DeriaLock勒索木马最新变种分析 DeriaLock 勒索木马 DeriaLock分析 网络安全
DeriaLock勒索木马最新变种分析。最近出现了一种名为DeriaLock的新型勒索者木马,在最初版本中,DeriaLock只是一个屏幕锁,在其最新变种中, DeriaLock在屏幕锁的基础上加入了文件加密的功能,被加密的文件后缀为.deria。...
View Article逆向安全系列:Use After Free漏洞浅析 逆向安全 UseAfterFree 漏洞浅析 网络安全
一、前言 逆向安全系列:Use After Free漏洞浅析。想着接下来要写一个use after free的小总结,刚好碰巧最近的湖湘杯2016的一题----game利用use after...
View ArticlePython 格式化字符串漏洞(Django为例) Python漏洞 格式化字符串漏洞 Django 网络安全 ...
python 格式化字符串漏洞(Django为例)。在C语言里有一类特别有趣的漏洞,格式化字符串漏洞。轻则破坏内存,重则读写任意地址内容,二进制的内容我就不说了,说也不懂,分享个链接 https://github.com/shiyanlou/seedlab/blob/master/formatstring.md Python中的格式化字符串...
View Article俄罗斯:“黑客干预”的软和硬
随着1月20日美国当选总统特朗普(Donald Trump)宣誓就职日期的临近,“俄罗斯黑客干预美国大选”的杂音也变得越来越响亮。去年12月29日,任期剩不了几天的在任总统奥巴马(Barack...
View ArticleHow White Hat hackers do bad things for good reasons
Imagine you are the receptionist at the front desk of a bank around Valentine’s Day. There are countless bouquets of flowers and boxes of chocolate being dropped off for delivery to employees. You just...
View ArticleSSL termination with HA-Proxy
SSL termination refers to the process of terminating the encrypted connection at the load balancer and handling all internal traffic in an unencrypted way. This means that traffic between your load...
View ArticleBrowser AutoFill Feature Can Leak Your Personal Information to Hackers
Just like most of you, I too really hate filling out web forms, especially on mobile devices. To help make this whole process faster, Google Chrome and other major browsers offer "Autofill" feature...
View ArticleUkranian power outage: Are hackers testing for worldwide SCADA cyber attacks?
A power outage which hit the Ukraine in December 2016 has been found to be the cause of a cyber attack, with the investigation into the outage pointing to a huge impending threat on critical...
View ArticleVirtuozzo Secures Containerized Apps and Workloads in Production with...
Virtuozzo , a leading virtualization software provider, today announced a range of new value-added services that service providers can deliver to customers using Virtuozzo containers featuring disk...
View ArticleIoT, Foreign Actors, Insider Threats Shape 2017 Risk Management
A new report aims to inform risk management decisions for 2017 by identifying potential security threats and their anticipated effect on businesses. A new year means new and evolving security threats...
View ArticleHere’s How Google Is Stepping Up Cloud Security Again
Google is now testing a new security service that could help in its quest to compete better with Amazon Web Services and Microsoft Azure public clouds for Fortune 500 customers. The company's new...
View ArticleAccelerate 2017 Update General Sessions Overview Day One
If anyone was unsure of Fortinet’s vision for the future of the digital world, or the impact they plan to have on the cybersecurity industry, the first day of Accelerate 2017 left no doubt in anyone’s...
View ArticleAdobe, Microsoft Push Critical Security Fixes
Adobeand Microsoft on Tuesday each released security updates for software installed on hundreds of millions of devices. Adobe issued an update for Flash Player and for Acrobat/Reader . Microsoft...
View Article武汉一女子洗澡遭黑客直播 你家里有这东西吗?
摘要: 现在,很多人都给自己家里安装了家用摄像头,可以通过手机,实时监控家里的情况,保证安全。可是,这种方式真的安全吗 ? 吴女士的家里就安装了这种摄像头,来监控家里的宠物猫,可让人没想到的是,最终,她自己却成了摄像头中的主角。 为了可以实时看到自己在家饲养的两只宠... 现在,很多人都给自己家里安装了家用摄像头,可以通过手机,实时监控家里的情况,保证安全。可是,这种方式真的安全吗 ?...
View ArticleHitless TLS Certificate Rotation in Go
One of the core security goals of Docker's Swarm mode is to be secure by default. To achieve that, when a new Swarm gets created it generates a self-signed Certificate Authority (CA) and issues...
View ArticleHacker's unofficial 'Watch Dogs 2' app is incredibly appropriate
After successfully linking GTA V to an iPhone , the same Hungarian hacker has now developed software that allows users to manipulate Watch Dogs 2 from their smartphone. Using the programming language,...
View ArticleSimulation of empirical Bayesian methods (using baseball statistics)
Previously in this series: The beta distribution Empirical Bayes estimation Credible intervals The Bayesian approach to false discovery rates Bayesian A/B testing Beta-binomial regression Understanding...
View ArticleIDG Contributor Network: 2017: The year of widespread SDN adoption and DDoS...
Earlier this year, IDC published a study predicting a 53.9% CAGR (compound annual growth rate) for the SDN market from 2014 to 2020, by which point it will be valued at $12.5 billion. If you...
View ArticleHow We Got 10,000 Visitors from Hacker News Within 3 Days and Screwed It Up
Two weeks ago Irina, our CMO, has published thepost about referral spam in Google Analytics. Initially, she submittedit as a guest post to several niche websites, but all answers were the same: “We...
View ArticleImproving Visibility in Security Operations with Search-Driven Lookups
Looking back on 2016, Splunk Enterprise Security added significant capabilities to its platform for security operations, includingAdaptive Response, User & Entity Behavior Analytics (UEBA)...
View Article