How to Hack Your Office ― Before Someone Else Does
“Human beings are notoriously bad of assessing risk,” Tom Van De Wiele, Principal Security Consultant for F-Secure’s Cyber Security Services, tells me. And he has proof. “We have a 100 percent hit...
View Article网络科技丨六种常用智能设备最易受黑客攻击
网络科技丨六种常用智能设备最易受黑客攻击 一点号师夷科技28分钟前 php?url=0FeI1fVMUf" alt="网络科技丨六种常用智能设备最易受黑客攻击" />近日,英媒天空新闻网列举出了六项有黑客攻击风险的常用设备。英国安全组织也曾警告过英国公司,他们不具备应对网络威胁的能力。 第一个:冰箱...
View Article在看 | 黑客带领跨国团队从ATM狂卷5500万美元,被判8年
在看 | 黑客带领跨国团队从ATM狂卷5500万美元,被判8年 一点号安在2小时前 今日要闻: 土耳其黑客从ATM狂卷5500万美元 获刑8年 离奇的校园网络故事谜团解开,竟和海鲜有关 美国人又开发猫咪识别AI技术,计算能力缩小100倍 IBM Watson新动向:成为网络安全专家 马化腾确认微信将推出公众号付费阅读功能 专斗“流氓”无人机,Dedrone完成B轮融资...
View ArticleRSA 2017大会 微软推出全面的安全平台
近日,在RSA2017安全大会来临之际,微软官方博客发文阐述自己独特的网络安全方法,并亮出了应对攻击的“杀手锏”――构建全面的安全平台。RSA2017安全大会正在美国当地时间旧金山Moscone中心召开,今年参会者超过30000万人,并且有众多的安全初创公司和大型供应商参会。...
View Article2017年需要知道超融合的三件事
“超融合”这个词语本身听起来像是未来主义。超融合不再只是支持同质虚拟桌面基础设施(VDI)环境的基础架构,如今可以支持跨越广泛的主流软件技术,以及关键任务的生产工作负载。 超融合消除了配置的复杂性,并提供经济效益和资源效率。展望2017年及以后,超融合将变得普遍,其部署宜早不宜迟更快。...
View ArticleInside Confide, the chat app 'secretly used by Trump aides': OpenPGP,...
Rumors that President Donald Trump's aides are using an encrypted messaging app called Confide has landed the software firmly in the spotlight and under the security microscope. The Washington Post on...
View ArticleSAS brings security analytics to the Intel Security Innovation Alliance
SAS, the leader in analytics, today announced it has joined the Intel Security Innovation Alliance . The new collaboration will add SAS Cybersecurity , SAS’ security analytics software platform, to...
View ArticleApple Security Trends: What to Expect in 2017
We're a little over a month into 2017 and fresh reports of new malware have already surfaced, including small scaletargeted attacksand a new Mac threat just lastweek masquerading as an Adobe Flash...
View Article‘When Computers Start Killing People, There Are Going to Be Consequences’
SAN FRANCISCO The massive, rapidly expanding network of insecure IoT devices is becoming so large and unwieldy that it will inevitably attract attention from government regulators in the near future....
View ArticleSoftware Can’t Fully Fix This Massive New Security Flaw
For the last decade or so, hackers have faced a daunting challenge when they try to break into a computer: Even when they get malicious code running on a victim’s machine, they have to figure out...
View ArticleCERBER Changes Course, Triple Checks for Security Software
By Marvelous Pelin and Gilbert Sison CERBER is aransomware family that has seen its share ofunusual features since its appearance early last year. From its useofaudiowarnings, to the targeting ofcloud...
View ArticleTwitter fights for disclosure of national security letters
Twitter is fighting to disclose how manytimes the government has secretly accessed its users’ data ― and a judge may soon allow the company to do so. Twitter’s fight has been ongoing since 2014, and...
View ArticleSecurity Sense: Australia’s Mandatory Data Breach Disclosure Laws Are...
Australia, like many parts of the world, has been throwing around the idea of mandatory data breach disclosure laws for a while now. The premise is simple: if a company loses their customers’ data,...
View ArticleFortinet Security Fabric架构将安全保护扩展至物联网
全球高性能网络安全解决方案供应商宣布,扩展后的“Security Fabric”可以帮助企业防御呈指数级增长的物联网网络威胁。Fortinet 的“Security Fabric”架构能够提供可见、可控、弹性可集成的部署,有效防御日益普及的物联网设备带来的复杂攻击。 “Security Fabric”架构是防御源自物联网巨量攻击的关键...
View Article数梦工场助力云计算国标制定
当前我国移动互联、云计算、大数据、物联网和工业控制等新技术、新应用处于高速发展阶段,面对全球网络安全戒备态势,各领域信息安全等级保护工作亟须完善。全国信息安全标准化技术委员会(SAC/TC 260)提出并归口国家标准《信息安全技术 网络安全等级保护设计技术要求第2部分:云计算安全要求》征求意见稿,正式面向社会广泛征求意见。...
View Article从RSAC2017看威胁情报如何落地
年度安全峰会RSA2017已于美国时间2月13日盛大开幕。从最近三年RSA所有演讲的主题词热度可以看出,“Threat”和“Intelligence”都是大家关注的重点。威胁情报厂商也如雨后春笋般出现在网络安全领域,除了新起之秀外,也有不少传统安全厂商将业务扩展到威胁情报领域,纷纷争相推出自己的威胁情报产品。威胁情报”从理念到产品再到客户投入使用只用了短短几年时间,这些嗅觉敏锐的企业是如何占得市场先...
View Article【技术分享】内网漫游之SOCKS代理大结局
【技术分享】内网漫游之SOCKS代理大结局 2017-02-16 10:16:30 来源:安全客 作者:shuteer 阅读:494次 点赞(0) 收藏 作者:shuteer 预估稿费:400RMB 投稿方式:发送邮件至linwei#360.cn,或登陆网页版在线投稿 0×01 引言...
View Article【技术分享】探索Windows 10的CFG机制
【技术分享】探索windows 10的CFG机制 2017-02-16 09:59:55 来源:sjc1-te-ftp.trendmicro.com 作者:myswsun 阅读:490次 点赞(0) 收藏 翻译:myswsun 预估稿费:260RMB 投稿方式:发送邮件至linwei#360.cn,或登陆网页版在线投稿 0x00 前言...
View ArticleA View From the #RSAC SOC
First full day at RSA Conference 2017 started with an excellent keynote and the expected rush of mobile devices to the wireless network. After a bit more than a day the Wi-Fi network is regularly...
View ArticleKremlin-linked hackers believed to be behind Mac spyware Xagent
Kremlin-linked spies have been blamed for cooking up malware called Xagent, which targets victims running macOS to steal passwords, grab screenshots and exfiltrate iPhone backups stored on the Mac....
View Article