Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

How to Hack Your Office ― Before Someone Else Does

“Human beings are notoriously bad of assessing risk,” Tom Van De Wiele, Principal Security Consultant for F-Secure’s Cyber Security Services, tells me. And he has proof. “We have a 100 percent hit...

View Article



Image may be NSFW.
Clik here to view.

网络科技丨六种常用智能设备最易受黑客攻击

网络科技丨六种常用智能设备最易受黑客攻击 一点号师夷科技28分钟前 php?url=0FeI1fVMUf" alt="网络科技丨六种常用智能设备最易受黑客攻击" />近日,英媒天空新闻网列举出了六项有黑客攻击风险的常用设备。英国安全组织也曾警告过英国公司,他们不具备应对网络威胁的能力。 第一个:冰箱...

View Article

Image may be NSFW.
Clik here to view.

在看 | 黑客带领跨国团队从ATM狂卷5500万美元,被判8年

在看 | 黑客带领跨国团队从ATM狂卷5500万美元,被判8年 一点号安在2小时前 今日要闻: 土耳其黑客从ATM狂卷5500万美元 获刑8年 离奇的校园网络故事谜团解开,竟和海鲜有关 美国人又开发猫咪识别AI技术,计算能力缩小100倍 IBM Watson新动向:成为网络安全专家 马化腾确认微信将推出公众号付费阅读功能 专斗“流氓”无人机,Dedrone完成B轮融资...

View Article

Image may be NSFW.
Clik here to view.

RSA 2017大会 微软推出全面的安全平台

近日,在RSA2017安全大会来临之际,微软官方博客发文阐述自己独特的网络安全方法,并亮出了应对攻击的“杀手锏”――构建全面的安全平台。RSA2017安全大会正在美国当地时间旧金山Moscone中心召开,今年参会者超过30000万人,并且有众多的安全初创公司和大型供应商参会。...

View Article

Image may be NSFW.
Clik here to view.

2017年需要知道超融合的三件事

“超融合”这个词语本身听起来像是未来主义。超融合不再只是支持同质虚拟桌面基础设施(VDI)环境的基础架构,如今可以支持跨越广泛的主流软件技术,以及关键任务的生产工作负载。 超融合消除了配置的复杂性,并提供经济效益和资源效率。展望2017年及以后,超融合将变得普遍,其部署宜早不宜迟更快。...

View Article


Inside Confide, the chat app 'secretly used by Trump aides': OpenPGP,...

Rumors that President Donald Trump's aides are using an encrypted messaging app called Confide has landed the software firmly in the spotlight and under the security microscope. The Washington Post on...

View Article

SAS brings security analytics to the Intel Security Innovation Alliance

SAS, the leader in analytics, today announced it has joined the Intel Security Innovation Alliance . The new collaboration will add SAS Cybersecurity , SAS’ security analytics software platform, to...

View Article

Image may be NSFW.
Clik here to view.

Apple Security Trends: What to Expect in 2017

We're a little over a month into 2017 and fresh reports of new malware have already surfaced, including small scaletargeted attacksand a new Mac threat just lastweek masquerading as an Adobe Flash...

View Article


‘When Computers Start Killing People, There Are Going to Be Consequences’

SAN FRANCISCO The massive, rapidly expanding network of insecure IoT devices is becoming so large and unwieldy that it will inevitably attract attention from government regulators in the near future....

View Article


Software Can’t Fully Fix This Massive New Security Flaw

For the last decade or so, hackers have faced a daunting challenge when they try to break into a computer: Even when they get malicious code running on a victim’s machine, they have to figure out...

View Article

Image may be NSFW.
Clik here to view.

CERBER Changes Course, Triple Checks for Security Software

By Marvelous Pelin and Gilbert Sison CERBER is aransomware family that has seen its share ofunusual features since its appearance early last year. From its useofaudiowarnings, to the targeting ofcloud...

View Article

Image may be NSFW.
Clik here to view.

Twitter fights for disclosure of national security letters

Twitter is fighting to disclose how manytimes the government has secretly accessed its users’ data ― and a judge may soon allow the company to do so. Twitter’s fight has been ongoing since 2014, and...

View Article

Image may be NSFW.
Clik here to view.

Security Sense: Australia’s Mandatory Data Breach Disclosure Laws Are...

Australia, like many parts of the world, has been throwing around the idea of mandatory data breach disclosure laws for a while now. The premise is simple: if a company loses their customers’ data,...

View Article


Fortinet Security Fabric架构将安全保护扩展至物联网

全球高性能网络安全解决方案供应商宣布,扩展后的“Security Fabric”可以帮助企业防御呈指数级增长的物联网网络威胁。Fortinet 的“Security Fabric”架构能够提供可见、可控、弹性可集成的部署,有效防御日益普及的物联网设备带来的复杂攻击。 “Security Fabric”架构是防御源自物联网巨量攻击的关键...

View Article

数梦工场助力云计算国标制定

当前我国移动互联、云计算、大数据、物联网和工业控制等新技术、新应用处于高速发展阶段,面对全球网络安全戒备态势,各领域信息安全等级保护工作亟须完善。全国信息安全标准化技术委员会(SAC/TC 260)提出并归口国家标准《信息安全技术 网络安全等级保护设计技术要求第2部分:云计算安全要求》征求意见稿,正式面向社会广泛征求意见。...

View Article


Image may be NSFW.
Clik here to view.

从RSAC2017看威胁情报如何落地

年度安全峰会RSA2017已于美国时间2月13日盛大开幕。从最近三年RSA所有演讲的主题词热度可以看出,“Threat”和“Intelligence”都是大家关注的重点。威胁情报厂商也如雨后春笋般出现在网络安全领域,除了新起之秀外,也有不少传统安全厂商将业务扩展到威胁情报领域,纷纷争相推出自己的威胁情报产品。威胁情报”从理念到产品再到客户投入使用只用了短短几年时间,这些嗅觉敏锐的企业是如何占得市场先...

View Article

Image may be NSFW.
Clik here to view.

【技术分享】内网漫游之SOCKS代理大结局

【技术分享】内网漫游之SOCKS代理大结局 2017-02-16 10:16:30 来源:安全客 作者:shuteer阅读:494次 点赞(0) 收藏作者:shuteer 预估稿费:400RMB 投稿方式:发送邮件至linwei#360.cn,或登陆网页版在线投稿 0×01 引言...

View Article


Image may be NSFW.
Clik here to view.

【技术分享】探索Windows 10的CFG机制

【技术分享】探索windows 10的CFG机制 2017-02-16 09:59:55 来源:sjc1-te-ftp.trendmicro.com 作者:myswsun阅读:490次 点赞(0) 收藏翻译:myswsun 预估稿费:260RMB 投稿方式:发送邮件至linwei#360.cn,或登陆网页版在线投稿 0x00 前言...

View Article

Image may be NSFW.
Clik here to view.

A View From the #RSAC SOC

First full day at RSA Conference 2017 started with an excellent keynote and the expected rush of mobile devices to the wireless network. After a bit more than a day the Wi-Fi network is regularly...

View Article

Kremlin-linked hackers believed to be behind Mac spyware Xagent

Kremlin-linked spies have been blamed for cooking up malware called Xagent, which targets victims running macOS to steal passwords, grab screenshots and exfiltrate iPhone backups stored on the Mac....

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images