Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Foundational Security Operations Concepts

The certified information systems security professional (CISSP) certification is a prestigious qualification for professionals working in the field of cybersecurity. The certification requires an...

View Article


Parsix GNU/Linux 8.15 and 8.10 Users Receive New Security Updates from Debian

The Christmas celebrations are now over, so is the New Year's holiday, and the Parsix GNU/linux developers are back, porting the latest security updates from the upstream Debian GNU/Linux repositories....

View Article


Error 17836 Length specified in network packet payload did not match number...

Question:This error appeared in the SQL Server Logs today. Error: 17836, Severity: 20, State: 14. Length specified in network packet payload did not match number of bytes read; the connection has been...

View Article

Image may be NSFW.
Clik here to view.

逆向分析加固 apk 的完整过程

10 Jan 2017 - niexinming [+] Author: niexinming [+] Team: n0tr00t security team [+] From: http://www.n0tr00t.com [+] Create: 2017-01-10 此次逆向的 apk 为 tmri_10101_1461033981072_release.apk (pass: 3qun)...

View Article

Netflix Users Under Attack as Hackers Try to Steal Credit Card Info

Security company FireEye detected a new wave of attacks aimed at Netflix users, with cybercriminals now turning to phishing schemes in order to steal their personal information, including credit card...

View Article


Image may be NSFW.
Clik here to view.

Filtering and Auditing within Log Insight

The article below describes one of the ways to implement vSphere Log Insight into an environment where a (security departments) syslog server is already available and where this server ideally only...

View Article

Image may be NSFW.
Clik here to view.

7 Tips to Improve WordPress Security

You just spent many days and sleepless nights to make a blog on WordPress or simply aWordPress website. Now that it is up and running, you are on cloud nine. What if, without a moment’s notice,it goes...

View Article

Image may be NSFW.
Clik here to view.

Toward Better Security and Governance With Blockchain

Valery Vavilov is the CEO and founder of Bitfury Group, a leading blockchain company that delivers software, hardware, mining and consulting solutions focused on the technology. In this CoinDesk 2016...

View Article


3 Ways to Make Information Security a Habit During Project Management

With eyeballs rolling, they mumble, “Why do security people insist on stopping our projects?” As information security (IS) professionals, we have seen this response from project managers (PM),...

View Article


Image may be NSFW.
Clik here to view.

//No Comment - Let's Encrypt, IoT Security & Obfuscation

Authentication Protocols for Internet of Things: A Comprehensive Survey Obfuscation using Encryption Sometimes the news is reported well enough elsewhere and we have little to add other than to bring...

View Article

5 Key Elements of Digital Payment Systems

In this post, we explain in detail why these five key elements will either make or break digital banks and e-wallets. 1. Security General populace equates the institution of banks with the matter of...

View Article

Image may be NSFW.
Clik here to view.

Stolen details of 3.3m Hello Kitty fans including kids published online

Remember that 3.3 million database of Hello Kitty fans that gotexposed about a year ago?Make that exposed, stolen and published online one year later. In December 2015, Sanrio the company behind the...

View Article

Image may be NSFW.
Clik here to view.

New security concerns due to business complexities

It is estimated that in 2016, more than $94 billion will be invested in security solutions, per industry analyst forecasts, yet nearly half of organizations report having had a breach either internal...

View Article


Do we really need higher education to solve our perceived and actual security...

I remain an outspoken critic of the notion that we have an actual critical skills shortage. I accept that some folks have a tough time finding and retaining the talent they seek. Lost in the discussion...

View Article

Firebase Security Rules

Firebase Realtime Database security rules are how you secure your data from unauthorised users and protect your data structure. In this quick tip tutorial, I will explain how to configure your database...

View Article


BeyondCorp is security for the Cloud Native organization

The term Cloud Native usually references application-centric tools and patterns, so what does it mean to be a Cloud Native organization? It begins with the awareness that being a software company goes...

View Article

Darktrace Automates Network Security Through Machine Learning

Darktrace co-founder Poppy Gustafsson recently predicted, at TechCrunch Disrupt London , that malicious actors will increasingly use artificial intelligence to create more sophisticated spearphishing...

View Article


Image may be NSFW.
Clik here to view.

20 Tools to Boost Security at Your Small Business While on a Budget

The prevalence of digital technology has made small business owners keenly aware of the security threats they face. However, it is just as important for them to be aware of the physical security...

View Article

Image may be NSFW.
Clik here to view.

取势合众•驭未来 亚信安全2017合作伙伴峰会隆重召开

距亚信安全全盘接手趋势科技中国区业务已经一年有余,在走过“融合、突破”的元年之后,这艘云与大数据安全技术的“中国航母”,在2017年又当如何拉响起航的汽笛呢?...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity predictions for 2017

“Prophesy is a good line of business, but it is full of risks,” as Mark Twain wrote. Looking back at the predictions we made at thestart of 2016, I think many of them did in fact come true: cloud...

View Article
Browsing all 12749 articles
Browse latest View live