article find links to article
Check Point Software Technologies Ltd. is an American-Israeli multinational provider of software and combined hardware and software products for IT securityMandiant (1,345 words) [view diff] case mismatch in snippet view article find links to article
2016. Perlroth, Nicole; Sanger, David (January 2, 2014). "FireEye Computer Security Firm Acquires Mandiant". The New York Times. Archived from the originalParrot OS (708 words) [view diff] no match in snippet view article find links to article
Parrot OS is a Linux distribution based on Debian with a focus on security, privacy, and development. Parrot is based on Debian's "stable" branch, withGoogle hacking (838 words) [view diff] no match in snippet view article find links to article
Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security holes in the configurationFederal Information Processing Standards (879 words) [view diff] exact match in snippet view article find links to article
and contractors. FIPS standards establish requirements for ensuring computer security and interoperability, and are intended for cases in which suitableInternet police (1,012 words) [view diff] no match in snippet view article find links to article
Internet police is a generic term for police and government agencies, departments and other organizations in charge of policing the Internet in a numberWinlogon (1,050 words) [view diff] no match in snippet view article find links to article
Winlogon (Windows Logon) is the component of Microsoft Windows operating systems that is responsible for handling the secure attention sequence, loadingNational Security Agency (24,653 words) [view diff] exact match in snippet view article find links to article
DoD Computer Security Center was founded in 1981 and renamed the National Computer Security Center (NCSC) in 1985. NCSC was responsible for computer securityEmployee monitoring software (795 words) [view diff] no match in snippet view article find links to article
Employee monitoring software, also known as bossware or tattleware, is a means of employee monitoring, and allows company administrators to monitor andHardware security module (1,539 words) [view diff] no match in snippet view article find links to article
A hardware security module (HSM) is a physical computing device that safeguards and manages secrets (most importantly digital keys), and performs encryptionMicrosoft Digital Crimes Unit (1,242 words) [view diff] no match in snippet view article find links to article
The Microsoft Digital Crimes Unit (DCU) is a Microsoft sponsored team of international legal and internet security experts employing the latest tools andIEEE 802.10 (182 words) [view diff] no match in snippet view article find links to article
IEEE 802.10 is a former standard for security functions that could be used in both local area networks and metropolitan area networks based on IEEE 802Darktrace (1,260 words) [view diff] no match in snippet view article find links to article
Darktrace Holdings Ltd is a British cyber security company, established in 2013 and headquartered in Cambridge, United Kingdom with further global officeNull character (959 words) [view diff] no match in snippet view article find links to article
The null character (also null terminator) is a control character with the value zero. It is present in many character sets, including those defined byDepartment of Telecommunications (523 words) [view diff] no match in snippet view article find links to article
The Department of Telecommunications, abbreviated to DoT, is a department of the Ministry of Communications of the executive branch of the Government ofL0pht (2,062 words) [view diff] case mismatch in snippet view article find links to article
famously testified in front of Congress in 1998 on the topic of ‘Weak Computer Security in Government’. The second character in its name was originally aSecure file transfer program (91 words) [view diff] no match in snippet view article find links to article
sftp is a command-line interface client program to transfer files using the SSH File Transfer Protocol (SFTP), which runs inside the encrypted Secure ShellSaferNet (185 words) [view diff] no match in snippet view article find links to article
SaferNet is a Brazilian non-governmental organization that combats Internet crime in partnership with the Federal Public Ministry. It facilitates anonymousGoogle Security Operations (329 words) [view diff] no match in snippet view article find links to article
Google Security Operations (a.k.a. Google SecOps), formerly Google Chronicle Security Operations, is a cybersecurity company which is part of the GoogleGoogle Security Operations (329 words) [view diff] no match in snippet view article find links to article
Google Security Operations (a.k.a. Google SecOps), formerly Google Chronicle Security Operations, is a cybersecurity company which is part of the GooglePort scanner (2,526 words) [view diff] case mismatch in snippet view article find links to article
SANS. Retrieved 2009-05-08. Cukier, Michel (2005). "Quantifying Computer Security" (PDF). University of Maryland. Archived from the original (PDF) onPluggable Authentication Module (421 words) [view diff] no match in snippet view article find links to article
A pluggable authentication module (PAM) is a mechanism to integrate multiple low-level authentication schemes into a high-level application programmingS/MIME (1,501 words) [view diff] no match in snippet view article find links to article
S/MIME (Secure/Multipurpose Internet Mail Extensions) is a standard for public-key encryption and signing of MIME data. S/MIME is on an IETF standardsCCNA (420 words) [view diff] no match in snippet view article find links to article
CCNA (Cisco Certified Network Associate) is an entry-level information technology (IT) certification offered by Cisco Systems. CCNA certification is widelyRoss J. Anderson (1,523 words) [view diff] exact match in snippet view article find links to article
and designed the stream cipher Pike. Anderson always campaigned for computer security to be studied in a wider social context. Many of his writings emphasisedCryptographic primitive (819 words) [view diff] exact match in snippet view article find links to article
algorithms that are frequently used to build cryptographic protocols for computer security systems. These routines include, but are not limited to, one-way hashKerio Technologies (658 words) [view diff] no match in snippet view article find links to article
Kerio Technologies, Inc. is a former technology company specializing in collaboration software and unified threat management for small and medium organizationsLinux PAM (314 words) [view diff] no match in snippet view article find links to article
Linux Pluggable Authentication Modules (PAM) is a suite of libraries that allow a Linux system administrator to configure methods to authenticate usersIntego (490 words) [view diff] no match in snippet view article find links to article
Intego is a Mac and Windows security software company founded in 1997 by Jean-Paul Florencio and Laurent Marteau. The company creates Internet securityOperation: Bot Roast (338 words) [view diff] no match in snippet view article find links to article
Operation: Bot Roast is an operation by the FBI to track down bot herders, crackers, or virus coders who install malicious software on computers throughSpecial Communications Service of Russia (553 words) [view diff] no match in snippet view article find links to article
The Special Communications and Information Service of the Federal Protective Service of the Russian Federation (Spetssvyaz, Spetssvyaz; Russian: СлужбаRadia Perlman (2,486 words) [view diff] no match in snippet view article find links to article
Radia Joy Perlman (/ˈreɪdiə/; born December 18, 1951) is an American computer programmer and network engineer. She is a major figure in assembling theBNC (software) (684 words) [view diff] no match in snippet view article
A BNC (short for Bounced Network Connection) is a piece of software that is used to relay traffic and connections in computer networks, much like a proxySudo (1,760 words) [view diff] no match in snippet view article find links to article
sudo (/suːduː/) is a program for Unix-like computer operating systems that enables users to run programs with the security privileges of another user,Scooby-Doo and the Cyber Chase (1,323 words) [view diff] no match in snippet view article find links to article
Scooby-Doo and the Cyber Chase is a 2001 American direct-to-video animated science fiction comedy mystery film, and the fourth in a series of direct-to-videoLavasoft (974 words) [view diff] case mismatch in snippet view article find links to article
November 9, 2010. "Page 3 - Ad-Aware Pro Anniversary Edition Review: Computer Security Articles at". Brighthub.com. May 4, 2010. Retrieved November 9, 2010Nessus (software) (161 words) [view diff] exact match in snippet view article
Computer security softwareNational Technical Research Organisation (1,560 words) [view diff] no match in snippet view article find links to article
The National Technical Research Organisation (NTRO) is a technical intelligence agency of India. It was set up in 2004. The agency reports to the NationalRole-based access control (2,300 words) [view diff] case mismatch in snippet view article find links to article
(October 1992). "Role-Based Access Control" (PDF). 15th National Computer Security Conference: 554–563. Sandhu, R., Coyne, E.J., Feinstein, H.L. andRunas (559 words) [view diff] no match in snippet view article find links to article
In computing, runas (a compound word, from “run as”) is a command in the Microsoft Windows line of operating systems that allows a user to run specificLeonard Adleman (832 words) [view diff] no match in snippet view article find links to article
Leonard Adleman (born December 31, 1945) is an American computer scientist. He is one of the creators of the RSA encryption algorithm, for which he receivedSCSK (366 words) [view diff] no match in snippet view article find links to article
SCSK Corporation (株式会社SCSK, Kabushiki-gaisha Esu-Shī-Esu-Kei) is a Japanese information technology company headquartered in Tokyo, Japan, offering IT servicesComputer forensics (2,409 words) [view diff] no match in snippet view article find links to article
Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digitalISACA (1,052 words) [view diff] no match in snippet view article find links to article
ISACA is an international professional association focused on IT (information technology) governance. On its IRS filings, it is known as the InformationGreat Cannon (612 words) [view diff] no match in snippet view article find links to article
The Great Cannon of China is an Internet attack tool that is used by the government of the People's Republic of China to launch distributed denial-of-serviceTiny Encryption Algorithm (1,189 words) [view diff] no match in snippet view article find links to article
In cryptography, the Tiny Encryption Algorithm (TEA) is a block cipher notable for its simplicity of description and implementation, typically a few linesProject Zero (1,496 words) [view diff] no match in snippet view article find links to article
Project Zero is a team of security analysts employed by Google tasked with finding zero-day vulnerabilities. It was announced on 15 July 2014. After findingDoxing (4,346 words) [view diff] no match in snippet view article find links to article
Doxing or doxxing is the act of publicly providing personally identifiable information about an individual or organization, usually via the Internet andNational Security Council (India) (1,276 words) [view diff] no match in snippet view article
The National Security Council (NSC) (IAST: Rāṣṭrīya Surakṣā Pariṣad) of India is an executive government body tasked with advising the prime Minister ofFred Teeven (849 words) [view diff] no match in snippet view article find links to article
Fredrik "Fred" Teeven (born 5 August 1958) is a Dutch jurist, bus driver and former politician and prosecutor. A member of the People's Party for FreedomIEC 60870-6 (1,896 words) [view diff] no match in snippet view article find links to article
IEC 60870 part 6 in electrical engineering and power system automation, is one of the IEC 60870 set of standards which define systems used for telecontrolXTEA (1,012 words) [view diff] no match in snippet view article find links to article
In cryptography, XTEA (eXtended TEA) is a block cipher designed to correct weaknesses in TEA. The cipher's designers were David Wheeler and Roger NeedhamRalph Merkle (1,180 words) [view diff] no match in snippet view article find links to article
Ralph C. Merkle (born February 2, 1952) is an American computer scientist and mathematician. He is one of the inventors of public-key cryptography, theMitro (467 words) [view diff] no match in snippet view article find links to article
Mitro was a password manager for individuals and teams that securely saved users' logins, and allowed users to log in and share access. On October 6, 2015ISC2 (1,020 words) [view diff] case mismatch in snippet view article find links to article
attendance included: Canadian Information Processing Society (CIPS) Computer Security Institute (CSI) Data Processing Management Association Special InterestRon Rivest (1,543 words) [view diff] no match in snippet view article find links to article
Ronald Linn Rivest (/rɪˈvɛst/; born May 6, 1947) is an American cryptographer and computer scientist whose work has spanned the fields of algorithms andMozilla Monitor (466 words) [view diff] no match in snippet view article find links to article
Mozilla Monitor, formerly known as Firefox Monitor, is an online data removal service developed by Mozilla, announced in June 2018, and launched on SeptemberAndries Brouwer (621 words) [view diff] no match in snippet view article find links to article
Andries Evert Brouwer (born 1951) is a Dutch mathematician and computer programmer, Professor Emeritus at Eindhoven University of Technology (TU/e). HeWebsite defacement (539 words) [view diff] no match in snippet view article find links to article
Website defacement is an attack on a website that changes the visual appearance of a website or a web page. These are typically the work of hackers, whoRon Rivest (1,543 words) [view diff] no match in snippet view article find links to article
Ronald Linn Rivest (/rɪˈvɛst/; born May 6, 1947) is an American cryptographer and computer scientist whose work has spanned the fields of algorithms andWardialing (831 words) [view diff] exact match in snippet view article find links to article
exploration, and crackers—malicious hackers who specialize in breaching computer security—for guessing user accounts (by capturing voicemail greetings), orNarus Inc. (562 words) [view diff] no match in snippet view article find links to article
Narus Inc. was a software company and vendor of big data analytics for cybersecurity. In 1997, Ori Cohen, Vice President of Business and Technology DevelopmentMitro (467 words) [view diff] no match in snippet view article find links to article
Mitro was a password manager for individuals and teams that securely saved users' logins, and allowed users to log in and share access. On October 6, 2015Scramdisk (210 words) [view diff] no match in snippet view article find links to article
Scramdisk is a free on-the-fly encryption program for Windows 95, Windows 98, and Windows Me. A non-free version was also available for Windows NT. TheDasient (407 words) [view diff] no match in snippet view article find links to article
Dasient was an internet security company headquartered in Sunnyvale, California. It was founded in 2008 and launched its first product in June 2009. DasientSentry 2020 (141 words) [view diff] no match in snippet view article find links to article
Sentry 2020 is a commercial software program for transparent disk encryption for PCs and PDAs using Microsoft Windows or Windows Mobile. It was developedTrend Micro Internet Security (841 words) [view diff] no match in snippet view article find links to article
Trend Micro Internet Security (known as PC-cillin Internet Security in Australia and Virus Buster in Japan) is an antivirus and online security programMorgan Kaufmann Publishers (172 words) [view diff] exact match in snippet view article find links to article
graphics, multimedia information and systems, artificial intelligence, computer security, and software engineering. Morgan Kaufmann's audience includes theSame-origin policy (2,182 words) [view diff] no match in snippet view article find links to article
In computing, the same-origin policy (SOP) is a concept in the web-app application security model. Under the policy, a web browser permits scripts containedRobert Tappan Morris (1,442 words) [view diff] case mismatch in snippet view article find links to article
Multics and Unix; and later became the chief scientist at the National Computer Security Center, a division of the National Security Agency (NSA). Morris grewVba32 AntiVirus (255 words) [view diff] no match in snippet view article find links to article
VBA32 (Virus Block Ada 32) is antivirus software from the vendor VirusBlokAda for personal computers running Microsoft Windows. It detects and neutralizesTCP reset attack (1,099 words) [view diff] exact match in snippet view article find links to article
Type of computer security exploitClickjacking (2,909 words) [view diff] no match in snippet view article find links to article
Clickjacking (classified as a user interface redress attack or UI redressing) is a malicious technique of tricking a user into clicking on something differentCrossCrypt (283 words) [view diff] no match in snippet view article find links to article
CrossCrypt is an open-source on-the-fly encryption program for the Microsoft Windows XP/2000 operating systems. CrossCrypt allows a user to make virtualCybersecurity and Infrastructure Security Agency (1,988 words) [view diff] no match in snippet view article find links to article
The Cybersecurity and Infrastructure Security Agency (CISA) is a component of the United States Department of Homeland Security (DHS) responsible for cybersecurityVyatta (916 words) [view diff] no match in snippet view article find links to article
Vyatta is a software-based virtual router, virtual firewall and VPN product for Internet Protocol networks (IPv4 and IPv6). A free download of Vyatta hasVirus hoax (1,202 words) [view diff] no match in snippet view article find links to article
A computer virus hoax is a message warning the recipients of a non-existent computer virus threat. The message is usually a chain e-mail that tells the360 Total Security (418 words) [view diff] no match in snippet view article find links to article
360 Total Security, or its Chinese version, 360 Safeguard (Chinese: 360安全卫士), is an antivirus software developed by Beijing, China-based internet securityMichael Schroeder (469 words) [view diff] exact match in snippet view article find links to article
is an American computer scientist. His areas of research include computer security, distributed systems, and operating systems, and he is perhaps bestThe Cuckoo's Egg (book) (1,122 words) [view diff] no match in snippet view article
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage is a 1989 book written by Clifford Stoll. It is his first-person account of theNetcraft (646 words) [view diff] no match in snippet view article find links to article
Netcraft is an Internet services company based in London, England. The company provides cybercrime disruption services across a range of industries. NetcraftSnort (software) (441 words) [view diff] no match in snippet view article
Snort is a free open source network intrusion detection system (IDS) and intrusion prevention system (IPS) created in 1998 by Martin Roesch, founder andRop Gonggrijp (673 words) [view diff] exact match in snippet view article find links to article
[citation needed] After he left XS4ALL, Gonggrijp founded ITSX, a computer security evaluation company, which was bought by Madison Gurkha in 2006.[citationMartin Hellman (1,554 words) [view diff] no match in snippet view article find links to article
Martin Edward Hellman (born October 2, 1945) is an American cryptologist and mathematician, best known for his invention of public-key cryptography in360 Total Security (418 words) [view diff] no match in snippet view article find links to article
360 Total Security, or its Chinese version, 360 Safeguard (Chinese: 360安全卫士), is an antivirus software developed by Beijing, China-based internet securityOWASP (1,634 words) [view diff] exact match in snippet view article find links to article
Computer security organizationWOT Services (1,277 words) [view diff] no match in snippet view article find links to article
WOT Services is the developer of MyWOT (also known as WOT and Web of Trust), an online reputation and Internet safety service which shows indicators ofNational Security Operations Center (383 words) [view diff] no match in snippet view article find links to article
The National Security Operations Center (NSOC) or Directorate K is the part of the United States National Security Agency responsible for current operationsUtimaco Atalla (1,670 words) [view diff] case mismatch in snippet view article find links to article
National Institute of Standards and Technology. 28 October 2010. Computer Security Resource Center (3 December 2002). "FIPS 140-2 Security RequirementsShatter attack (831 words) [view diff] no match in snippet view article find links to article
In computing, a shatter attack is a programming technique employed by hackers on Microsoft Windows operating systems to bypass security restrictions betweenCylance Pro Cycling (women's team) (319 words) [view diff] exact match in snippet view article
Tour, in 2016. The team's major sponsor, Cylance, was a high-tech computer security firm, and the team was owned by Inspire Sports whose founder, OmerSplunk (3,957 words) [view diff] no match in snippet view article find links to article
Splunk Inc. is an American software company based in San Francisco, California, that produces software for searching, monitoring, and analyzing machine-generatedHard copy (562 words) [view diff] no match in snippet view article find links to article
In information handling, the U.S. Federal Standard 1037C (Glossary of Telecommunication Terms) defines a hard copy as a permanent reproduction, or copyTiger team (755 words) [view diff] case mismatch in snippet view article find links to article
approach to resolving vulnerability cases". Proc. 11th FIRST Conf. Computer Security Incident Handling and Response. Brisbane, Australia: CiteSeerX: 1–2Wardriving (1,572 words) [view diff] no match in snippet view article find links to article
Wardriving is the act of searching for Wi-Fi wireless networks as well as cell towers, usually from a moving vehicle, using a laptop or smartphone. SoftwareKeycloak (498 words) [view diff] no match in snippet view article find links to article
Keycloak is an open-source software product to allow single sign-on with identity and access management aimed at modern applications and services. UntilVincent Pilette (383 words) [view diff] no match in snippet view article find links to article
Vincent Pilette is an American businessman who is chief executive officer (CEO) of Gen Digital, a Fortune 500 company specializing in consumer cyber safetyKeycloak (498 words) [view diff] no match in snippet view article find links to article
Keycloak is an open-source software product to allow single sign-on with identity and access management aimed at modern applications and services. UntilHector Martin (hacker) (826 words) [view diff] no match in snippet view article
Hector Martin Cantero (born September 9, 1990), also known as marcan, is a Spanish security hacker and former lead developer on the Asahi Linux projectTrusted Computing Group (596 words) [view diff] no match in snippet view article find links to article
The Trusted Computing Group is a group formed in 2003 as the successor to the Trusted Computing Platform Alliance which was previously formed in 1999 toFirewall (film) (1,458 words) [view diff] no match in snippet view article
Firewall is a 2006 American action thriller film directed by Richard Loncraine and written by Joe Forte. The film stars Harrison Ford as a banker who isShatter attack (831 words) [view diff] no match in snippet view article find links to article
In computing, a shatter attack is a programming technique employed by hackers on Microsoft Windows operating systems to bypass security restrictions betweenBusKill (1,044 words) [view diff] no match in snippet view article find links to article
BusKill is an open-source hardware and software project that designs computer kill cords to protect the confidentiality of the system's data from physicalBillboard hacking (1,122 words) [view diff] no match in snippet view article find links to article
Billboard hacking or billboard hijacking is the practice of altering a billboard without the consent of the owner. It may involve physically pasting newSourcefire (1,425 words) [view diff] exact match in snippet view article find links to article
American computer security companyPeter G. Neumann (536 words) [view diff] exact match in snippet view article find links to article
intrusion detection system known as IDES that was a model for later computer security software. Neumann has long served as moderator of RISKS Digest andNational Cybersecurity and Communications Integration Center (652 words) [view diff] no match in snippet view article find links to article
The National Cybersecurity and Communications Integration Center (NCCIC) is part of the Cybersecurity Division of the Cybersecurity and InfrastructureSonicWall (977 words) [view diff] no match in snippet view article find links to article
SonicWall Inc. is an American cybersecurity company that sells a range of Internet appliances primarily directed at content control and network securityDynamic linker (1,687 words) [view diff] no match in snippet view article find links to article
In computing, a dynamic linker is the part of an operating system that loads and links the shared libraries needed by an executable when it is executedIncident management (1,628 words) [view diff] case mismatch in snippet view article find links to article
resources to treat the risk. Today, an important role is played by a Computer Security Incident Response Team (CSIRT), due to the rise of internet crimeClifford Stoll (1,082 words) [view diff] no match in snippet view article find links to article
Clifford Paul "Cliff" Stoll (born June 4, 1950) is an American astronomer, author and teacher. He is best known for his investigation in 1986, while workingCheetah Mobile (1,286 words) [view diff] no match in snippet view article find links to article
Cheetah Mobile Inc. (猎豹移动公司) is a Chinese mobile internet company incorporated in the Cayman Islands and headquartered in Beijing. Chen Rui (陈睿 currentBen Laurie (487 words) [view diff] no match in snippet view article find links to article
Ben Laurie is an English software engineer. Laurie wrote Apache-SSL, the basis of most SSL-enabled versions of the Apache HTTP Server. He developed theAVG Technologies (1,879 words) [view diff] no match in snippet view article find links to article
AVG Technologies B.V. is a brand of cybersecurity, privacy, performance and utility software applications for desktop computers and mobile devices developedNeed to know (831 words) [view diff] no match in snippet view article find links to article
The term "need to know" (alternatively spelled need-to-know), when used by governments and other organizations (particularly those related to militaryZeek (645 words) [view diff] no match in snippet view article find links to article
Free and open-source software portal Zeek is a free and open-source software network analysis framework. Vern Paxson began development work on Zeek inESET (2,511 words) [view diff] no match in snippet view article find links to article
ESET, s.r.o., is a software company specializing in cybersecurity, founded in 1992 in Bratislava, Slovakia. ESET's security products are made in EuropeOpenPAM (236 words) [view diff] no match in snippet view article find links to article
Free and open-source software portal OpenPAM is a BSD-licensed implementation of PAM used by FreeBSD, NetBSD, DragonFly BSD and macOS (starting with SnowDr.Web (649 words) [view diff] no match in snippet view article find links to article
Dr.Web is a software suite developed by Russian anti-malware company Doctor Web. First released in 1992, it became the first anti-virus service in RussiaSecureworks (1,290 words) [view diff] no match in snippet view article find links to article
Secureworks Inc. is an American cybersecurity company. The company has approximately 4,000 customers in more than 50 countries, ranging from Fortune 100RSA Conference (1,494 words) [view diff] no match in snippet view article find links to article
The RSA Conference is a series of IT security conferences. Approximately 45,000 people attend one of the conferences each year. It was founded in 1991StrongDM (331 words) [view diff] no match in snippet view article find links to article
StrongDM is an American technology company that develops an infrastructure access platform. In 2024 the company raised a $34,000,000 series C from CapitalThe Tor Project (2,158 words) [view diff] no match in snippet view article find links to article
The Tor Project, Inc. is a 501(c)(3) research-education nonprofit organization based in Winchester, Massachusetts. It is founded by computer scientistsWS-Security (1,441 words) [view diff] no match in snippet view article find links to article
Web Services Security (WS-Security, WSS) is an extension to SOAP to apply security to Web services. It is a member of the Web service specifications andCheetah Mobile (1,286 words) [view diff] no match in snippet view article find links to article
Cheetah Mobile Inc. (猎豹移动公司) is a Chinese mobile internet company incorporated in the Cayman Islands and headquartered in Beijing. Chen Rui (陈睿 currentThe Tor Project (2,158 words) [view diff] no match in snippet view article find links to article
The Tor Project, Inc. is a 501(c)(3) research-education nonprofit organization based in Winchester, Massachusetts. It is founded by computer scientistsStrongDM (331 words) [view diff] no match in snippet view article find links to article
StrongDM is an American technology company that develops an infrastructure access platform. In 2024 the company raised a $34,000,000 series C from CapitalGolden Shield Project (3,376 words) [view diff] no match in snippet view article find links to article
The Golden Shield Project (Chinese: 金盾工程; pinyin: jīndùn gōngchéng), also named National Public Security Work Informational Project, is the Chinese nationwideGoGuardian (1,352 words) [view diff] no match in snippet view article find links to article
GoGuardian is an educational software company founded in 2015 and based in Los Angeles, California. The company's services monitor student activity onlineCanon IT Solutions (345 words) [view diff] no match in snippet view article find links to article
Canon IT Solutions Inc. (キヤノンITソリューションズ株式会社, Kyanon Ai-Tī Soryūshonzu Kabushiki-gaisha) is a Japanese company headquartered in Tokyo, Japan, that offersMichael Burrows (computer scientist) (715 words) [view diff] no match in snippet view article
Michael Burrows, FRS (born 1963) is a British computer scientist and the creator of the Burrows–Wheeler transform, currently working for Google. Born inESET NOD32 (2,231 words) [view diff] no match in snippet view article find links to article
ESET NOD32 Antivirus, commonly known as NOD32, is an antivirus software package made by the Slovak company ESET. ESET NOD32 Antivirus is sold in two editionsAnti-keylogger (1,016 words) [view diff] no match in snippet view article find links to article
An anti-keylogger (or anti–keystroke logger) is a type of software specifically designed for the detection of keystroke logger software; often, such softwareXXTEA (1,115 words) [view diff] no match in snippet view article find links to article
In cryptography, Corrected Block TEA (often referred to as XXTEA) is a block cipher designed to correct weaknesses in the original Block TEA. XXTEA isARP spoofing (1,558 words) [view diff] no match in snippet view article find links to article
In computer networking, ARP spoofing (also ARP cache poisoning or ARP poison routing) is a technique by which an attacker sends (spoofed) Address ResolutionWindows Live OneCare Safety Scanner (414 words) [view diff] exact match in snippet view article find links to article
provides a virus database, information about online threats, and general computer security documentation and tools. The virus scanner on the Windows Live OneCareProxy list (375 words) [view diff] no match in snippet view article find links to article
A proxy list is a list of open HTTP/HTTPS/SOCKS proxy servers all on one website. Proxies allow users to make indirect network connections to other computerCyber-security regulation (5,480 words) [view diff] case mismatch in snippet view article find links to article
are now held accountable for reporting major security incidents to Computer Security Incident Response Teams (CSIRT). While DSPs are not held to as stringentTrishneet Arora (762 words) [view diff] no match in snippet view article find links to article
Trishneet Arora (born 2 November 1993) is an Indian cyber security professional who is the founder of TAC Security. TAC Security India's first pure-playList of data-erasing software (184 words) [view diff] no match in snippet view article find links to article
This is a list of utilities for performing data erasure. "BleachBit Features". Retrieved 3 April 2016. "CCleaner Features". Retrieved 3 April 2016. "DBANNorton AntiBot (717 words) [view diff] no match in snippet view article find links to article
Norton AntiBot, developed by Symantec, monitored applications for damaging behavior. The application was designed to prevent computers from being hijackedDangling pointer (1,824 words) [view diff] no match in snippet view article find links to article
Dangling pointers and wild pointers in computer programming are pointers that do not point to a valid object of the appropriate type. These are specialMan-in-the-browser (1,867 words) [view diff] no match in snippet view article find links to article
Man-in-the-browser (MITB, MitB, MIB, MiB), a form of Internet threat related to man-in-the-middle (MITM), is a proxy Trojan horse that infects a web browserCNIC (Pakistan) (1,731 words) [view diff] no match in snippet view article
The computerised national identity card (CNIC) (Urdu: قومی شناختی کارڈ, romanized: qaumī śanāxtī kārḍ) is an identity card with a 13-digit number availableJtest (303 words) [view diff] no match in snippet view article find links to article
Jtest is an automated Java software testing and static analysis product developed by Parasoft. The product includes technology for data-flow analysis,Vern Paxson (240 words) [view diff] no match in snippet view article find links to article
Vern Edward Paxson is a Professor of Computer Science at the University of California, Berkeley. He also leads the Networking and Security Group at theElcomSoft (594 words) [view diff] exact match in snippet view article find links to article
Since its establishment in 1990, the company has been working on computer security programs, with the main focus on password and system recovery softwareStakkato (385 words) [view diff] no match in snippet view article find links to article
Philip Gabriel Pettersson, known by the alias Stakkato, is a Swedish hacker and the alleged perpetrator of a worldwide cyber attack known to have occurredList of data-erasing software (184 words) [view diff] no match in snippet view article find links to article
This is a list of utilities for performing data erasure. "BleachBit Features". Retrieved 3 April 2016. "CCleaner Features". Retrieved 3 April 2016. "DBANDangling pointer (1,824 words) [view diff] no match in snippet view article find links to article
Dangling pointers and wild pointers in computer programming are pointers that do not point to a valid object of the appropriate type. These are specialCNIC (Pakistan) (1,731 words) [view diff] no match in snippet view article
The computerised national identity card (CNIC) (Urdu: قومی شناختی کارڈ, romanized: qaumī śanāxtī kārḍ) is an identity card with a 13-digit number availableJohn Draper (3,245 words) [view diff] exact match in snippet view article find links to article
former phone phreak. He is a widely known figure within the hacker and computer security community. He is primarily known as a colorful and unconventionalXcitium (2,744 words) [view diff] exact match in snippet view article find links to article
the time of the event. For Comodo's lacking response on the issue computer security researcher Moxie Marlinspike called the whole event extremely embarrassingF5, Inc. (2,156 words) [view diff] no match in snippet view article find links to article
F5, Inc. is an American technology company specializing in application security, multi-cloud management, online fraud prevention, application deliveryMan-in-the-browser (1,867 words) [view diff] no match in snippet view article find links to article
Man-in-the-browser (MITB, MitB, MIB, MiB), a form of Internet threat related to man-in-the-middle (MITM), is a proxy Trojan horse that infects a web browserGordon Lyon (444 words) [view diff] no match in snippet view article find links to article
Gordon Lyon (also known by his pseudonym Fyodor Vaskovich) is an American network security expert, creator of Nmap and author of books, websites, and technicalThe Hacker Crackdown (208 words) [view diff] no match in snippet view article find links to article
The Hacker Crackdown: Law and Disorder on the Electronic Frontier is a work of nonfiction by Bruce Sterling first published in 1992. The book discussesElcomSoft (594 words) [view diff] exact match in snippet view article find links to article
Since its establishment in 1990, the company has been working on computer security programs, with the main focus on password and system recovery softwareNetIQ (551 words) [view diff] no match in snippet view article find links to article
NetIQ is a security software company. In 2023 it was acquired by OpenText. NetIQ was previously based in San Jose, California, with products that provideSteve Gibson (computer programmer) (1,568 words) [view diff] no match in snippet view article
Steven M. Gibson (born March 26, 1955) is an American software engineer, security researcher, and IT security proponent. In the early 1980s, he workedInteger overflow (3,206 words) [view diff] no match in snippet view article find links to article
In computer programming, an integer overflow occurs when an arithmetic operation on integers attempts to create a numeric value that is outside of theMilw0rm (1,642 words) [view diff] exact match in snippet view article find links to article
seemed to be more interested in political purposes than exposing computer security flaws. It was also reported that milw0rm broke into a Turkish nuclearDerek Atkins (113 words) [view diff] exact match in snippet view article find links to article
Derek A Atkins is a computer scientist specializing in computer security. He studied electrical engineering and computer science at the MassachusettsEstonian Defence League's Cyber Unit (271 words) [view diff] no match in snippet view article find links to article
The Estonian Defence League’s Cyber Unit (Estonian: Küberkaitseliit, or KKL) is a group of units within certain malevs of the Estonian Defense League establishedMydoom (1,627 words) [view diff] exact match in snippet view article find links to article
online crime gangs. Mydoom was named by Craig Schmugar, an employee of computer security firm McAfee and one of the earliest discoverers of the worm. SchmugarNorwegian Cyber Defence Force (122 words) [view diff] no match in snippet view article find links to article
The Norwegian Cyber Defence Force (Norwegian: Cyberforsvaret) is a branch of the Norwegian Armed Forces responsible for military communications and defensiveFactotum (software) (129 words) [view diff] no match in snippet view article
factotum is a password management and authentication protocol negotiation virtual file system for Plan 9 from Bell Labs. When a program wants to authenticateGeneral Dynamics Mission Systems (1,255 words) [view diff] no match in snippet view article find links to article
General Dynamics Mission Systems is a business unit of American defense and aerospace company General Dynamics. General Dynamics Mission Systems integratesTelecom Enforcement Resource and Monitoring (1,068 words) [view diff] no match in snippet view article find links to article
Telecom Enforcement Resource and Monitoring (TERM), formerly known as Vigilance Telecom Monitoring (VTM), is the vigilance and monitoring wing of the IndianChain of trust (465 words) [view diff] exact match in snippet view article find links to article
In computer security, a chain of trust is established by validating each component of hardware and software from the end entity up to the root certificateMark Abene (1,333 words) [view diff] no match in snippet view article find links to article
Mark Abene (born February 23, 1972) is an American information security expert and entrepreneur, originally from New York City. Better known by his pseudonymDerek Atkins (113 words) [view diff] exact match in snippet view article find links to article
Derek A Atkins is a computer scientist specializing in computer security. He studied electrical engineering and computer science at the MassachusettsExpressVPN (2,105 words) [view diff] no match in snippet view article find links to article
ExpressVPN is a company providing online privacy and security solutions, including a virtual private network (VPN) service and a password manager. SinceMAC spoofing (1,341 words) [view diff] no match in snippet view article find links to article
MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device. The MAC addressEric Corley (583 words) [view diff] no match in snippet view article find links to article
Eric Gordon Corley (born December 16, 1959), also frequently referred to by his pen name of Emmanuel Goldstein, is a figure in the hacker community. HeImmuniWeb (992 words) [view diff] no match in snippet view article find links to article
ImmuniWeb is a global application security company headquartered in Geneva, Switzerland. ImmuniWeb develops machine learning and AI technologies for SaaS-basedNational Cipher Challenge (507 words) [view diff] no match in snippet view article find links to article
The National Cipher Challenge is an annual cryptographic competition organised by the University of Southampton School of Mathematics. Competitors attemptGTRI Cyber Technology and Information Security Laboratory (200 words) [view diff] no match in snippet view article find links to article
The Cybersecurity, Information Protection, and Hardware Evaluation Research Laboratory (CIPHER) is one of eight labs in the Georgia Tech Research InstituteSetuid (2,019 words) [view diff] no match in snippet view article find links to article
The Unix and Linux access rights flags setuid and setgid (short for set user identity and set group identity) allow users to run an executable with theQualys (1,077 words) [view diff] no match in snippet view article find links to article
Qualys, Inc. is an American technology firm based in Foster City, California, specializing in cloud security, compliance and related services. Qualys hasCentre for Development of Telematics (972 words) [view diff] no match in snippet view article find links to article
The Centre for Development of Telematics (C-DOT) is an Indian Government owned telecommunications technology development centre. It was established inLondon School of Economics (15,562 words) [view diff] no match in snippet view article find links to article
The London School of Economics and Political Science (LSE), established in 1895, is a public research university in London, England, and a member institutionPirates of Silicon Valley (3,626 words) [view diff] no match in snippet view article find links to article
Pirates of Silicon Valley is a 1999 American biographical drama television film directed by Martyn Burke and starring Noah Wyle as Steve Jobs and AnthonyMicrosoft Forefront (677 words) [view diff] no match in snippet view article find links to article
Microsoft Forefront is a discontinued family of line-of-business security software by Microsoft Corporation. Microsoft Forefront products are designedEnpass (470 words) [view diff] no match in snippet view article find links to article
Enpass is a freemium password manager and passkey manager available for MacOS, Windows, iOS, Android and Linux, with browser extensions for all major browsersRebecca Bace (935 words) [view diff] exact match in snippet view article find links to article
Rebecca "Becky" Gurley Bace (1955–2017) was an American computer security expert and pioneer in intrusion detection. She spent 12 years at the US NationalTrusteer (1,949 words) [view diff] exact match in snippet view article find links to article
Trusteer is a Boston-based computer security division of IBM, responsible for a suite of security software. Founded by Mickey Boodaei and Rakesh K. LoonkarAladdin Knowledge Systems (635 words) [view diff] no match in snippet view article find links to article
Aladdin Knowledge Systems Ltd. was a company that produced software for digital rights management and Internet security. The company was acquired by SafenetFBI Cyber Division (742 words) [view diff] no match in snippet view article find links to article
The Cyber Division (CyD) is a Federal Bureau of Investigation division which heads the national effort to investigate and prosecute internet crimes, includingVeracode (1,093 words) [view diff] no match in snippet view article find links to article
Veracode is an application security company based in Burlington, Massachusetts. Founded in 2006, it provides SaaS application security that integratesTrusted Platform Module (6,593 words) [view diff] no match in snippet view article find links to article
A Trusted Platform Module (TPM) is a secure cryptoprocessor that implements the ISO/IEC 11889 standard. Common uses are verifying that the boot processNetScreen Technologies (576 words) [view diff] no match in snippet view article find links to article
NetScreen Technologies was an American technology company that was acquired by Juniper Networks for US$4 billion stock for stock in 2004. NetScreen TechnologiesKeePassXC (342 words) [view diff] no match in snippet view article find links to article
KeePassXC is a free and open-source password manager. It started as a community fork of KeePassX (itself a cross-platform port of KeePass). It is builtInformation Technology Act, 2000 (3,243 words) [view diff] no match in snippet view article find links to article
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 OctoberBeyondTrust (1,463 words) [view diff] no match in snippet view article find links to article
BeyondTrust (formerly Symark) is an American company that develops, markets, and supports a family of privileged identity management / access managementFred Cohen (355 words) [view diff] case mismatch in snippet view article find links to article
Computer Virus Research 1991, A Case for Benevolent Viruses 1991, The Computer Security Encyclopedia - Computer Viruses 1992, A Formal Definition of ComputerNEC (5,607 words) [view diff] no match in snippet view article find links to article
NEC Corporation (日本電気株式会社, Nippon Denki Kabushiki gaisha, an acronym for the Nippon Electric Company) is a Japanese multinational information technologyFBI Cyber Division (742 words) [view diff] no match in snippet view article find links to article
The Cyber Division (CyD) is a Federal Bureau of Investigation division which heads the national effort to investigate and prosecute internet crimes, includingSafeNet (1,241 words) [view diff] no match in snippet view article find links to article
SafeNet, Inc. was an information security company based in Belcamp, Maryland, United States, which was acquired in August 2014 by the French security companyBluesnarfing (859 words) [view diff] no match in snippet view article find links to article
Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops,HTTP parameter pollution (284 words) [view diff] no match in snippet view article find links to article
HTTP Parameter Pollution (HPP) is a web application vulnerability exploited by injecting encoded query string delimiters in already existing parametersLock screen (1,914 words) [view diff] no match in snippet view article find links to article
A lock screen is a computer user interface element used by various operating systems. They regulate immediate access to a device by requiring the userDNS hijacking (2,246 words) [view diff] no match in snippet view article find links to article
DNS hijacking, DNS poisoning, or DNS redirection is the practice of subverting the resolution of Domain Name System (DNS) queries. This can be achievedSafeInCloud (161 words) [view diff] no match in snippet view article find links to article
SafeInCloud is a proprietary password manager to securely store passwords and other credentials offline and in the cloud. It is similar to Enpass whichSMS spoofing (703 words) [view diff] no match in snippet view article find links to article
SMS spoofing is a technology which uses the short message service (SMS), available on most mobile phones and personal digital assistants, to set who theInstitute of Electrical and Electronics Engineers (1,856 words) [view diff] no match in snippet view article find links to article
The Institute of Electrical and Electronics Engineers (IEEE) is an American 501(c)(3) public charity for electrical engineering, electronics engineeringHost protected area (846 words) [view diff] no match in snippet view article find links to article
The host protected area (HPA) is an area of a hard drive or solid-state drive that is not normally visible to an operating system. It was first introducedBS 7799 (491 words) [view diff] no match in snippet view article find links to article
BS 7799 was a British standard "Code of Practice for Information Security Management", first published as such by the British Standards Institution (BSI)ACF2 (310 words) [view diff] case mismatch in snippet view article find links to article
of Minnesota. Jeffrey Yost, "The Origin and Early History of the Computer Security Software Products Industry," IEEE Annals of the History of ComputingDorothy E. Denning (2,203 words) [view diff] exact match in snippet view article find links to article
website. Denning has received over 20 awards for her innovations in computer security. Key contributions are described below. "A Lattice Model of SecureScanSafe (535 words) [view diff] no match in snippet view article find links to article
ScanSafe was a privately held company backed by investors Benchmark Capital and Scale Venture Partners, until its 2009 acquisition by Cisco Systems. TheAllot Ltd. (1,268 words) [view diff] no match in snippet view article find links to article
Allot Ltd., formerly Allot Communications, is an Israeli high-tech company that develops telecommunications software. The company is headquartered in HodDepartment of Defense Cyber Crime Center (1,241 words) [view diff] no match in snippet view article find links to article
The Department of Defense Cyber Crime Center (DC3) is designated as a Federal Cyber Center by National Security Presidential Directive 54/Homeland SecurityMarcus J. Ranum (1,359 words) [view diff] exact match in snippet view article find links to article
He has held technical and leadership positions with a number of computer security companies, and is a faculty member of the Institute for Applied Network