网络罪犯傻瓜式养成新方法
犯罪软件即服务(CaaS)正成为暗网最新流行趋势 1. 特征简介 杰夫贝索斯、拉里佩奇、沃伦巴菲特,这些大财主的名字想必大家都耳熟能详了。但是,你知不知道,还有很多人动动手指就能收获百万美元,然而他们的声名却少有人知。这些人就是犯罪软件即服务(CaaS)生意的拥有者。...
View Article汽车信息安全形势不容乐观,智能汽车或将遭遇恶意劫持
编前:随着智能网联汽车的发展,因汽车信息安全而导致的恶性事件正呈现出逐年上升的趋势。随着我国各大自主车企纷纷宣布将在2018-2019年在全系车型上搭载车联网系统,汽车在演变为继手机之后又一个重要智能终端的同时,变得更加脆弱和易受攻击。为此,亿欧汽车从2月15日起专访了多位来自信息安全厂商、整车厂等人士,力图为读者展现当前汽车企业的信息安全水平,探求现状背后所面临的问题与挑战。...
View ArticleConsenSys’s Jeremy Millar Calms the ICO Hype
Initial coin offerings (ICOs) were all the rage in 2016. These token offerings raised more than $200 million for various projects during the course of the year, with the largest one ( The DAO ) also...
View ArticleCarnival: Even DB2 Wears a Mask (Database Security)
Data Privacy and Security Right now we are in the hot phase of the carnival season . Many people are wearing masks . Some move into other characters, some just hide their real identity. Did you know...
View Article智慧养老产业蓝海已至:三年内培育超百家养老领军企业
智慧养老产业蓝海已至:三年内培育超百家养老领军企业 刘露诗 2017-02-17 17:22:37 日前, 工业和信息化部 、 民政部、 国家卫生计生委 三部委印发了《智慧养老产业 发展行动计划(2017-2020年)》 (以下简称“行动计划”) ,意味着万亿规模的智慧养老 市场即将打开。...
View ArticleGraham Cluley named most entertaining security blog
The great and the good of the computer security industry gathered in San Francisco this week for the RSA show, and while they were there the results of the Security Blogger Awards were announced....
View ArticleRSAC17: Geopolitical changes driving encryption usage, survey shows
Recent geopolitical changes are driving concern about data privacy in the security industry, resulting in the increasing use of encryption to protect data, a survey has revealed. Nearly three-quarters...
View ArticleSecurity Think Tank: Integrity of business data key to cyber defence
In the field of information security, confidentiality, integrity and availability (CIA) is a well-known acronym. Many people would be led to believe that confidentiality is the most important...
View ArticleHackers still ahead despite advances in cyber security, says Accenture
At a time of constantly mounting cyber threats, 73% of global organisations are vulnerable to cyber-attacks according to the Accenture Security Index. The new analysis shows that businesses are...
View ArticleRSA 2017 hit parade: All the cool new security tools
See larger image Image courtesy Web Summit RSA Conference underway RSA, the world’s largest security conference, is underway this week in San Francisco with attendees from around the world gathering...
View Article高校网络共享软件被挂马 360无需升级就可拦截
开学季刚刚来临,一些大学校园就遭到黑客攻击。有学生反映,最近在使用一款校园上网终端软件时,360安全卫士发出警报,拦截了名为Script/Trojan.271的木马。据悉这是一次针对校园网的挂马攻击,如果电脑没有专业安全软件防护,就会自动下载安装大量流氓软件。...
View ArticleTrump's Not the Only One With a Phone Security Problem
Is your Android phone secure? President Donald Trump's favorite smartphone reportedly is an older Android device. Security concerns flared recently, following indications that he sent some tweets from...
View ArticleA new security header: Referrer Policy
Regular readers will know how fond I am of the existing security headers so it's great to hear that we're getting another! Referrer Policy will allow a site to control the value of the referer header...
View ArticleAdobe Issues Critical Security Update for Flash Player on Mac
Adobe this week released Flash Player version 24.0.0.221 to "address critical vulnerabilities that could potentially allow an attacker to take control of the affected system," including Mac, windows,...
View ArticleLifting Healthcare Out Of Its Digital Malaise
The power of data in healthcare is nothing new. In 1846, a Hungarian doctor named Ignaz Semmelweis collected data to uncover why so many women in maternity wards were dying from childbed fever. After...
View ArticleSoftware Security in the Agile Way
Software security is an important part of the overall security in Telenor Digital. The outset for building secure software in Telenor Digital is to embrace the opportunities that DevOps approaches like...
View ArticleMicrosoft makes cheeky bid for MongoDB devs on Azure security grounds
Microsoft is attempting to capitalise on a recent spate of ransom attacks on unsecured MongoDB instances by encouraging developers to switch to working with its own Azure-based DocumentDB system. The...
View ArticleChanging DCOM Security Permissions with PowerShell
Changing DCOM Security Permissions with PowerShell On a new deployment of windows 10 LTSB (1607) I noticed the following error in the System event log: The application-specific permission settings do...
View ArticleSMTP Strict Transport Security Coming Soon to Gmail, Other Webmail Providers
Gmail users can expect the introduction of SMTP Strict Transport Security to the email service some time this year, bringing a measure of security similar to certificate pinning to one of the world’s...
View ArticlePrevention: One-Third Of A Healthy Cybersecurity Regimen
Whether internal or external, accidental or malicious, the cybersecurity threatscape is huge and growing, but successfully protecting your information, and your business, is not as difficult as you...
View Article