“人工智能”再问网络安全
“人工智能”再问网络安全 42分钟前来源:新华网 传统网络漏洞带来的损失一般是信息泄露、银行卡盗刷等欺诈、盗窃行为,这些损失往往可以衡量、相对能承受,但现在针对人工智能的网络攻击带来的损失将迅速传导给消费者,甚至会威胁到生命 随着大数据的应用,人工智能逐渐走入千家万户并显示出巨大的市场空间,随之而来的安全漏洞问题同样不容忽视,有些甚至已经显现。...
View ArticleBreaking HMAC
Okay. The title might be click bait, just a little, but after you finish reading this post, I think you'll be a bit more careful picking your HMAC keys. After learning this, I know I will be. However,...
View Article4 Ways Technology Can Better Your Home Security
More and more cases of home burglary are being recorded on a daily basis. Door locks, guard dogs, and intrusion alarms aren’t getting the job done anymore and people are looking for an alternative....
View ArticleHigh frequency security bug hunting: 120 days, 120 bugs
1) Intro & Motivations At the start of of this year, I set myself a personal goal of finding 365 bugs in 365 days. This was entirely motivated by wanting to challenge myself to find more security...
View ArticleSwiftkey is Having Odd Prediction Issues, Turns Off Syncing Temporarily
Users ofSwiftkey noticed some odd behavior from the popular keyboard this week, behavior that resulted in “unfamiliar” terms, and in some cases email addresses, showing as predictions. In a short blog...
View Article骗局!电话"响一声就挂"!背后阴谋居然这么大...
骗局!电话"响一声就挂"!背后阴谋居然这么大... 一点号央视财经昨天 我们是不是有时会遇到这种情况:电话响了一声刚想接听对方就挂了,没过多久再响一声又挂了...那么,你是不是也困惑过,这种构成骚扰的电话背后的目的是什么,他们的盈利来源怎么样,我们应该怎样避免“响一声”骚扰? php?url=0E2PpbyG5s" alt="骗局!电话"响一声就挂"!背后阴谋居然这么大..." />...
View ArticleGame of Thrones can teach you valuable security lessons
With new hacking techniques, malware, viruses and threats being created faster than Melisandre’s demon babies, the web is indeed dark and full of terrors. Here are seven lessons for security managers...
View ArticleGoogle steps up home page security with HSTS
Google has made accessing www.google.com a little more secure by turning on HSTS (HTTP Strict Transport Security). With HSTS, Google ensures its servers are telling browsers that all future attempts...
View ArticleThe Top 5 Cloud Security Threats You Need To Worry About
Cloud Security Threats Cloud computing is clearly here to stay, and has become an integral part of any business computing strategy. For many businesses, the power, flexibility, and convenience of cloud...
View ArticleHow a Security Researcher Convinced Imgur's CEO to Increase Bug Bounty Rewards
Nathan Malcolm, an independent security researcher, published over the weekend his personal experience in dealing with Imgur's security team and how he managed to convince the company's CEO to...
View Article无线键盘存在巨大漏洞 黑客轻松获取账户密码
无线键盘存在巨大漏洞 黑客轻松获取账户密码 一点号翼火蛇安全8小时前 php?url=0E3G7CNU27" alt="无线键盘存在巨大漏洞 黑客轻松获取账户密码"...
View ArticleTales From The Black Hat NOC: Organizing the Chaos
A glimpse into training day. Yesterdaymarked the official start of Black Hat 2016, kicked off with various training courses spread throughout the convention center. For the RSA NOC team this meant a...
View Article前端动态加盐慢加密方案图解
加密:利用某种加密算法,将明文转换成无法简单识别的密文。 解密:利用相应的解密算法,将密文转换成可识别的明文。 密码破解:1、算法逆向破解(一般算法都是不可逆的);2、穷举暴力破解 3、查表,实际上表也是提前穷举跑出来的。 慢加密:提高加密时间来相应的加大破解时间和难度。 慢加密出现的原因:密码破解的时间和加密算法是直接关联的,例如 MD5 加密是非常快的,加密一次耗费 1...
View ArticleKali Tools Tutorials For Web App Tools
Tools Syntax guide for Kali linux Web Application Tools 1) apache-users Package Description This Perl script will enumerate the usernames on any system that uses Apache with the UserDir module....
View Article2016年手机安全报告出炉 诈骗电话月标记千万条
2016年手机安全报告出炉 诈骗电话月标记千万条 3天前来源:中国网事 近些年来,随着大量不法分子从电脑端转移到手机端,类似这种“我是你领导”诈骗电话数量激增。7月29日,企鹅智酷联合腾讯手机管家共同发布了《2016年手机安全报告》,显示在危害手机安全的“三宗罪”中,骚扰电话是和病毒、垃圾短信并存的三大元凶之一。 三成骚扰电话是诈骗...
View Article容器界的杜蕾斯,关注用户体验及安全 | 有容云AppSafe
众所周知,容器火起来后其生态日渐壮大,诸多细节走进大众视野且被提上议程,尤其是在生产环境的落地过程中,更是容不得差错,而其中最不能忽视一个,正是安全问题。无危为安,无损为全,安全是一种状态,更是一种保障。有容云企业级容器安全产品 AppSafe 将于8月1日全新上线,关注用户体验及安全,打响国内容器安全第一枪! AppSafe概览...
View ArticleKaspersky DDoS Intelligence Report for Q2 2016
Q2 events DDoS attacks on cryptocurrency wallet services have played an important role in the lives of these services. In the second quarter of 2016, two companies CoinWallet and Coinkite announced...
View ArticleCrypto Malware: Responding To Machine-Timescale Breaches
The game has changed again with hackers' ability to steal your data at record speeds and cripple your organization before the first alert. The thousand-fold increase in crypto-malware highlights a...
View ArticleThe Features So Far To The Linux 4.8 Kernel: ACPI LPI, Security, Btrfs...
The Features So Far To The linux 4.8 Kernel: ACPI LPI, Security, Btrfs ENOSPC, HDMI CEC Written by Michael Larabel inLinux Kernel on 1 August 2016 at 08:16 AM EDT.Add A Comment We've now started the...
View Article