Malicious Data

Malicious Data in the United States

Resources

See Also

Computer Hackers

Computer Software security

Computer Virus

Infrastructure Protection Center (NIPC), United States National

Computer forensics; Computer hackers; Computer security and computer crime investigation.

Further Reading (Articles)

FireEye Addresses National Cyber Security and Exposes Malicious Data Theft Methodology at Upcoming Conferences.(Conference news)(Company overview), Internet Business Newsweekly; July 27, 2009

US Patent Issued to International Business Machines on Nov. 20 for “Detecting Inadvertent or Malicious Data Corruption in Storage Subsystems and Recovering Data” (California Inventors), US Fed News Service, Including US State News; November 27, 2012

California Inventors Develop Malicious Data Detection Method, US Fed News Service, Including US State News; May 15, 2008

North Carolina Inventors Develop Malicious Data Packets Identifying/Removing System, US Fed News Service, Including US State News; August 18, 2008

US Patent Issued to eBay on June 28 for “Method and System to Detect Externally-Referenced Malicious Data for Access and/or Publication Via a Computer System” (California Inventors), US Fed News Service, Including US State News; July 3, 2011

Wipo Publishes Patent of Eyal Sobol, Nir Paz and Sandisk Technologies for “Preventing Access of a Host Device to Malicious Data in a Portable Device” (Israeli Inventors), US Fed News Service, Including US State News; March 25, 2013

Wipo Publishes Patent of Microsoft for “Checksum and Hashing Operations Resilient to Malicious Input Data” (American Inventors), US Fed News Service, Including US State News; October 11, 2013

WIPO PUBLISHES PATENT OF ZTE FOR “METHOD AND APPARATUS FOR PREVENTING MALICIOUS SOFTWARES FROM TRANSMITTING DATA” (CHINESE INVENTORS), US Fed News Service, Including US State News; May 25, 2012

US Patent Issued to International Business Machines on Jan. 10 for “Detecting Malicious Behavior in Data Transmission of a De-Duplication System” (California Inventor), US Fed News Service, Including US State News; January 14, 2012

FANNIE MAE CORPORATE INTRUDER SENTENCED TO OVER THREE YEARS IN PRISON FOR ATTEMPTING TO WIPE OUT FANNIE MAE FINANCIAL DATA MALICIOUS CODE WOULD HAVE DESTROYED MORTGAGE INFORMATION., States News Service; December 17, 2010

Patent Issued for Scanning Computer Data for Malicious Codes Using a Remote Server Computer, Computer Weekly News; August 9, 2012

US Patent Issued to Trend Micro on Sept. 21 for “Real-Time In-Line Detection of Malicious Code in Data Streams” (Chinese Inventors), US Fed News Service, Including US State News; September 22, 2010

Top-10 guide for protecting sensitive data from malicious insiders., Database and Network Journal; February 1, 2010; Cantos, Brian

US Patent Issued to Trend Micro on July 24 for “Scanning Computer Data for Malicious Codes Using a Remote Server Computer” (Taiwanese Inventors), US Fed News Service, Including US State News; July 28, 2012

Inside the Mind of the Insider.(profiling employees for potential malicious behavior)(Statistical Data Included), Security Management; December 1, 1999; Shaw, Eric D. Post, Jerrold M. Ruby, Keven G.

US Patent Issued to Secure Ware on Feb. 22 for “Malicious-Process-Determining Method, Data Processing Apparatus and Recording Medium” (Japanese Inventor), US Fed News Service, Including US State News; February 28, 2011

Patent Issued for Method and Apparatus for Securing Sensitive Data from Misappropriation by Malicious Software, Journal of Engineering; September 26, 2012

Financial Data Leads the Malicious Spam Hit List for Third Year in a Row, CPI Financial; January 26, 2014

Patent Issued for Efficient Isolation of Backup Versions of Data Objects Affected by Malicious Software, Journal of Engineering; August 7, 2013

NASA systems and data vulnerable to hackers, malicious employees.(National Aeronautics and Space Administration), NextGov.com; October 16, 2009; Sternstein, Aliya


Posted

in

, ,

by

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *