Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

DeriaLock勒索木马最新变种分析 DeriaLock 勒索木马 DeriaLock分析 网络安全

DeriaLock勒索木马最新变种分析。最近出现了一种名为DeriaLock的新型勒索者木马,在最初版本中,DeriaLock只是一个屏幕锁,在其最新变种中, DeriaLock在屏幕锁的基础上加入了文件加密的功能,被加密的文件后缀为.deria。...

View Article


Image may be NSFW.
Clik here to view.

逆向安全系列:Use After Free漏洞浅析 逆向安全 UseAfterFree 漏洞浅析 网络安全

一、前言 逆向安全系列:Use After Free漏洞浅析。想着接下来要写一个use after free的小总结,刚好碰巧最近的湖湘杯2016的一题----game利用use after...

View Article

Image may be NSFW.
Clik here to view.

Python 格式化字符串漏洞(Django为例) Python漏洞 格式化字符串漏洞 Django 网络安全 ...

python 格式化字符串漏洞(Django为例)。在C语言里有一类特别有趣的漏洞,格式化字符串漏洞。轻则破坏内存,重则读写任意地址内容,二进制的内容我就不说了,说也不懂,分享个链接 https://github.com/shiyanlou/seedlab/blob/master/formatstring.md Python中的格式化字符串...

View Article

Image may be NSFW.
Clik here to view.

俄罗斯:“黑客干预”的软和硬

随着1月20日美国当选总统特朗普(Donald Trump)宣誓就职日期的临近,“俄罗斯黑客干预美国大选”的杂音也变得越来越响亮。去年12月29日,任期剩不了几天的在任总统奥巴马(Barack...

View Article

How White Hat hackers do bad things for good reasons

Imagine you are the receptionist at the front desk of a bank around Valentine’s Day. There are countless bouquets of flowers and boxes of chocolate being dropped off for delivery to employees. You just...

View Article


SSL termination with HA-Proxy

SSL termination refers to the process of terminating the encrypted connection at the load balancer and handling all internal traffic in an unencrypted way. This means that traffic between your load...

View Article

Image may be NSFW.
Clik here to view.

Browser AutoFill Feature Can Leak Your Personal Information to Hackers

Just like most of you, I too really hate filling out web forms, especially on mobile devices. To help make this whole process faster, Google Chrome and other major browsers offer "Autofill" feature...

View Article

Image may be NSFW.
Clik here to view.

Ukranian power outage: Are hackers testing for worldwide SCADA cyber attacks?

A power outage which hit the Ukraine in December 2016 has been found to be the cause of a cyber attack, with the investigation into the outage pointing to a huge impending threat on critical...

View Article


Image may be NSFW.
Clik here to view.

Virtuozzo Secures Containerized Apps and Workloads in Production with...

Virtuozzo , a leading virtualization software provider, today announced a range of new value-added services that service providers can deliver to customers using Virtuozzo containers featuring disk...

View Article


IoT, Foreign Actors, Insider Threats Shape 2017 Risk Management

A new report aims to inform risk management decisions for 2017 by identifying potential security threats and their anticipated effect on businesses. A new year means new and evolving security threats...

View Article

Here’s How Google Is Stepping Up Cloud Security Again

Google is now testing a new security service that could help in its quest to compete better with Amazon Web Services and Microsoft Azure public clouds for Fortune 500 customers. The company's new...

View Article

Image may be NSFW.
Clik here to view.

Accelerate 2017 Update General Sessions Overview Day One

If anyone was unsure of Fortinet’s vision for the future of the digital world, or the impact they plan to have on the cybersecurity industry, the first day of Accelerate 2017 left no doubt in anyone’s...

View Article

Image may be NSFW.
Clik here to view.

Adobe, Microsoft Push Critical Security Fixes

Adobeand Microsoft on Tuesday each released security updates for software installed on hundreds of millions of devices. Adobe issued an update for Flash Player and for Acrobat/Reader . Microsoft...

View Article


Image may be NSFW.
Clik here to view.

武汉一女子洗澡遭黑客直播 你家里有这东西吗?

摘要: 现在,很多人都给自己家里安装了家用摄像头,可以通过手机,实时监控家里的情况,保证安全。可是,这种方式真的安全吗 ? 吴女士的家里就安装了这种摄像头,来监控家里的宠物猫,可让人没想到的是,最终,她自己却成了摄像头中的主角。 为了可以实时看到自己在家饲养的两只宠... 现在,很多人都给自己家里安装了家用摄像头,可以通过手机,实时监控家里的情况,保证安全。可是,这种方式真的安全吗 ?...

View Article

Image may be NSFW.
Clik here to view.

Hitless TLS Certificate Rotation in Go

One of the core security goals of Docker's Swarm mode is to be secure by default. To achieve that, when a new Swarm gets created it generates a self-signed Certificate Authority (CA) and issues...

View Article


Image may be NSFW.
Clik here to view.

Hacker's unofficial 'Watch Dogs 2' app is incredibly appropriate

After successfully linking GTA V to an iPhone , the same Hungarian hacker has now developed software that allows users to manipulate Watch Dogs 2 from their smartphone. Using the programming language,...

View Article

Image may be NSFW.
Clik here to view.

Simulation of empirical Bayesian methods (using baseball statistics)

Previously in this series: The beta distribution Empirical Bayes estimation Credible intervals The Bayesian approach to false discovery rates Bayesian A/B testing Beta-binomial regression Understanding...

View Article


Image may be NSFW.
Clik here to view.

IDG Contributor Network: 2017: The year of widespread SDN adoption and DDoS...

Earlier this year, IDC published a study predicting a 53.9% CAGR (compound annual growth rate) for the SDN market from 2014 to 2020, by which point it will be valued at $12.5 billion. If you...

View Article

Image may be NSFW.
Clik here to view.

How We Got 10,000 Visitors from Hacker News Within 3 Days and Screwed It Up

Two weeks ago Irina, our CMO, has published thepost about referral spam in Google Analytics. Initially, she submittedit as a guest post to several niche websites, but all answers were the same: “We...

View Article

Image may be NSFW.
Clik here to view.

Improving Visibility in Security Operations with Search-Driven Lookups

Looking back on 2016, Splunk Enterprise Security added significant capabilities to its platform for security operations, includingAdaptive Response, User & Entity Behavior Analytics (UEBA)...

View Article
Browsing all 12749 articles
Browse latest View live