Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

手机支付与网上银行的安全防范注意事项

手机支付与网上银行的安全防范注意事项 一点号金融点点7小时前 目前,很多消费者对于网络支付安全存在“误区”,一种是放任自流型。我只管上网支付,安全是银行和支付机构的事情,和我无关;一种是过度防护型,谨...

View Article


Image may be NSFW.
Clik here to view.

在看 | 顶尖黑客将在豪华邮轮巅峰对决,挑战智能领域所有可能漏洞

在看 | 顶尖黑客将在豪华邮轮巅峰对决,挑战智能领域所有可能漏洞 一点号安在2小时前 全球首艘黑客邮轮即将启航 GeekPwn招募天才极客...

View Article


Image may be NSFW.
Clik here to view.

TLS 1.3 Adoption

On 5 April 2017 OpenSSL 1.1.1, which implements TLS (Transport Layer Security) 1.3 will be released. OpenSSL 1.1.1 will maintain compatibility with version 1.1.0. TLS 1.3 contains important updates to...

View Article

Image may be NSFW.
Clik here to view.

RSA2017创新沙盒冠军unifyid 安全又易用,老树开新花

阅读: 12 2017年RSA大会的创新沙盒在选出的十家短名单的基础上,经过激烈的演讲问答环节,选出了最后的获胜者 UNIFYID。下面一起看看他们的创新点,有哪些可以学习借鉴的。 身份认证不能说是新领域。我们基本上每天都需要认证登录。也经常有用户密码泄露,盗用身份的安全事件。在这种传统技术领域,结合新技术一样绽放无限光芒。...

View Article

Image may be NSFW.
Clik here to view.

Your in-car attention is media’s next battleground

Michael Boland Crunch Network Contributor Mike Boland was one of Silicon Valley's first tech reporters of the internet age, and is now chief analyst of BIA/Kelsey and the VR/AR Association. More posts...

View Article


Image may be NSFW.
Clik here to view.

Blockchains in a Quantum Future

Image by Robert Couse-Baker used under CC BY 2.0, modified from original. In aprevious article we described our work on Confidential Assets ― an evolution of theChain Protocol that makes asset amounts...

View Article

Forget Artificial Intelligence. Why ‘Artificial Stupidity’ Is the Real Threat

David Ulevitch, head of Cisco's security business, has a problem with the hype around artificial intelligence , the field that encompasses the booming computer science discipline of machine learning ....

View Article

Fake Amazon Ad Slips Through Google Security

Google usually keeps atight hold on what can and can’t appear as an ad above search results, but for a brief time, a fake Amazon advertisement that actually led to a page attempting toscam users...

View Article


Image may be NSFW.
Clik here to view.

IDG Contributor Network: 3 new information security jobs for the digital...

The responsibilities of information security are rapidly changing as enterprises digitize. Technology now enables business strategy and is transforming product, channels, and operations. In this new...

View Article


Image may be NSFW.
Clik here to view.

A week in security (Feb 6th Feb 12th)

RELATED ARTICLES Conferences |Security world Malwarebytes @ DefCon July 26, 2012 - That’s right, this week some of the Malwarebytes gang will be out in Las Vegas for the hacker convention: DefCon 20!...

View Article

Image may be NSFW.
Clik here to view.

IT Budget Staying The Same? Here's What To Do Differently In 2017

IT Budget Staying The Same? Heres What To Do Differently In 2017 If your IT budget is staying flat, there are techniques for getting more bang from the same bucks in a new age of IT. So you’re not...

View Article

Pre-order a Keezel, protect your WiFi privacy, and save 16% [DEALS]

Like using public WiFi hotspots? Then you may be taking unnecessary risks with your data. You can protect yourself though with a 2 year premium subscription to the Keezel Online Security and Privacy...

View Article

Image may be NSFW.
Clik here to view.

Cerber ransomware takes special care not to encrypt security product files

Cerber's developers want to infect your computer with ransomware. But they also don't want to trigger a security alert that could interfere with their attempt to extort money from you. Traditionally, a...

View Article


You know IoT security is bad when libertarians call for strict regulation

RSA USAThe security industryknows the vast majority of Internet of Things devices haven’t got more than a fig leaf of protection. Now the unlikeliest of folks are calling for new rules to safeguard...

View Article

Image may be NSFW.
Clik here to view.

What happens if your thermostat is hacked? Researchers name the top 7...

What happens if a bad actor turns off your heat in the middle of winter, then demands $1,000 to turn it back on? Or even holds a small city’s power for ransom? Those kinds of attacks were among the top...

View Article


IDG Contributor Network: CISOs need to keep up with the hyper pace of security

Last month I attended the Consumer Electronics Show in Las Vegas and saw not only the future of virtual reality and autonomous driving, but also the advancement of payments embedded in everything from...

View Article

Image may be NSFW.
Clik here to view.

SharePoint Security Best Practices Article 1

Microsoft has long used the same “object oriented” approach to security within its various “object namespaces”. SharePoint is no different. A… what is an “object namespace” you ask? The Microsoft...

View Article


D-Link’s Omna, the first Home-Kit security camera, is now on sale

The first HomeKit-compatible security camera is officially available to order through Apple . D-Link’s $200 Omna 180 Cam HD, first announced at CES in January, has a list of specs comparable to...

View Article

Image may be NSFW.
Clik here to view.

【技术分享】LLMNR/NBT-NS欺骗攻击

【技术分享】LLMNR/NBT-NS欺骗攻击 2017-02-17 09:57:02 来源:aptive.co.uk 作者:shan66 阅读:384次 点赞(0) 收藏 作者:shan66 预估稿费:140RMB 投稿方式:发送邮件至linwei#360.cn,或登陆网页版在线投稿 简介 LLMNR&NBT-NS...

View Article

Image may be NSFW.
Clik here to view.

【技术分享】在Linux中使用C语言实现控制流保护(CFG)

【技术分享】在linux中使用C语言实现控制流保护(CFG) 2017-02-17 13:57:07 来源:nullprogram.com 作者:myswsun 阅读:472次 点赞(0) 收藏 翻译:myswsun 预估稿费:200RMB 投稿方式:发送邮件至linwei#360.cn,或登陆网页版在线投稿 0x00前言...

View Article
Browsing all 12749 articles
Browse latest View live