Search


PDF Archive search engine
Last database update: 17 May at 11:24 - Around 76000 files indexed.


Show results per page

Results for «malicious»:


Total: 140 results - 0.025 seconds

JAR 16-20296A GRIZZLY STEPPE-2016-1229 100%

JAR-16-20296A December 29, 2016 GRIZZLY STEPPE – Russian Malicious Cyber Activity Summary This Joint Analysis Report (JAR) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI).

https://www.pdf-archive.com/2017/06/03/jar-16-20296a-grizzly-steppe-2016-1229/

03/06/2017 www.pdf-archive.com

NCCIC-SocialEngineering 99%

Malicious emails containing targeted or general lures such as Spoofed FedEx or shipping-themed emails are examples of hunting.

https://www.pdf-archive.com/2016/01/19/nccic-socialengineering/

19/01/2016 www.pdf-archive.com

Taming Asymmetric Network Delays 97%

For example, authenticated sequence numbers can guard against malicious dropping of packets, and signed messages or message digests can ensure the integrity of the message content.

https://www.pdf-archive.com/2017/12/16/taming-asymmetric-network-delays/

16/12/2017 www.pdf-archive.com

2017 The Dark Web 92%

The Dark Web may be used for legitimate purposes as well as to conceal criminal or otherwise malicious activities.

https://www.pdf-archive.com/2017/10/25/2017-the-dark-web/

25/10/2017 www.pdf-archive.com

KTMB REPORT 90%

All activities were conducted in a manner that simulated a malicious actor engaged in a targeted attack against KTMB with the goals of:

https://www.pdf-archive.com/2017/06/03/ktmb-report/

03/06/2017 www.pdf-archive.com

BotGuard Infographic 86%

Bot s can be used for product ive t asks such as a search engine spider, but t hey are also frequent ly used for malicious purposes.

https://www.pdf-archive.com/2017/03/02/botguard-infographic/

02/03/2017 www.pdf-archive.com

court o12778 field 85%

Urgent Submission Of Reports This Notice is in regard to the proposal of granting privilege to the local Federal Authorities under the jurisdiction of the United States for monitoring suspected Internet Protocol(IP) addresses as reported by FBI Field Office, New York on 15 April, 2012 regarding online malicious activities against Governmental and Federal Civic Entities.

https://www.pdf-archive.com/2012/04/23/court-o12778-field/

23/04/2012 www.pdf-archive.com

PenTestBrochure Final 85%

We perform a penetration test in the same way a malicious attacker will exploit your network.

https://www.pdf-archive.com/2017/01/18/pentestbrochure-final/

18/01/2017 www.pdf-archive.com

Official JHill Crew Terms & Conditions 85%

You will not upload viruses or other malicious code.

https://www.pdf-archive.com/2017/06/27/official-jhill-crew-terms-conditions/

27/06/2017 www.pdf-archive.com

Radford Amended Complaint 2014Nov17 83%

Plaintiff Benjamin Radford (“Radford”) brings this complaint to recover damages arising from malicious, false and defamatory public and private statements made about him by defendant Karen Stollznow (“Stollznow”) in 2013;

https://www.pdf-archive.com/2014/12/12/radford-amended-complaint-2014nov17/

12/12/2014 www.pdf-archive.com

John Lux $300 Million Demand Letter 82%

You have engaged in a deliberate, willful, malicious, and continuous campaign to destroy Perla Group International, Inc.

https://www.pdf-archive.com/2018/04/02/john-lux-300-million-demand-letter/

02/04/2018 www.pdf-archive.com

PID4631333 82%

Moreover, it effectively detects malicious tempering on image while being resistant to various content preserving manipulations.

https://www.pdf-archive.com/2017/04/06/pid4631333/

06/04/2017 www.pdf-archive.com

CyberSecurity 80%

all of them } Dropper This artifact (5bef35496fcbdbe841c82f4d1ab8b7c2) is a malicious PE32 executable that has been identified as a WannaCry ransomware dropper.

https://www.pdf-archive.com/2017/05/17/cybersecurity/

17/05/2017 www.pdf-archive.com

Stardust 79%

Rumours of a malicious origin were rife, partly fuelled by the presence of the four teenagers on the roof of the complex just hours before the fire.

https://www.pdf-archive.com/2016/09/09/stardust/

09/09/2016 www.pdf-archive.com

OL4 working with dstl 78%

Technology Laboratory, Centre for Defence Enterprise, Crown Prosecution Service, Cambridgeshire Police, Ministry of Defence Special Branch, Serious Organised Crime Agency, Peterborough Crown Court, National Authority, Oliver Heald QC, Attorney General's Office, repay good with evil, Dstl contractor, perversion of the course of justice, CPS malicious prosecution, CPS Fool's Deal, Dstl treachery, Dstl false witness statements, DC 1626 Mark Yendley Cambridgeshire police false witness, wrongful imprisonment, wrongful police search, wrongful arrest, detention without proper charges, Dstl breach of contract, Dstl wrongful termination of contract, Section 4 Explosives Act, Health &

https://www.pdf-archive.com/2015/10/04/ol4-working-with-dstl/

04/10/2015 www.pdf-archive.com

MatthewChan-ORMC-ICU-complaint redacted 78%

       Intentional and malicious emotional distress against my father and my father’s advocates (me and Joy).

https://www.pdf-archive.com/2016/05/27/matthewchan-ormc-icu-complaint-redacted/

27/05/2016 www.pdf-archive.com

Ike Thomas Kaveladze Complaint 75%

This action arises from the reckless and malicious libel and slander committed by 25 Lakoff against Plaintiff, involving completely unfounded and false accusations that Plaintiff is a 26 “money launderer.” Kaveladze, a law-abiding American citizen, father and businessman, seeks by 27 this action to dispel the cloud created by Lakoff’s baseless and scurrilous accusations.

https://www.pdf-archive.com/2018/02/13/ike-thomas-kaveladze-complaint/

13/02/2018 www.pdf-archive.com

Cloud System Security 75%

o Loss of governance o Responsibility ambiguity o Isolation failure o Vendor lock in o Handling of security incidents o Visibility o Disaster recovery and business continuity o Management interface vulnerability o Data protection o Malicious behaviour at the CSP o Insecure or incomplete data deletion Cloud Infra Risk - Platform category=specific risks and intra-platform dependency Multi-tenancy Determine what data assets will be hosted on the cloud service Map data and services to security mechanisms Define responsibility for protection of data assets and systems Service and data availability Monitor operations Threats and Attacks Security Impact - Trust boundaries are less clear Data asset and application isolation is logical Major network backbone is internet Application exposure is increased, API vulnerabilities Governance of data assets and applications is altered, new disciplines must be implemented and deployed via policy Attack Vectors - Physical damage Insider threat DoS, DDoS Impersonation - o Masquerading o MitM o Replay o Authentication theft o Key extraction Malware Virtualisation Vulnerabilities - - Virtual Infra o Virtual Server protection o Hypervisor and guest operation system hardening o Virtual Machine Sprawl (proliferation of easily established VMs) o VMware developing DLP tools Threats to Hypervisor:

https://www.pdf-archive.com/2018/02/21/cloud-system-security/

21/02/2018 www.pdf-archive.com

Kitchen v. Burge 74%

Accordingly, ASA Lukanich is not entitled to prosecutorial immunity on Kitchen's state law claims for conspiracy (Count X) and intentional infliction of emotional distress (Count IX) to the extent that these claims incorporate ASA Lukanich's non-prosecutorial conduct.FN1 However, Kitchen's state law claim for malicious prosecution (Count VIII) against ASA Lukanich is dismissed.

https://www.pdf-archive.com/2012/02/09/kitchen-v-burge/

09/02/2012 www.pdf-archive.com

audit 73%

1.6 ERC20Basic.sol 1.7 Pausable.sol 2 TokenController.sol 3 Shareable.sol If confirmAndCheck is used to protect an operation that can be nullipotent, a malicious shared owner can prevent operation.

https://www.pdf-archive.com/2017/07/11/audit/

11/07/2017 www.pdf-archive.com

MetaPay 70%

While similar to the correctness problem, the difference lies in the fact that while a malicious user of the network may be unable to create a fraudulent transaction (defying correctness), it may be able to create multiple correct transactions that are somehow unaware of each other, and thus combine to create a fraudulent act.

https://www.pdf-archive.com/2018/01/29/metapay/

29/01/2018 www.pdf-archive.com

fortinet application control 69%

When delivered as part of a multi-layered approach to network security, application control not only improves your ability to ward off malicious activity, but also mitigates the impact of user-installed software on both bandwidth and productivity (user, help desk, and IT staff), and assists in controlling liability and compliance risks.

https://www.pdf-archive.com/2011/03/15/fortinet-application-control/

15/03/2011 www.pdf-archive.com

HP Cyber Risk Report 2015 Executive Summary 68%

Significantly, these malicious programs were built by people with specific knowledge of the targeted environments.

https://www.pdf-archive.com/2015/03/16/hp-cyber-risk-report-2015-executive-summary/

16/03/2015 www.pdf-archive.com