Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

除了最安全安卓手机 黑莓还推出了一款充电宝

除了最安全安卓手机 黑莓还推出了一款充电宝 昨天来源:cnBeta 摘要:为了拯救陷入泥潭的智能手机业务,黑莓曾推出搭载安卓系统的Priv,这款手机依然坚持了已经过时的物理全键盘设计,再加上高昂的售价使得它卖的并不好。 最近黑莓推出了旗下第二款安卓智能手机-DTEK50,取消了物理键盘采用全触控设计。尽管被人诟病它仅仅是阿尔卡特Idol4手机的翻版,但是这也保证 了它的售价更为低廉,仅为299美元。...

View Article



Image may be NSFW.
Clik here to view.

希拉里私人邮件意外曝光,竞选团队遭黑客疯狂攻击

希拉里私人邮件意外曝光,竞选团队遭黑客疯狂攻击 5小时前来源:IT之家 据路透社报道,知情人士周五透露,美国民主党总统候选人希拉里克林顿(Hillary Clinton)竞选团队的计算机网络遭到黑客攻击,这是黑客对美国民主党计算机网络的第三次攻击。 此前,黑客已经对美国民主党全国委员会(Democratic National Committee,DNC)和民主党国会竞选委员会(Democratic...

View Article

Image may be NSFW.
Clik here to view.

当我们在谈论前端加密时,我们在谈些什么

干货 观点 案例 资讯 我们 当然在谈安全。 前端安全是web安全的一部分,常见的安全问题会有XSS、CSRF、SQL注入等,然而这些已经在程师界得到了相当高的重视并且有了很成熟的解决方案。 所以我们今天只谈前端“加密”,一个部分人认为没有意义的工作。有争议的事情总是那么因崔斯汀,接下来就让我们谈谈前端传输中的数据“加密” 。 前端传输的数据我们应该用什么算法加密,如何组织整个加密过程呢?...

View Article

Image may be NSFW.
Clik here to view.

Ms. Hackers Graphics Design LearnUp

So the Ms. Hackers Graphics LearnUp is almost upon us. It was supposed to take place this Saturday i.e. July 30th, but because of unfortunate circumstances, it’s been postponed to August 6th. But good...

View Article

Image may be NSFW.
Clik here to view.

Hacker Mass-Scans Dark Web Sites for Vulnerabilities, Dumps Results

In April, an independent researcher launched a tool called OnionScan , which probes dark web sites for various vulnerabilities and other issues. Now, another researcher has described how to deploy...

View Article


The Hacker Who Turns Office Equipment into Bugging Devices

You think about securing your laptop, but what about your desk phone, monitor, or printer? In the second episode of Can I Hack It? , made possible by Mr Robot on Amazon Prime, we explore the security...

View Article

How to Roll Your Own Threat Intelligence Team

A lot of hard work needs to go into effectively implementing an intelligence-driven security model. It starts with five critical factors. Many organizations want to build a threat intelligence team,...

View Article

Image may be NSFW.
Clik here to view.

iMessage又曝新漏洞:删除的信息仍可恢复

万一信息里面有什么见不得人的东西,那就非常尴尬了。 苹果在今年 6 月份的 WWDC 大会上曾经暗示,未来 iMessages 将会成为一个类似于微信的多功能平台,而不仅仅只是一款信息收发软件。不过在此之前,苹果要确保 iMessage 自身的安全。威锋网消息,根据安全研究员 Jonathan Zdziarski 发布的最新报告,iMessage...

View Article


Image may be NSFW.
Clik here to view.

金立发布高端安全手机M6/M6 Plus:冯小刚、余文乐代言

金立发布高端安全手机M6/M6 Plus:冯小刚、余文乐代言 一点号硅谷密探4天前 7月26日,金立正式发布内置安全加密芯片并搭载一系列旗舰配置的金立超级续航手机M6/M6 Plus正式亮相。据了解,金立M6/M6...

View Article


Image may be NSFW.
Clik here to view.

恐怖! 一条短信就能窃取你的iPhone密码 上亿人受波及!

恐怖! 一条短信就能窃取你的iPhone密码 上亿人受波及! 一点号果粉那些事3天前 近期,在福布斯杂志一篇文章中《果粉懵了――只要一个短信就能窃取你的iPhone密码》披露了这个安全漏洞,这个安全漏洞是思科公司的高级研究员泰勒博昂发现的。 php?url=0E1UaOABDt" alt="恐怖! 一条短信就能窃取你的iPhone密码 上亿人受波及!"...

View Article

Don’t grow security maturity the hard way: Lessons from the NIST Framework

For a long time, when an attacker set out to breach a company’s network, the process was a lot like a physical burglary. The attacker would research the target (i.e. ‘case the joint’), get in quickly...

View Article

Image may be NSFW.
Clik here to view.

iMessage and WhatsApp security flaw means deleted chat logs aren’t really...

WhatsApp and iMessage may be examples of end-to-end encryption in action, but there are still potential security flaws which can leave your data exposed. As discovered by iOS researcher Jonathan...

View Article

Image may be NSFW.
Clik here to view.

Comey: Conversations About Encryption Issue Still Needed

FBI Director James Comey said government and the tech industry need to sort out their differences over encryption before "something terrible happens" that would make productive conversations...

View Article


Image may be NSFW.
Clik here to view.

中国鹰派黑客组织1937CN TEAM攻击21座越南机场

中国鹰派黑客组织1937CN TEAM攻击21座越南机场 昨天来源:E安全 php?url=0E2Vd64wLL" alt="中国鹰派黑客组织1937CN TEAM攻击21座越南机场" /> 目前共有约21座越南机场的系统面临严重网络安全问题 E安全7月30日讯 据外媒报道,一支名为China 1937CN...

View Article

Image may be NSFW.
Clik here to view.

Do not connect to WiFi, and other tips for hanging out with 20,000 hackers in...

Isaac Brekken/AP Thousands of hackers, cybersecurity experts, federal agents, and others will descend upon Las Vegasnext week for what are always interestingconferences ― with talks on everything from...

View Article


Image may be NSFW.
Clik here to view.

New IBM Security App Uses Analytics To Target Internal Threats

One of the most common ways hackers penetrate networks is by stealing the credentials of users with legitimate access to those networks. Because the credentials are frequently used by authorized users...

View Article

保护你的API(上)

保护你的API 在大部分时候,我们讨论API的设计时,会从功能的角度出发定义出完善的,易用的API。而很多时候,非功能需求如安全需求则会在很晚才加入考虑。而往往这部分会涉及很多额外的工作量,比如与外部的SSO集成,Token机制等等。 这篇文章会以一个简单的例子,从应用程序和部署架构上分别讨论几种常见的模型。这篇文章是这个系列的第一篇,会讨论两个简单的主题: 基于Session的用户认证...

View Article


Android Trojan SpyNote leaks on underground forums

A new and potent Android Trojan has been leaked on several underground forums, making it available for free to less resourceful cybercriminals who are now likely to use it in attacks. The Trojan app is...

View Article

Image may be NSFW.
Clik here to view.

警方破获特大网络诈骗案 中招多是“中产男”

警方破获特大网络诈骗案 中招多是“中产男” 昨天来源:中国网事 php?url=0E2KnS1h73" alt="警方破获特大网络诈骗案 中招多是“中产男”" /> 嫌疑人手机相册里满是美女照片。...

View Article

Image may be NSFW.
Clik here to view.

揭秘网络诈骗 “诈骗江湖”的背后陷阱

揭秘网络诈骗 “诈骗江湖”的背后陷阱 一点号法官那些事昨天...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images