References

  1. S. Layak, Ransomware: The extortionists of the new millennium Internet, The Economic Times (Online), 2017. Available: https://search.proquest.com/docview/1900413817
  2. Wallenstrom. (Jul 05). Taking the bite out of the non-malware threat. Available: https://search.proquest.com/docview/1916016466
  3. N. Lomas. (Aug 19). Full Ashley Madison Hacked Data Apparently Dumped On Tor. Available: https://search.proquest.com/docview/1705297436
  4. S. Writer, QNB hackers behind data breach at Sharjah bank, Arabianbusiness.com, 2016. Available: https://search.proquest.com/docview/1787557261
  5. J. Stein, How a Chinese Spy Case Turned Into One Man's Child Porn Nightmare, Newsweek, 2016. Available: https://search.proquest.com/docview/1793546676
  6. J. Melrose, Cyber security protection enters a new era, Control Eng., 2016. Available: https://search.proquest.com/docview/1777631974
  7. F. Y. Rashid, Listen up, FBI: Juniper code shows the problem with backdoors, InfoWorld.Com, 2015. Available: https://search.proquest.com/docview/1751461898
  8. Internet Security Threat Report 2017, Symantec.com, 2017. [Online]. Available: https://www.symantec.com/security-center/threat-report. [Accessed: 29- Jul- 2017]
  9. M. Burns. (Mar 07). Alleged CIA leak re-demonstrates the dangers of smart TVs. Available: https://search.proquest.com/docview/1874924601
  10. B. Snyder, How to know if your smart TV can spy on you, Cio, 2017. Available: https://search.proquest.com/docview/1875304683
  11. W. Leonhard, Shadow Brokers threaten to release even more NSA-sourced malware, InfoWorld.Com, 2017. Available: https://search.proquest.com/docview/1899382066
  12. P. Ziobro, Target Now Says 70 Million People Hit in Data Breach; Neiman Marcus Also Says Its Customer Data Was Hacked, The Wall Street Journal (Online), 2014. Available: https://search.proquest.com/docview/1476282030
  13. S. Banjo and D. Yadron, Home Depot Was Hacked by Previously Unseen 'Mozart' Malware; Agencies Warn Retailers of the Software Used in Attack on Home Improvement Retailer Earlier This Year, The Wall Street Journal (Online), 2014. Available: https://search.proquest.com/docview/1564494754
  1. L. Saunders, U.S. News: IRS Says More Accounts Hacked, The Wall Street Journal, 2016. Available: https://search.proquest.com/docview/1768288045.
  2. M. Hypponen, Enlisting for the war on Internet fraud, CIO Canada, vol. 14, (10), pp. 1, 2006. Available: https://search.proquest.com/docview/217426610.
  3. A. Sternstein, The secret world of vulnerability hunters, The Christian Science Monitor, 2017. Available: https://search.proquest.com/docview/1867025384
  4. D. Iaconangelo, 'Shadow Brokers' new NSA data leak: Is this about politics or money? The Christian Science Monitor, 2016. Available: https://search.proquest.com/docview/1834501829
  5. C. Bryant, Rethink on 'zero-day' attacks raises cyber hackles, Financial Times, pp. 7, 2014. Available: https://search.proquest.com/docview/1498149623
  6. B. Dawson, Structured exception handling, Game Developer, vol. 6, (1), pp. 52-54, 2009. Available: https://search.proquest.com/docview/219077576
  7. Penetration Testing for Highly-Secured Environments, Udemy, 2017. [Online]. Available: https://www.udemy.com/advanced-penetration-testing-for-highly-secured-environments/. [Accessed: 29- Jul- 2017]
  8. Expert Metasploit Penetration Testing, Packtpub.com, 2017. [Online]. Available: https://www.packtpub.com/networking-and-servers/expert-metasploit-penetration-testing-video. [Accessed: 29- Jul- 2017]
  9. Koder, Logon to any password protected Windows machine without knowing the password | IndiaWebSearch.com, Indiawebsearch.com, 2017. [Online]. Available: http://indiawebsearch.com/content/logon-to-any-password-protected-windows-machine-without-knowing-the-password. [Accessed: 29- Jul- 2017]
  10. W. Gordon, How To Break Into A Windows PC (And Prevent It From Happening To You), Lifehacker.com.au, 2017. [Online]. Available: https://www.lifehacker.com.au/2010/10/how-to-break-into-a-windows-pc-and-prevent-it-from-happening-to-you/. [Accessed: 29- Jul- 2017]
  11. Hack Like a Pro: How to Crack Passwords, Part 1 (Principles & Technologies), WonderHowTo, 2017. [Online]. Available: https://null-byte.wonderhowto.com/how-to/hack-like-pro-crack-passwords-part-1-principles-technologies-0156136/. [Accessed: 29- Jul- 2017]
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.146.176.68