639 results on '"Lemos, Robert"'
Search Results
152. Concern Rises About Cyber-Attacks Physically Damaging Industries.
153. Seven Ways Technology Helps Business, Government to Learn About You.
154. Top Five Ways Security Vulnerabilities Hide in Your IT Systems.
155. 7 Steps Administrators Should Take to Secure Mixed Cloud Environments.
156. Collaborative Takedown Kills IoT Worm 'Satori'.
157. TRITON Attack Targeted Critical Infrastructure, Security Firm Says.
158. Predictions 2018: How DevOps, AI Will Impact Security.
159. Security Firms Warn to Not Underestimate Iranian Hackers.
160. Data Shows China Likely Delaying Vulnerability Reports to Help Attacks.
161. Attacks Exploit Microsoft Dynamic Data Exchange Protocol.
162. States Starting to Implement Audits to Bolster Election Integrity.
163. Vast Majority of Users Don't Use Two-Factor Authentication: Survey.
164. Kaspersky Lab Claims Malware Caused Security App to Grab Secret Data.
165. Cyber-Criminals Using Compromised RDP Servers to Anonymize Attacks.
166. U.S Lawmakers File Bill to Enable Businesses to Pursue Cyber-Criminals.
167. Chinese Groups Attack Japanese Firms, Resurrect Old Malware.
168. SEC Filing System Hack Highlights Need to Fortify Public Data Security.
169. CCleaner Attack Shows Need to Bolster Software Development Security.
170. DHS Bans Federal Agencies From Using Kaspersky Security Products.
171. Identity Verification Becomes Trickier in Wake of Equifax Breach.
172. Alexa-Cortana Deal to Boost AI and Voice-Enabled Commerce Markets.
173. Game Developers Warned of Remote Vulnerability in Unity.
174. Fuzzing Analysis Shows ICS, IoT Industries Most at Risk of Zero Days.
175. More Hackers Building SSL Encryption into Malware, Zscaler Finds.
176. Antivirus Software Cloud Use Exposes Customers to Data Exfiltration.
177. 'Spyware,' Ransomware Top Threats but Defenders Slowly Improve.
178. Survey Finds Companies Failing to Promptly Cut Ex-Employee Data Access.
179. Half of Corporate Web Apps Contain Flaws That Are at Least a Year Old.
180. Cyber-Security Experts View Petya Malware as Nation-State Attack.
181. Ransomware Using Leaked Exploit in Massive Cyber-Attack Across Europe.
182. Weak Development Security Exposes Web Apps to Cyber-Attacks.
183. Fake-News Services Make Propaganda Distribution Point-and-Click.
184. Leaked Report Claims Voter Registration App Firm Hacked by Russians.
185. Google Adds New Anti-Phishing Features to Gmail for Enterprise Users.
186. Software Flaws Jump; Data Breaches Rise Moderately in Q1.
187. Companies That Patched Software Dodged WannaCry Ransomware.
188. Hajime Botnet Malware Observed Infecting 300,000 Unsecure IoT Devices.
189. Shadow Cloud IT Keeps Rising With Cloud App Adoption, Netskope Finds.
190. Unmaintained Open Source Code Continues to Pose Security Issues.
191. Credentials Under Attack, Time to Exploit Still a Problem, Study Finds.
192. Criminals, Intelligence Agents Shared Zero-Day Microsoft Word Flaw.
193. Macro Malware, Aging Worms Continue to Pose Threat to Present Day.
194. Wikileaks Releases Trove of CIA Documents, Cyber-Exploit Code.
195. Recent Cloud Issues Show Security Can Fail Dramatically.
196. States Oppose Designating Election Systems as Critical Infrastructure.
197. Health Care Services Remain Inviting Cyber-Attack Targets: Report.
198. States, Local Governments Need to Focus on Cyber-security, Experts Say.
199. SecureWorks Exposes Phishing Fraudster Using Social Engineering Tricks.
200. RSA Conference Panelists Split on Question of Paying Data Ransoms.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.