Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Healthcare Under Attack: Trend Micro Reveals All in New Report

Healthcare organizations (HCOs) around the world are under attack. The data they store and process has become a valuable commodity on the cybercriminal underground and has even been linked to nation...

View Article


Image may be NSFW.
Clik here to view.

Dutch banks and ISPs behind in domain security

Banks in the Netherlands are the lowest adopters of technology that prevents visitors to their websites being redirected to fraudulent addresses, according to a study from internet registry SIDN . The...

View Article


Top 8 Reverse Engineering Tools for Cyber Security Professionals

Whether it is rebuilding a car engine or diagramming a sentence, people can learn about many things simply by taking them apart and putting them back together again. This process of breaking something...

View Article

Image may be NSFW.
Clik here to view.

A priority on today’s to do list: Please secure remote access once and for all!

Most IT devices have some form of remote access, whether via web browser or app. As long as devices are accessed by an authorized user from within an internal network, this isn’t a problem....

View Article

Image may be NSFW.
Clik here to view.

Digitisation opens up security weakness in oil and gas

A report from the Ponemon Institute has painted a damning picture of the state of technology in the oil and gas industry. The report, based on a survey of 1,092 qualified respondents in Europe, the...

View Article


Image may be NSFW.
Clik here to view.

【技术分享】如何在.ipa文件上进行iOS代码注入

【技术分享】如何在.ipa文件上进行iOS代码注入 2017-02-24 11:07:50 来源:medium.com 作者:骨哥_2015 阅读:667次 点赞(0) 收藏 翻译:骨哥_2015 预估稿费:200RMB 投稿方式:发送邮件至linwei#360.cn,或登陆网页版在线投稿 前言 代码注入是将外部代码注入至现有软件系统的过程。通过本文,我将分享在iOS...

View Article

Image may be NSFW.
Clik here to view.

How Cybersecurity Analytics Are Evolving

As the war between the black hats and white hats continues to escalate, cybersecurity necessarily evolves. In the past, black hats were rogue individuals. Now they're hactivists, crime groups, and...

View Article

Image may be NSFW.
Clik here to view.

Sumo Logic launches Multi-Factor Authentication for its Platform

The biggest risk to any organization is the end user and their password hygiene. It is an age old problem as users want to keep things easy using the same dictionary based password for all...

View Article


Exploit Kit-Based Attacks Decline Dramatically

But it's too soon to call this downward trend a permanent shift, experts say. Law enforcement actions and a relative dearth of zero-day bugs appear to have contributed to a sharp decline in exploit kit...

View Article


Cisco’s John Chambers Bets on Google and Citi-Backed Voice Security Startup

When John Chambers became CEO of Cisco Systems (csco) in the '90s, he skillfully anticipated the market's movement away from traditional telephone networks toward IP telephony, or voice sent as data...

View Article

Image may be NSFW.
Clik here to view.

Road Map To A $200,000 Cybersecurity Job

Looking to get ahead in cybersecurity? Here are four areas to keep in mind as you make a five-year career plan. The economics of supply and demand shape today's cybersecurity job market. Each year, US...

View Article

Image may be NSFW.
Clik here to view.

网络尖刀y1ng挖洞第一获360【漏洞之王】称号,网络尖刀团队受聘成为“360IOT安全守护计 ...

网络尖刀y1ng挖洞第一获360【漏洞之王】称号,网络尖刀团队受聘成为“360IOT安全守护计划”专家 一点号爱尖刀科技媒体4小时前 晕沉沉的午后 手机“滴滴”不绝的传来大尖刀群提示声咦? 网络尖刀成员获360SRC奖励了? 授予【漏洞之王】称号了?? php?url=0FiY2By5ti" alt="网络尖刀y1ng挖洞第一获360【漏洞之王】称号,网络尖刀团队受聘成为“360IOT安全守护计...

View Article

Image may be NSFW.
Clik here to view.

GoDaddy SSL cert limitations - 10 domains? Not really.

Just a quick heads up, if planning on buying a UCC cert (totally overpriced!) that claims 10 domains - you actually only getten FQDNs total - use them wisely. Consider this example, only covering five...

View Article


Image may be NSFW.
Clik here to view.

Google achieved First-Ever Successful SHA-1 Collision Attack

SHA-1, Secure Hash Algorithm 1, a very popular cryptographic hashing function designed in 1995 by the NSA, is officially dead after a team of researchers from Google and the CWI Institute in Amsterdam...

View Article

Image may be NSFW.
Clik here to view.

SHAttered ― SHA-1 is broken

A team from Google and CWI Amsterdam just announced it: they produced the first SHA-1 hash collision . The attack required over 9,223,372,036,854,775,808 SHA-1 computations, the equivalent processing...

View Article


MS Patch Update and 0day Daily Security Byte

Last week, Microsoft cancelled Patch Day for some undisclosed reason. However, this week they released one critical update to fix a Flash flaw. Meanwhile, a Google researcher also disclosed a zero day...

View Article

Quick Tip - Connect-OMServer throws The request was aborted: Could not create...

While doing some work with PowerCLI and vRealize Operations Manager (vROps), I ran into the following error message when trying to connectto my vROps instance using PowerCLI: Connect-OMServer :...

View Article


Tricerat Simplify Lockdown Datasheet

Ransomware is on the rise. After a 35% spike in attacks in 2015, experts are predicting that threats will increasingly continue with the malicious intent to target businesses and compromise data...

View Article

Image may be NSFW.
Clik here to view.

Today and tomorrow only: 50% off Ethical Hacker bundle

The AAPicks team writes about things we think you’ll like, and we may see a share of revenue from any purchases made through affiliate links. A recent survey showed that over 1 in 8 of our readers have...

View Article

Making Elasticsearch Secure A Peek into SSL/TLS Implementation

In production environments, network security is ineluctable. When elasticsearch is deployed, there are many ways to secure the environment. Youcan use Ngnix,commercial products like Shield, open source...

View Article
Browsing all 12749 articles
Browse latest View live