Security bug

Results: 244



#Item
1Red of ring and gears with malware bug a computer virus inside on binary code background.Vector illustration security technology concept.

Red of ring and gears with malware bug a computer virus inside on binary code background.Vector illustration security technology concept.

Add to Reading List

Source URL: selabs.uk

    2Red of ring and gears with malware bug a computer virus inside on binary code background.Vector illustration security technology concept.

    Red of ring and gears with malware bug a computer virus inside on binary code background.Vector illustration security technology concept.

    Add to Reading List

    Source URL: selabs.uk

      3U.S. Senate Subcommittee on Data Security and Bug Bounties: SUMMARY OF WRITTEN TESTIMONY AND HACKERONE STATEMENTS In February 2018, HackerOne was invited to testify in front of the U.S. Senate Subcommittee on Consumer Pr

      U.S. Senate Subcommittee on Data Security and Bug Bounties: SUMMARY OF WRITTEN TESTIMONY AND HACKERONE STATEMENTS In February 2018, HackerOne was invited to testify in front of the U.S. Senate Subcommittee on Consumer Pr

      Add to Reading List

      Source URL: www.hackerone.com

      - Date: 2018-03-30 11:50:00
        4Leveraging Semantic Signatures for Bug Search in Binary Programs Jannik Pewny† , Felix Schuster† , Christian Rossow‡ , Lukas Bernhard† , Thorsten Holz† †  Horst Görtz Institute for IT-Security (HGI)

        Leveraging Semantic Signatures for Bug Search in Binary Programs Jannik Pewny† , Felix Schuster† , Christian Rossow‡ , Lukas Bernhard† , Thorsten Holz† † Horst Görtz Institute for IT-Security (HGI)

        Add to Reading List

        Source URL: www.ei.rub.de

        - Date: 2014-10-22 03:57:33
          5Your Data Security is Our Priority The ownCloud Security Bug Bounty Program ownCloud is proud to be an open-source company, and we believe in transparency and the importance of community. With 800+ contributors and over

          Your Data Security is Our Priority The ownCloud Security Bug Bounty Program ownCloud is proud to be an open-source company, and we believe in transparency and the importance of community. With 800+ contributors and over

          Add to Reading List

          Source URL: owncloud.com

          - Date: 2015-08-28 07:39:40
            6Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response Zhen Huang Mariana D’Angelo

            Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response Zhen Huang Mariana D’Angelo

            Add to Reading List

            Source URL: www.eecg.toronto.edu

            Language: English - Date: 2016-03-14 12:44:49
            7INI  Applications  and  the   “Shellshock”  bug  in  BASH   This document is intended to assist in the description, diagnosis, and remediation of the BASH bug known as “Shellshock” as it relates to syste

            INI  Applications  and  the   “Shellshock”  bug  in  BASH   This document is intended to assist in the description, diagnosis, and remediation of the BASH bug known as “Shellshock” as it relates to syste

            Add to Reading List

            Source URL: www.interactivenw.com

            Language: English - Date: 2014-10-07 15:06:31
            8roguewave_automotive-developer-guide2016_vf

            roguewave_automotive-developer-guide2016_vf

            Add to Reading List

            Source URL: www.roguewave.com

            Language: English - Date: 2016-03-09 11:01:17
            9Veracode Summary Report  Summary Report As of 18 Mar 2016 Prepared for: Prepared on:

            Veracode Summary Report Summary Report As of 18 Mar 2016 Prepared for: Prepared on:

            Add to Reading List

            Source URL: owncloud.com

            Language: English - Date: 2016-04-06 15:04:57
            10Questions Developers Ask While Diagnosing Potential Security Vulnerabilities with Static Analysis Justin Smith, Brittany Johnson, and Emerson Murphy-Hill  Bill Chu and Heather Richter Lipford

            Questions Developers Ask While Diagnosing Potential Security Vulnerabilities with Static Analysis Justin Smith, Brittany Johnson, and Emerson Murphy-Hill Bill Chu and Heather Richter Lipford

            Add to Reading List

            Source URL: www4.ncsu.edu

            Language: English - Date: 2015-07-31 17:48:16