Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Data Visualization and Reporting Are Key to Cyber Security Readiness

At the 2016 Black Hat conference in Las Vegas this week, attendees can get an early look at our updated Threat Intelligence Dashboard , a module that our customers have long relied on to serve as...

View Article


Image may be NSFW.
Clik here to view.

This security threat has hit almost half of UK businesses and it will get worse

A new piece of research has found that approaching half of all businesses have been hit by aransomware attack over the last year. The study from Malwarebytes questioned over 500 IT leaders from...

View Article


Artificial Intelligence Is Key to Autonomous Cyber Security Future

Artificial Intelligence is Key to Autonomous Cyber Security Future -- Artificial Intelligence is a Foundational Technology Being Deployed Today to Immediately and Accurately Identify Threats SAN...

View Article

Ruckus Routers Put Organizations at Risk, says Researcher

Back in 2014 Tripwire research discovered that almost three-quarters (74%) of the top 50 selling consumer Ruckus routers on Amazon came with security vulnerabilities, including exploitable firmware on...

View Article

IDG Contributor Network: The most critical gap in cybersecurity today: Talent

You only have to look at recent headlines to confirm that cybersecurity is a critical concern thattouches every industry and every individual, and threats are only continuing to increase. Yet in...

View Article


Image may be NSFW.
Clik here to view.

Here's how much hackers are selling your Social Security number, Netflix...

Daniel Daza/Netflix/"Narcos" Hackers could be selling access to your Netflix and email, plus your Social Security Number, for $3 dollars total. A recent report from account-monitoring company Logdog ,...

View Article

Image may be NSFW.
Clik here to view.

5 ways hackers market their products and services

Hackers all over the internet today are slowly adapting to the changes in the attack marketplace. Many notorious DDoS groups like Lizard Squad, New World Hackers and others have already entered the...

View Article

Image may be NSFW.
Clik here to view.

Backdoor CTF 2013: 电子取证 150

0x00 题目 H4x0r决定给他的城堡添加一个额外的先进安全身份检验层。他的访问密钥是一个二维码且是唯一的,并一直放在他的钱包里。然而不幸,当他离开他的城堡护城河时一不小心把二维码弄到了河里,二维码被弄湿损毁了。现在他不能回到自己的城堡,迫切需要一个黑客帮助,他在 craigslist 网站发布了求助,描述了情况,这是你露一手的绝佳机会。 这是损毁的二维码:...

View Article


Image may be NSFW.
Clik here to view.

Hackers Steal $65 Million From Bitcoin Exchange

The price of bitcoin has dropped dramatically after hackers managed to steal more than $65 million-worth of the digital currency from a Hong Kong exchange. BitFinex, one of the largest bitcoin...

View Article


Image may be NSFW.
Clik here to view.

2/3英国企业遭受网络攻击后的启示

根据最新公布的安全报告显示,在过去一年里,英国有三分之二的大型企业曾遭受到网络攻击,这让多数的英国企业高管相当头痛。一些高管甚至表示,鉴于面临的网络安全威胁,当前的企业迫切需要进行根本性上的转变。 英国有三分之二的大型企业曾遭受到网络攻击...

View Article

What is the Minimum Acceptable Risk Standards for Exchanges (MAR-E)?

Under the Affordable Care Act (ACA) of 2010, there are now online marketplaces to buy health insurance. These are essentially websites that allow consumers to shop around for an insurance policy by...

View Article

Image may be NSFW.
Clik here to view.

Snitches get stitches: Little Snitch bugs were a blessing for malware

DEF CONVulnerabilities in popular OS X security tool Little Snitch potentially granted malicious applications extra powers, undermining the protection offered by the software. Little Snitch reports in...

View Article

Image may be NSFW.
Clik here to view.

GitHub Enterprise 2.7 is now available with enhanced security and more...

A new release of GitHub Enterprise is now available with improvements for developers and administrators alike. With GitHub Enterprise 2.7, we’re introducing GPG signature verification ― a new way for...

View Article


Image may be NSFW.
Clik here to view.

A Plugin’s Expired Domain Poses a Security Threat to Websites

Do you keep all your website software (including all third-party themes, plugins and components) up-to-date? You should! We always recommend this to our clients and our readers. Applying updates...

View Article

Image may be NSFW.
Clik here to view.

Here’s How Much Your Social Security Number Is Worth on the Dark Web

If you’ve ever wondered how much your Social Security number is worth, here’s a hint: About as much as your password to a pornographic site. Account-monitoring company LogDog on Wednesday published its...

View Article


Notebook 4.2.2: Security fix

TL;DR: upgrade to notebook 4.2.2 We just released notebook 4.2.2 with a few bugfixes and one important security fix. We (specifically Steve Sylvester ) have found a longstanding security issue in the...

View Article

User Profile Store: Advanced Data Modeling Part 1

Virtually all organizations have a need to record and recall user data. Frequently, this user data is permanent, such as user accounts with defined settings, histories and preferences. Equally...

View Article


Image may be NSFW.
Clik here to view.

Understanding Security by Country: SSL

With Shodan it's easy to get an overview of the security for a country. Real-world borders don't necessarily translate to the Internet but it can still reveal useful information as shown by OECD . I...

View Article

Image may be NSFW.
Clik here to view.

Forget security training, it's never going to solve Layer 8 (aka people)

Black HatResearch by German academics has shown there's very little that can be done to prevent people spreading malware by clicking on dodgy links in messages, particularly where Facebook is...

View Article

Image may be NSFW.
Clik here to view.

Exploit can attack secure websites through ads

Some web-based exploits aremore dangerous than others... and unfortunately, this is one of the nasty ones. Security researchers at KU Leuven have discovered an attack technique, HEIST (HTTP Encrypted...

View Article
Browsing all 12749 articles
Browse latest View live