[安恒信息每日资讯 2016.07.28]
[安恒信息每日资讯2016.07.28] http://seclab.dbappsecurity.com.cn/?cat=15 [国际资讯] 1.欧盟设网站打击勒索软件帮受侵害用户恢复数据 http://www.cnbeta.com/articles/523693.htm 2.奥巴马在DNC被黑后发布了网络威胁彩色评级系统...
View ArticleSecurity experts have cloned all seven TSA master keys
Key escrow the process of keeping a set of keys for yourself “just in case” has always been the US government’s modus operandi when it comes to security. From the disastrous Clipper chip to today the...
View ArticleMotorola says it won’t commit to monthly security patches for its phones
Lenovo-owned Motorola has confirmed that it won’t attempt to keep up with Android’s monthly security updates. Tech publication Ars Technica states that after pressing the brand for information on what...
View Article3D打印存在网络安全风险
原标题:3D打印存在网络安全风险 3D打印目前已形成价值40亿美元的产业链,预计该数据到2020年还会增长3倍。纽约大学工学院网络安全和材料工程专业的团队近日发表题为《3D打印面临的生产和安全挑战》的论文,旨在探讨当前网络物理环境下3D打印存在的潜在风险。随着越来越多的生产商采用这一技术,纽约大学的研究人员认为,有必要采取新的网络安全手段和工具来监管3D打印产品的质量。...
View ArticleHere’s how the BlackBerry DTEK50 got its name
BlackBerry unleashed its latest Android smartphone to the world yesterday, the awkwardly namedDTEK50. This messaging, however, is related to BlackBerry’s ongoing efforts to position itself as a...
View Article纵深防御仍对付得了当今的网络威胁吗?
【51CTO.com 快译】大概15年前,纵深防御首次运用于网络安全行业时,彻底改变了这个行业。如今,使用一系列安全对策来保护网络这个想法已成了公认的最佳实践,而网络安全领域的传统思想领袖(金融服务公司和美国联邦政府)更是将它奉为金科玉律。...
View ArticleThe Importance of Web Security for Small Businesses
The ease of technology and digital media have leveled the playing field for small businesses. Now, they have the tools needed to compete in terms of promotion and marketing alongside big players in...
View ArticleOnline activist group petitions to keep Trump out of security briefings
An online activist group is petitioning to keep Donald Trump out of security briefings after the Republican presidential candidate said he hopes Russian hackers get into rival candidate Hillary...
View ArticleMoving past the ransomware hype to focus on real solutions
Ransomware is grabbing headlines as it impacts companies around the world. Are you taking the right steps? How do you know? Rob Gresham signaled the trend in our discussion Are you prepared to respond...
View ArticleMultiple Major Security Products Open To Big Vulns Via 'Hooking Engines'
Black Hat USA talk will show how flawed implementation of hooking techniques are putting security and other software at risk. The momentum's been growing the last few years for the security community...
View ArticleThe Xen “bunker buster” bug what you need to know
A recent security update from hypervisor company Xen fixes one of most worrying sorts of vulnerability in the world of virtualisation: guest escape . The potential severity of a flaw of this sort has...
View ArticleCreating a security-aware mobile culture
Historically hackers have pursued and targeted individuals more frequently than they have targeted businesses as they are typically the path of least resistance. However, the number of organizations...
View ArticleIDG Contributor Network: A run down on Black Hat for security newbs
Are you attending Black Hat for the first time this year?As you try to manage your schedule and prepare for a few days in the blazing Vegas heat, perhaps you are starting to feel a little overwhelmed....
View ArticleApple Engineer to Discuss iOS Security at 2016 Black Hat Event
Apple engineer Ivan Krstic is scheduled to host a discussion at this year's Black Hat Conference, offering a "Behind the Scenes" look at iOS security. Black Hat is an annual event designed for the...
View ArticleIdeara / Embaracdero is flushing away user trust in their ability to do...
In today's computing society you have to think of security first in the design of everything you do. It's costly to retrofit security. In my job I have think about security every day. The costs of...
View ArticleHow to Automatically Start Recording with Manything Whenever a Door or Window...
With Manything, you can turn an old smartphone into a home security camera and have it start recording whenever motion is detected. However, if you have pets, the motion feature sort of goes out the...
View ArticleAnticipating Black Hat
I was at CiscoLive a few weeks ago in the 100 degree+ heat of Las Vegas and like other cybersecurity professionals I am off to Sin City again next week for Black Hat. Now Black Hat has become a...
View ArticleApple’s security chief to go behind the scenes of iOS security during...
Apple is planning on discussing various aspects of iOS 10 security in “unprecedented detail” at the upcoming BlackHat USA 2016 security conference .Ivan Krstic,head of Apple Security Engineering and...
View ArticleWould You Use This ATM?
One basic tenet of computer securityis this: If you can’t vouch for a networked thing’s physical security, you cannot also vouch for its cybersecurity. That’s because in most cases, networked things...
View ArticleFlaws found in security products from AVG, Symantec and McAfee
Hundreds of security products may not be up the job, researchers say, thanks to flawed uses of code hooking. The research is the handiwork of EnSilo duo Udi Yavo and Tommer Bitton, who disclosed the...
View Article