国家网信办:四渠道可启动网络安全审查
网络安全 原标题:国家网信办:四渠道可启动网络安全审查 日前,国家互联网信息办公室公布《网络产品和服务安全审查办法(征求意见稿)》,国家网信办将会同有关部门成立首个网络安全审查委员会。征求意见稿提出,关系国家安全和公共利益的信息系统使用的重要网络产品和服务,应当经过网络安全审查。...
View Article工控安全要避开传统IT安全思路的几个“暗坑”
很多人都在讲工控系统安全与互联网安全或者办公网的安全又很大的不同。 具体有哪些不同呢? 其实NIST的SP800-82的工控系统安全指南里面讲了10大类。 作为目前我们看到的比较系统的工控系统安全的标准或者指南来说。 NIST的这个文件概括的还是比较全面的。 不过, 在实践中,有些重要的不同点NIST并没有提到或者没有强调 而有些NIST的指南则未免有些纸上谈兵。 这里我举几个例子。...
View ArticlePC杀毒软件大PK:国产独苗就剩它
世界三大杀入软件测试认证机构最终的AV-TEST和AV-C分别于上周和本周二公布了年度最佳杀毒软件,一起看看。 在最终结果中, AV-C首推的是Avira(小红伞) Antivirus Pro 2016,AV-TEST推荐的是赛门铁克旗下的诺顿 ,其中前者以微弱的优势击败比特梵德和卡巴斯基。 AV-C称,其实三款产品都是PC世界最优秀的杀软,但如果只能选一个最佳,那还是小红伞。同时,...
View ArticleWhy biometrics are the key to driver authentication in connected cars
Until recently,biometrictechnology was not a part of our daily lives, but wasrelegated to sci-fi flicks ― too futuristic-seeming to comprehend being used in our lifetime beyond specialized...
View ArticleBill to eliminate commission overseeing voting system security advances in...
Amid allegations at the highest levels that all is not right with America’s voting system, it seems strange that legislation would be proposed that eliminates an organization created specifically to...
View Article日常用上这些开源项目 轻松提升网络安全性能
前几年关于数字安全威胁与个人隐私泄漏的报告与事件层出不穷,并且毋容置疑这种趋势会持续加剧。有报告指出,诈骗行为逐渐向社交网络延伸,某些国家还无礼地将网络攻击作为战略坐标的一部分,并且越来越多公司收集并监测我们各种各样的上网行为习惯。...
View ArticleScoping out the Wi-Fis with WarCollar’s DopeScope and Booby Trap
The WarCollar Industries 360 Dope Scope: a game, yet not. What do I spy inside the Dope Scope? Wi-Fi access points and signal strengths to help track them down. Sean Gallagher At last month's Shmoocon...
View ArticleNew Malware Underscores the Danger of Assumed Mac Security
This week researchers found a piece of malware in the wild, built to steal passwords from the macOS keychain. Named "MacDownloader" and posing as, what else, a fake Flash Player update, the new...
View Article拒绝被追踪 金立M2017这一招简直绝了
拒绝被追踪 金立M2017这一招简直绝了 原创一点号手机中国10小时前 【手机中国 评测】前段时间,美图秀秀“手绘自拍”自拍功能受到了海外网友的疯狂追捧,火爆到不行。然而,差点让美图热度断气的是,外媒CNET质疑美图侵犯用户隐私,收集了包括定位信息等在内的用户数据。美图很快就出了回应,表示一直严守各大平台安全条款。 php?url=0FbR6uX2MQ" alt="拒绝被追踪...
View Article交体检费、返佣金 警方提醒:警惕节后网络招聘诈骗
交体检费、返佣金 警方提醒:警惕节后网络招聘诈骗 2小时前来源:南报网 原标题:交体检费、返佣金 警方提醒:警惕节后网络招聘诈骗 南报网讯(通讯员 鼓公宣 万懿玲 记者 朱静)春节过后,又是一波招工高潮,一些不法分子趁机混入其中,各种招聘骗局层出不穷,给广大的求职者带来伤害。鼓楼警方提醒,求职者要擦亮眼睛,勿被“简工高薪”的糖衣炮弹所迷惑。...
View Article遭遇网络电信诈骗后一般人会怎么做?结果令人痛心
遭遇网络电信诈骗后一般人会怎么做?结果令人痛心 一点号中国消费者报3小时前 php?url=0FbheVHSbf" alt="遭遇网络电信诈骗后一般人会怎么做?结果令人痛心"...
View Article专家 | 顾伟、刘振宇:英美网络安全审查机制及其启示(下)
专家 | 顾伟、刘振宇:英美网络安全审查机制及其启示(下) 一点号网络空间治理创新3小时前 本文内容承接《英美网络安全审查机制及其启示(上) 》! php?url=0FbhJBzLiS" alt="专家 | 顾伟、刘振宇:英美网络安全审查机制及其启示(下)" />四、英美网络安全审查机制的异同...
View Article没看过这本书?别说你在做网络安全!
没看过这本书?别说你在做网络安全! 一点号360企业安全1小时前 中国互联网安全大会(China Internet Security Conference,简称ISC),是在国家网信办、工信部、公安部指导下,由中国互联网协会、中国网络空间安全协会和360互联网安全中心共同主办的国际型互联网安全会议。 php?url=0Fbi78ozGC" alt="没看过这本书?别说你在做网络安全!"...
View ArticleAikido & HolisticInfoSec
This is the 300th post to the HolisticInfoSec blog. Sparta, this isn't, but I thought it important to provide you with content in a warrior/philosopher mindset regardless. Your author is an Aikido...
View ArticleHacking IMF CTF
IMF is yet another awesome boot2root challenge hosted by Vulnhub where one needs to go through various web and some binary exploitation to fetch all flags. Introduction: IMF holds a total of 6 flags...
View ArticleOrganizations In 40 Countries Under 'Invisible' Cyberattacks
Organizations In 40 Countries Under Invisible Cyberattacks Unknown threat actors are stealing sensitive financial data using memory resident malware crafted from legitimate tools, Kaspersky Lab warns....
View ArticleIDG Contributor Network: What some cybersecurity vendors don’t want you to know
One of the most frustrating processes in evaluating security products is the proof of concept (POC). Call it a POC, bakeoff, evaluation, proof of value (POV), trial, whatever, it’s resource intensive...
View ArticleUS border agents might want visitors' Facebook passwords
Homeland Security Secretary John Kelly speaks before Congress Tuesday. CBS News Visitors to the US might be asked to relinquish their social media passwords to border agents as part of an attempt to...
View ArticleFileless Memory-Based Malware Plagues 140 Banks, Enterprises
Attackers have been using well-known, standard utilities to carry out attacks on organizations around the world, and covering their tracks by wiping their activity from the machine’s memory before its...
View Article