Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Ashley Madison settles charges over its massive data breach

The settlement demands a "comprehensive" data security program that includes periodic security risk assessments (both internal and third-party) and "reasonable safeguards" against any potential...

View Article



2017 Predictions: Three Experts Give Discuss Security Challenges for the...

This week we chatted with three security heavyweights to talk about the top security risks and concerns in the upcoming year. The panel of industry experts includes Jeremiah Grossman, Founder of...

View Article

Image may be NSFW.
Clik here to view.

A Hacker Turned a Keyboard Into a Game of Doom

GIF Forget processor speed, storage, memory, screen resolution, and even apps. The real test of a gadget’s worth is whether or not it can run Doom , which means that the Optimus Maximus keyboard , with...

View Article

On the Economics, Propagation, and Mitigation of Mirai

By Kirk Soluk and Roland Dobbins In late November of 2016, a new Mirai variant emerged that leveraged a propagation mechanism different from the Telnet-based brute forcing mechanism originally provided...

View Article

Image may be NSFW.
Clik here to view.

Geek Deals: Save Over a Thousand Dollars on StackSocial’s White Hat Hacker...

As concerned citizens of the internet, it’s our job to stay informed about hackers. “Black Hat” refers to both the terrible Michael Mann movie and the type of hacker who uses their tech-savvy tricks to...

View Article


Image may be NSFW.
Clik here to view.

Yahoo says hackers stole information from over 1B accounts

View photos FILE - This Tuesday, July 19, 2016 photo shows a Yahoo sign at the company's headquarters in Sunnyvale, Calif. On Wednesday, Dec. 14, 2016, Yahoo said it believes hackers stole data from...

View Article

Yahoo! says! hackers! stole! ONE! BEELLION! user! accounts!

Yahoo! says hackers have probably stolen details from more than a billion user accounts, including names, addresses, phone numbers, and weakly-hashed passwords in attacks dating back to 2013. Chief...

View Article

Resource: Handling Security Incidents in Office 365

There is no doubt that Microsoft has a very large tech footprint and just by the numbers is more likely to experience a security breach of some kind over time compared to smaller companies. However,...

View Article


Important Security Information for Yahoo Users

By Bob Lord, CISO Following a recent investigation, we’ve identified data security issues concerning certain Yahoo user accounts. We’ve taken steps to secure those user accounts and we’re working...

View Article


Image may be NSFW.
Clik here to view.

Why AI needs security (and vice versa)

The next stage of evolution forAI is democratization.That means making it available to businesses of all sizes, and not just to companies like Microsoft, Google or Apple. The opportunity in front of...

View Article

Image may be NSFW.
Clik here to view.

Implementing Security Measures Without Sacrificing Efficiency

In this age of continuous content, creative agencies are faced with improving their production environments to meet increasing client demands while remaining competitive. With both budgets and...

View Article

Time to Implement Offensive Cybersecurity?

All of them reveal that attackers are far ahead of defenders when it comes to digital security.But with global investment in cybersecurity expected to top $1 trillion over the next five years, why are...

View Article

Weak sauce from NIST

Last week NIST released a fairly lame whitepaper on Dramatically Reducing Software Vulnerabilities . The paper is a laundry list of “specific technical approaches that have the potential to make a...

View Article


Image may be NSFW.
Clik here to view.

SQL Server Security Controlling Access

― by Ginger Keys Installing SQL following best practices is an important first step in securing your SQL server. The next step in securing your SQL server is to decide who can access the SQL instance,...

View Article

Image may be NSFW.
Clik here to view.

Fibaro Reveals First HomeKit-Enabled 'Flood Sensor' to Detect Potential Water...

Home automation manufacturer Fibaro today announced a new set of HomeKit-enabled products that offer basic motion detection and home security, as well as a Flood Sensor, which the company calls "the...

View Article


Image may be NSFW.
Clik here to view.

Yahoo breach: why does it take so long to tell people about a hack?

Hours after Yahoo disclosed this latest data breach , people askedwhy it took the company so long to come clean about a compromise datingback to 2013. To the casual observer, three years is a long...

View Article

奥巴马下令查网络攻击美疑俄干预其总统大选

奥巴马下令查网络攻击美疑俄干预其总统大选 17小时前来源:舜网 原标题:奥巴马下令查网络攻击美疑俄干预其总统大选...

View Article


Image may be NSFW.
Clik here to view.

美官员:普京或亲自指导网络攻击干扰美国大选

美官员:普京或亲自指导网络攻击干扰美国大选 一点号网络安全焦点4小时前 三位美国官员表示,俄罗斯总统普京曾指导他的情报机构通过黑客活动干预美国总统选举。那些指责俄罗斯试图通过黑客活动侵入个人和机构,包括民主党的总部邮箱进而影响美国大选结果的说法激怒了新当选的总统特朗普,特朗普表示他是光明正大的赢得了11月8日的大选。俄罗斯官员否认了所有关于干涉美国大选的指控。 php?url=0FE2xbqi2Q"...

View Article

Image may be NSFW.
Clik here to view.

【收听】黑客何以当选时代周刊2016年度风云人物?

【收听】黑客何以当选时代周刊2016年度风云人物? 一点号THU数据派4小时前 php?url=0FE0CGZXSQ" alt="【收听】黑客何以当选时代周刊2016年度风云人物?" />Photo-Illustration by Adam Ferriss for TIME 图片由Adam提供给《时代》周刊 戳下方收听【数据也疯狂】,本期主题《黑客何以当选2016年度时代周刊风云人物》...

View Article

Image may be NSFW.
Clik here to view.

Yahoo breach: I’ve closed my account because it uses MD5 to hash my password

This morning I received an email from Yahoo entitled “Important Security Information for Yahoo Users”. Five minutes later I’d closed my account. The email was Yahoo’s admission that I was one of 1bn...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images