TITLE

HACKERS USE ADVANCED EVASION TECHNIQUES

PUB. DATE
November 2010
SOURCE
eWeek;11/1/2010, Vol. 27 Issue 19, p42
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
A blog concerning advanced evasion techniques (AET) used by computer attackers is presented.
ACCESSION #
55070333

 

Related Articles

  • BEST OF THE BLOGS.  // Campaign;11/4/2011, Issue 44, p21 

    Several blogs are discussed including one on Internet hacking, one on targeting and optimisation of advertising, and one on the Volksvagen's Think Blue programme.

  • Untitled. Ashford, Warwick // Computer Weekly;1/18/2011, Issue 3, p97 

    The article focuses on efforts being made by Microsoft Corp. to protect its customers from computer hackers. It mentions that Microsoft is examining reports of a vulnerability in the Windows graphics rendering engine which could allow hackers taking control of targeted computers. It informs that...

  • Information Technology. Isaac, Peter // Chartered Accountants Journal;Dec2006, Vol. 85 Issue 11, p84 

    The article focuses on issues concerning information technology in the U.S. A new computer that will let intruders go back through all revisions in word document has been developed. Google Inc. has agreed to run .mobi registry. Further, the company contends that smaller users needed to have...

  • CLUELESS ON THE INTERNET. Rapoza, Jim // eWeek;1/18/2010, Vol. 27 Issue 2, p10 

    A blog on the importance of Internet security is presented.

  • BBC's botnet Click special irresponsible and illegal.  // Computer Weekly;3/24/2009, p20 

    A blog featuring comments of Internet lawyer Robert Carolina on BBC's Click programme in preparing and broadcasting its botnet is presented.

  • Security resolutions can't wait for new year. Goodwin, Bill // Computer Weekly;9/22/2009, p34 

    A blog from editor of the journal "Computer Weekly" Bill Goodwin, is discussed.

  • New cyber security blog tackles DCS, SCADA vulnerabilities.  // Control Engineering;Dec2008, Vol. 55 Issue 12, p23 

    A blog titled "Industrial Cyber Security," from the periodical "Control Engineering," is discussed.

  • Blog Banter. Herberg, Craig // Baseline;Sep2007, Issue 76, p12 

    An excerpt from "Baseline" magazine's security blog, reflecting on how hackers attempted to hijack the root servers that run the Internet's naming system, is presented.

  • Untitled. Ashford, Warwick // Computer Weekly;10/26/2010, p111 

    A blog on a topic related to internet security is discussed.

  • WHAT THE BLOGS ARE SAYING.  // Computer Weekly;5/15/2007, p4 

    The article presents several online issues from information technology decision makers on computer security to the challenges posed by project management.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics