Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Untangle Introduces Cloud-Based Centralized Management

Command Center Enables Remote Management of NG Firewall Deployments SAN FRANCISCO, Calif. Feb. 13, 2017 Untangle Inc., a leader in comprehensive network security for small-to-medium business (SMB),...

View Article


Image may be NSFW.
Clik here to view.

Razer Blade gets Kaby Lake upgrade, 4K UHD screen

by Brandon Russell | February 13, 2017 # Razer Blade Laptops Razer on Monday introduced an upgrade fans have been waiting for. Starting this month, the company will begin rolling out a new Razer Blade...

View Article


Image may be NSFW.
Clik here to view.

Android Banking Trojan Marcher Targets Dozens of Apps, Bypasses Antivirus

Android-targeting banking Trojan Marcher is on the rise, infecting devices via a phishing attack using SMS/MMS, gaining extensive privileges, displaying an overlay window to your banking app and...

View Article

Kingslayer A Supply Chain Attack

Today, RSA is publishing new research on a sophisticated software supply-chain attack dubbed “Kingslayer”. RSA Research investigated the source of suspicious, observed beaconing thought to be...

View Article

Image may be NSFW.
Clik here to view.

Open Databases a Juicy Extortion Target

Recent attacks against insecure MongoDB, Hadoop and CouchDB installations represent a newphase in online extortion, born from ransomware’s roots with thepromise of becoming a nemesis for years to come....

View Article


MongoDB Ransomware Attacks Show Need For New Security Techniques

The recently reported ransomware attacks on MongoDB are shocking not just by the sheer number of them over 28,000 and counting but also by how easily they were compromised. These attacks did not...

View Article

Image may be NSFW.
Clik here to view.

5 Jobs in Big Data You’ve Never Heard Of

This article is courtesy ofthe Galvanize blog . Interested in entrepreneurship, web development, or data science? Check out the Galvanized Newsletter , bringing you the best content from The Learning...

View Article

Best Android Security Apps to Secure Your Smartphone

Security is a primary concern these days. As the internetwork is growing at a rapid scale more and more threats are emerging. Like there are antivirus applications and programs for our...

View Article


Image may be NSFW.
Clik here to view.

New Bug Bounty Program Targets IoT Security

GeekPwn bug bounty program aims to collect Internet of Things security vulnerabilities, and highlight mistakes to vendors. The Internet of Things, like all new tech, drives security risk. Similar to...

View Article


Image may be NSFW.
Clik here to view.

IBM's Watson-powered voice assistant is built for security pros

If it wasn't already clear that AI-powered voice assistants are ready for the workplace , it is now. IBM is not only launching Watson for Cybersecurity, acognitive computing service that parses...

View Article

The Doyle Report: New Rules for Computing

Depending on how you count, we are either in the third wave of technology transformation , the fourth or even the fifth . The designations don’t matter as much as the impact. Ross Brown, senior vice...

View Article

Image may be NSFW.
Clik here to view.

【技术分享】针对Mac用户的恶意Word文档分析

【技术分享】针对Mac用户的恶意Word文档分析 2017-02-14 14:42:26 来源:objective-see.com 作者:胖胖秦 阅读:1194次 点赞(0) 收藏 翻译:胖胖秦 预估稿费:110RMB 投稿方式:发送邮件至linwei#360.cn,或登陆网页版在线投稿 简介...

View Article

Image may be NSFW.
Clik here to view.

盘点娱乐圈遭遇网络诈骗的七大明星

盘点娱乐圈遭遇网络诈骗的七大明星 53分钟前来源:知天下 原标题:盘点娱乐圈遭遇网络诈骗的七大明星 php?url=0FdZuW88E5" alt="盘点娱乐圈遭遇网络诈骗的七大明星" />2月13日,李晨在微博晒出一张短信截图,该信息中骗子自称是某节目组,抽中此手机号为场外幸运观众,将会获得15万元人民币和一台苹果电脑的大奖......

View Article


Image may be NSFW.
Clik here to view.

黑客讲述:我如何一边搭飞机一边抢银行

黑客讲述:我如何一边搭飞机一边抢银行 16小时前来源:IT经理世界 Jayson E.Street 是黑客盛会 DEFCON 组织的全球协调人,在 SyScan 360...

View Article

Image may be NSFW.
Clik here to view.

Mirai Widens Distribution with New Trojan that Scans More Ports

Analysis byJulie Cabuhat Late last year, in several high-profile and potent DDoS attacks, linux-targeting Mirai (identified by Trend Micro as ELF_MIRAI family) revealed just how broken the Internet of...

View Article


Image may be NSFW.
Clik here to view.

The Inner Components and Policies/Rules of a Public Key Infrastructure

Introduction In today’s world, Cyber threats are an almost everyday occurrence. It is a cat and mouse game, where the victim (which is the mouse, whether it be an individual or a business/corporation)...

View Article

Image may be NSFW.
Clik here to view.

IDG Contributor Network: Beyond risk scoring

Credit: Thinkstock Risk scoring is not an end in itself once it shows up color coded and normalized between 0 and 100 in a security operations center (SOC) dashboard. To provide real value it must be...

View Article


IBM uses Watson to fill cybersecurity gaps

IBM Watson has a new job: Cybersecurity specialist. At the RSA Conference on Monday, IBM announced the availability of Watson for Cyber Security, with the aim of assisting cybersecurity professionals...

View Article

Image may be NSFW.
Clik here to view.

Anonymizing Datasets at Scale Leveraging Databricks Interoperability

A key challenge for data-driven companies across a wide range of industries is how to leverage the benefits of analytics at scale when working with Personally Identifiable Information (PII). In this...

View Article

University network slows to a crawl due to… seafood?

Accessing the internet became a trial today for some university students. The culprit? Seafood and weak passwords. Verizon’s 2017 Data Breach Digest tells the story in a sneak peek released today. It...

View Article
Browsing all 12749 articles
Browse latest View live