• BlueBorne is a type of security vulnerability with Bluetooth implementations in Android, iOS, Linux and Windows. It affects many electronic devices such...
    9 KB (728 words) - 23:51, 15 March 2025
  • Malware (category Security breaches)
    contained a vulnerability that allowed attackers to inject code into Windows. Malware can exploit security defects (security bugs or vulnerabilities) in the...
    76 KB (7,666 words) - 21:44, 23 May 2025
  • Thumbnail for Moto G (3rd generation)
    phones, is vulnerable to the series of vulnerabilities known as BlueBorne. Retail versions of this phone are no longer receiving security updates according...
    14 KB (1,158 words) - 09:00, 21 January 2025
  • Thumbnail for Device driver
    the original on 5 November 2022. Retrieved 5 November 2022. "Wireless 'BlueBorne' Attacks Target Billions of Bluetooth Devices". threatpost.com. Archived...
    30 KB (2,973 words) - 18:34, 16 April 2025
  • Thumbnail for Bluetooth
    Bluetooth (redirect from Bluetooth security)
    Lounis, a network security researcher at Queen's University, identified a security vulnerability, called CDV (Connection Dumping Vulnerability), on various...
    136 KB (14,078 words) - 16:44, 3 June 2025
  • Thumbnail for ELTA Systems
    Platform CyFo - Malware Forensics for Critical Security Operations CyScan - Proactive/Automatic Vulnerability Monitoring CyShare- Data Collaboration Platform...
    11 KB (1,123 words) - 13:51, 9 May 2025
  • Thumbnail for Water security
    effect on water security as various levels. Geographic variability in water availability, reliability of rainfall and vulnerability to droughts, floods...
    83 KB (11,248 words) - 00:37, 31 May 2025
  • and Technology (NIST) reported that attackers were using a Windows vulnerability to distribute malware, including Emotet. The technique involved phishing...
    14 KB (1,265 words) - 12:12, 18 April 2025
  • The Social Security debate in the United States encompasses benefits, funding, and other issues. Social Security is a social insurance program officially...
    130 KB (15,900 words) - 05:03, 23 April 2025
  • headquarters south of Ramgarh. Longewala, which was originally a Border Security Force (BSF) post but was later taken over by a company of the Punjab Regiment...
    37 KB (3,772 words) - 11:08, 2 June 2025
  • Thumbnail for Climate change in Africa
    March 2019). "Vulnerability of the agricultural sector to climate change: The development of a pan-tropical Climate Risk Vulnerability Assessment to inform...
    133 KB (15,098 words) - 15:39, 4 May 2025
  • Thumbnail for Effects of climate change on agriculture
    March 2019). "Vulnerability of the agricultural sector to climate change: The development of a pan-tropical Climate Risk Vulnerability Assessment to inform...
    159 KB (22,481 words) - 15:38, 19 May 2025
  • Thumbnail for Effects of climate change on human health
    health status and also by occupation, clothing, behavior, autonomy, vulnerability, and sense of obligation.<https://pmc.ncbi.nlm.nih.gov/articles/PMC6210172/...
    106 KB (11,956 words) - 18:12, 30 May 2025
  • Soft target (category National security)
    (2006). Open Target: Where America Is Vulnerable to Attack. St Martin's. Forest, James J.F. (2006). Homeland Security: Protecting America's Targets. Greenwood...
    5 KB (514 words) - 15:07, 7 February 2024
  • advancing India's foreign strategic interests. It is also involved in the security of India's nuclear programme. During the nine-year tenure of its first...
    182 KB (16,525 words) - 11:12, 4 June 2025
  • Thumbnail for Mikoyan-Gurevich MiG-23
    from the original on 23 August 2023. Retrieved 23 August 2023. "Namibia – Security Information." Archived 8 August 2009 at the Wayback Machine Iss.co.za....
    144 KB (18,733 words) - 15:07, 24 May 2025
  • Thumbnail for John Lennon
    Stuart Ryan described Lennon's vocal delivery as ranging from "extreme vulnerability, sensitivity and even naivety" to a hard "rasping" style. Wiener too...
    186 KB (19,916 words) - 12:21, 22 May 2025
  • Thumbnail for New Deal
    was made less vulnerable. The regulation of the stock market and the prevention of some corporate abuses relating to the sale of securities and corporate...
    253 KB (30,800 words) - 07:53, 25 May 2025
  • Thumbnail for India
    ISBN 978-81-7141-486-4 Sisodia, N. S.; Naidu, G. V. C. (2005), Changing Security Dynamic in Eastern Asia: Focus on Japan, Promilla, ISBN 978-81-86019-52-8...
    245 KB (24,011 words) - 14:37, 2 June 2025
  • its Bug Bounty Program that paid security researchers a minimum of $500 ($699.00 in 2024 dollars) for reporting security holes. The company promised not...
    265 KB (24,214 words) - 01:43, 3 June 2025
  • Thumbnail for Diana, Princess of Wales
    transport of the British royal family and government. Diana was also offered security by Metropolitan Police's Royalty Protection Group, which she benefitted...
    287 KB (25,042 words) - 23:48, 3 June 2025
  • Thumbnail for Oklahoma City bombing
    their vulnerability to truck bombs. FBI buildings, for instance, must be set back 100 feet (30 m) from traffic. The total cost of improving security in federal...
    163 KB (16,302 words) - 06:27, 3 June 2025
  • Thumbnail for History of Australia
    World [...] Here a Thousand Sail of the Line may ride in the most perfect Security [...]. The territory of New South Wales claimed by Britain included all...
    334 KB (40,200 words) - 10:55, 3 June 2025
  • These security measures appear to have borne fruit, as a number of pirates were apprehended in 2010, including a prominent leader. Puntland's security forces...
    155 KB (16,589 words) - 13:52, 23 May 2025
  • Thumbnail for Starlink
    invitation from SpaceX to have the terminal examined by the security community, security specialist Lennert Wouters presented several technical architecture...
    304 KB (25,911 words) - 08:15, 4 June 2025
  • Thumbnail for Unmanned aerial vehicle
    hijacking or jamming a UAV in flight. Several security researchers have made public some vulnerabilities in commercial UAVs, in some cases even providing...
    158 KB (14,854 words) - 22:55, 1 June 2025
  • Thumbnail for Grumman E-2 Hawkeye
    weight allowances for all-spectrum low-observable features, leaving a vulnerability to detection by the UHF-band APY-9 radar, potentially detecting fifth-generation...
    78 KB (8,162 words) - 15:06, 22 May 2025
  • Thumbnail for Cholera
    Retrieved 2020-08-20. Cisneros BJ, Rose JB (2009-03-24). Urban Water Security: Managing Risks: UNESCO-IHP. CRC Press. ISBN 978-0-203-88162-0. Drasar...
    129 KB (13,094 words) - 02:48, 27 May 2025
  • Thumbnail for Harrier jump jet
    bases, such as car parks or forest clearings, without requiring large and vulnerable air bases. Later, the design was adapted for use from aircraft carriers...
    52 KB (5,207 words) - 21:13, 29 May 2025
  • Thumbnail for Climate change in Kenya
    sustainability. Developing countries with low adaptive capacity and high vulnerability to the phenomenon are disproportionately affected. Climate change in...
    36 KB (3,554 words) - 19:40, 23 May 2025