Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

网络罪犯傻瓜式养成新方法

犯罪软件即服务(CaaS)正成为暗网最新流行趋势 1. 特征简介 杰夫贝索斯、拉里佩奇、沃伦巴菲特,这些大财主的名字想必大家都耳熟能详了。但是,你知不知道,还有很多人动动手指就能收获百万美元,然而他们的声名却少有人知。这些人就是犯罪软件即服务(CaaS)生意的拥有者。...

View Article


Image may be NSFW.
Clik here to view.

汽车信息安全形势不容乐观,智能汽车或将遭遇恶意劫持

编前:随着智能网联汽车的发展,因汽车信息安全而导致的恶性事件正呈现出逐年上升的趋势。随着我国各大自主车企纷纷宣布将在2018-2019年在全系车型上搭载车联网系统,汽车在演变为继手机之后又一个重要智能终端的同时,变得更加脆弱和易受攻击。为此,亿欧汽车从2月15日起专访了多位来自信息安全厂商、整车厂等人士,力图为读者展现当前汽车企业的信息安全水平,探求现状背后所面临的问题与挑战。...

View Article


Image may be NSFW.
Clik here to view.

ConsenSys’s Jeremy Millar Calms the ICO Hype

Initial coin offerings (ICOs) were all the rage in 2016. These token offerings raised more than $200 million for various projects during the course of the year, with the largest one ( The DAO ) also...

View Article

Image may be NSFW.
Clik here to view.

Carnival: Even DB2 Wears a Mask (Database Security)

Data Privacy and Security Right now we are in the hot phase of the carnival season . Many people are wearing masks . Some move into other characters, some just hide their real identity. Did you know...

View Article

Image may be NSFW.
Clik here to view.

智慧养老产业蓝海已至:三年内培育超百家养老领军企业

智慧养老产业蓝海已至:三年内培育超百家养老领军企业 刘露诗 2017-02-17 17:22:37 日前, 工业和信息化部 、 民政部、 国家卫生计生委 三部委印发了《智慧养老产业 发展行动计划(2017-2020年)》 (以下简称“行动计划”) ,意味着万亿规模的智慧养老 市场即将打开。...

View Article


Image may be NSFW.
Clik here to view.

Graham Cluley named most entertaining security blog

The great and the good of the computer security industry gathered in San Francisco this week for the RSA show, and while they were there the results of the Security Blogger Awards were announced....

View Article

RSAC17: Geopolitical changes driving encryption usage, survey shows

Recent geopolitical changes are driving concern about data privacy in the security industry, resulting in the increasing use of encryption to protect data, a survey has revealed. Nearly three-quarters...

View Article

Image may be NSFW.
Clik here to view.

Security Think Tank: Integrity of business data key to cyber defence

In the field of information security, confidentiality, integrity and availability (CIA) is a well-known acronym. Many people would be led to believe that confidentiality is the most important...

View Article


Image may be NSFW.
Clik here to view.

Hackers still ahead despite advances in cyber security, says Accenture

At a time of constantly mounting cyber threats, 73% of global organisations are vulnerable to cyber-attacks according to the Accenture Security Index. The new analysis shows that businesses are...

View Article


Image may be NSFW.
Clik here to view.

RSA 2017 hit parade: All the cool new security tools

See larger image Image courtesy Web Summit RSA Conference underway RSA, the world’s largest security conference, is underway this week in San Francisco with attendees from around the world gathering...

View Article

Image may be NSFW.
Clik here to view.

高校网络共享软件被挂马 360无需升级就可拦截

开学季刚刚来临,一些大学校园就遭到黑客攻击。有学生反映,最近在使用一款校园上网终端软件时,360安全卫士发出警报,拦截了名为Script/Trojan.271的木马。据悉这是一次针对校园网的挂马攻击,如果电脑没有专业安全软件防护,就会自动下载安装大量流氓软件。...

View Article

Image may be NSFW.
Clik here to view.

Trump's Not the Only One With a Phone Security Problem

Is your Android phone secure? President Donald Trump's favorite smartphone reportedly is an older Android device. Security concerns flared recently, following indications that he sent some tweets from...

View Article

Image may be NSFW.
Clik here to view.

A new security header: Referrer Policy

Regular readers will know how fond I am of the existing security headers so it's great to hear that we're getting another! Referrer Policy will allow a site to control the value of the referer header...

View Article


Image may be NSFW.
Clik here to view.

Adobe Issues Critical Security Update for Flash Player on Mac

Adobe this week released Flash Player version 24.0.0.221 to "address critical vulnerabilities that could potentially allow an attacker to take control of the affected system," including Mac, windows,...

View Article

Image may be NSFW.
Clik here to view.

Lifting Healthcare Out Of Its Digital Malaise

The power of data in healthcare is nothing new. In 1846, a Hungarian doctor named Ignaz Semmelweis collected data to uncover why so many women in maternity wards were dying from childbed fever. After...

View Article


Image may be NSFW.
Clik here to view.

Software Security in the Agile Way

Software security is an important part of the overall security in Telenor Digital. The outset for building secure software in Telenor Digital is to embrace the opportunities that DevOps approaches like...

View Article

Image may be NSFW.
Clik here to view.

Microsoft makes cheeky bid for MongoDB devs on Azure security grounds

Microsoft is attempting to capitalise on a recent spate of ransom attacks on unsecured MongoDB instances by encouraging developers to switch to working with its own Azure-based DocumentDB system. The...

View Article


Changing DCOM Security Permissions with PowerShell

Changing DCOM Security Permissions with PowerShell On a new deployment of windows 10 LTSB (1607) I noticed the following error in the System event log: The application-specific permission settings do...

View Article

Image may be NSFW.
Clik here to view.

SMTP Strict Transport Security Coming Soon to Gmail, Other Webmail Providers

Gmail users can expect the introduction of SMTP Strict Transport Security to the email service some time this year, bringing a measure of security similar to certificate pinning to one of the world’s...

View Article

Prevention: One-Third Of A Healthy Cybersecurity Regimen

Whether internal or external, accidental or malicious, the cybersecurity threatscape is huge and growing, but successfully protecting your information, and your business, is not as difficult as you...

View Article
Browsing all 12749 articles
Browse latest View live