Search results

Jump to: navigation, search
  • ...w constitutes an "[[advanced persistent threat]]," alongside sophisticated malware and cyber attacks".<ref>{{cite web |last1=Smith |first1=Brad |title=Protect
    110 KB (14,617 words) - 17:18, 2 November 2018
  • ...er, the edit summary, the page edited, as well as any tags (e.g. "possible malware link")<ref>{{cite web|url=http://en.wikipedia.org/wiki/Special:Tags |title=
    84 KB (12,249 words) - 21:32, 2 November 2018
  • ...p://www.computerworld.com/article/3094236/security/stealthy-cyberespionage-malware-targets-energy-companies.html|archivedate=11 February 2017|df=}}</ref><ref>
    18 KB (2,338 words) - 19:37, 4 November 2018
  • ...f>John Harrison, ''Enhancing Network Security By Preventing User-Initiated Malware Execution'', Proceedings of the International Conference on Information Tec ...trol over program whitelists in addition to preventing introduction of new malware.<ref>
    12 KB (1,750 words) - 18:33, 16 November 2018