欧盟设网站打击勒索软件 帮受侵害用户恢复数据
欧盟刑警组织25日联合荷兰警方、反病毒机构卡巴斯基实验室和英特尔计算机安全公司创建一家门户网站,旨在打击数量激增的勒索软件。这项名为“勒索不复存 在”(No More Ransom)的计划旨在通过设立这家门户网站,“告知公众勒索软件的危险,帮助受(软件)侵害的用户恢复数据,用户不必再向网络罪犯缴付‘赎金’(以解 密遭入侵的数据)”。...
View ArticleImagine the next Security News Headlines....
Just for a moment, imagine the following scenario: “RandomCompany implements distributed deception platform technology, deploys fake databases and data throughout their environment.” News story breaks...
View ArticleMoto won’t commit to monthly security patches
Last year's Stagefright fiasco really shook the Android world to the point that it had Google and manufacturers scrambling to set things right. It has led to Google releasing monthly security updates,...
View Article信息安全有保障 大电池加持金立M6手机评测
完美解决续航+安全 持久续航和安全防护对于用户来说都十分需要,我们见过市面上太多的主打长续航和安全防护的手机产品,可为啥之前就没有哪个厂商想过把它俩融合到一部手机里呢?现在,这让人遗憾的事情将不会再发生了,我现在手里拿到的这款“新得流油”的金立M6完美解决了这个千古难题。 金立M6评测:大电池加持 信息安全有保障...
View Article奥巴马在DNC被黑后发布了网络威胁彩色评级系统
乔治沃特布什政府治下的国土安全报告系统推出了彩色的“威胁程度代码”,其在9-11恐袭后已经被人熟知。 但是随着网络攻击的日益猖獗,现任总统巴拉克奥巴马也于本周二宣布,联邦政府将对面向政府和私企的网络攻击威胁给出类似的彩色评级。 而这项政策的出台,恰逢民主党全国委员会(DNC)被曝光大量丑闻往来邮件。 如图所示,这一评级系统共分6层(从0到5): ●...
View ArticleMotorola isn't bothering with monthly Android security updates
Back when Motorola was owned by Google, the company was known for fast software updates. The 2014 Moto X was the first handset to receive an update to Android 5.0, and you could rely on phones like the...
View Article拒绝勒索软件需全球协力共同合作
今天,荷兰警方、欧洲刑警组织、Intel Security和卡巴斯基实验室联合启动了一项被称为拒绝勒索软件的倡议行动,标志着执法机关和私营企业之间合作打击勒索软件行动迈出了最新的一步。No More Ransom(拒绝勒索软件)是一个全新的在线门户网站,目的是为公众提供有关勒索软件的信息,帮助受害者在无需向网络罪犯支付赎金的前提下,恢复自己被加密的数据。...
View Article不需要网络 黑客通过主机散热风扇传递消息?
如果你真的想要确保你的计算机不会受到黑客攻击,断开网络连接是一个很好的方法――而最新研究显示,这不一定足以防止数据从你的电脑中被窃取。 一名以色列科学家的研究表明,现如今最新的恶意软件,甚至可以攻击断了网的电脑。它们通过分析电脑内部风扇转动的声音,提取你的电脑的数据,以达到攻击的目的。...
View ArticleWeb Application Pentest
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for...
View ArticleResearchers find more than 100 Tor nodes that are snooping on users
Tor, or “The Onion Router” as it was originallyknown, is used around the world as an anonymity network. It provides a private method of communication for journalists, those living under authoritarian...
View ArticleU.S. Drought Animations with the “Witch’s Brew” (purrr + broom + magick)
This is another purrr -focused post but it’s also an homage to the nascent magick package (R interface to ImageMagick) by @opencpu . We’re starting to see/feel the impact of the increasing drought up...
View ArticleStored Passwords Opened to Hackers with Major LastPass Flaw
Password managers seem like a great idea, given rampant password reuse, poor abilities to create strong passwords by the average user and the sheer number of credentials we’re supposed to remember. But...
View Articlebaeldung - Coding and Testing Stuff: Intro to Spring Security Expressions
1. Introduction In this tutorial we’ll focus on Spring Security Expressions, and of course on practical examples with these expressions. Before looking at more complex implementations (such as ACL),...
View ArticleMotorola isn’t worried about making sure your Android phone is secure
We've all heard it before: the best thing you can do to keep your computer safe from hackers is to update regularly. Software companies push updates to fix known flaws in their operating systems, and...
View ArticleBlackBerry DTEK50 Android phone aims for greatness through security
We've not yet put our hands on the BlackBerry DTEK50, but based on our experience with the design it's based on, we can say that it's probably a pretty good Android phone. Have a peek at our most...
View ArticleWednesday Poll: Do You Care About Monthly Security Updates?
With Google’s launch of monthly security updateslast year, many device owners are beginning to take notice at how well, or how bad, their particular OEM and carrierare at delivering these updates....
View ArticleMicrosoft makes Windows 10 hardware change for PC security
Microsoft is rolling out a change in minimum hardware requirements for windows 10 PCs and mobile devices, and expects hardware makers to comply in order to make their devices more secure. Starting...
View ArticleDallas Startup Makes Internet Security Better and Simpler
Stackpath , a Dallas based security-as-a-service startup, announced this week that it is emerging from stealth. It has $180 million in funding, along with 4 company acquisitions. These acquisitions...
View ArticlePonemon: Cloud Adoption Grows as Security Lags
Cloud adoption is growing, but companies aren’t taking security into account the way they should. A fresh Ponemon Institute survey shows that many businesses simply aren’t adopting appropriate...
View Article