Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Privacy Vs Security In A Big Data World

I still havent decided if Edward Snowden is a hero, a traitor, or a schmuck. I watched Citizenfour, the documentary that captures his story in real time, thinking it would help me figure it out, but I...

View Article


Image may be NSFW.
Clik here to view.

5 Success Secrets of This Pink Panther Inspired Billionaire

If you have not watched any Pink Panther movies, you are missing an important part of the world's cultural heritage. Those movies featured a bumbling detective, Inspector Clouseau, and his incompetent...

View Article


Image may be NSFW.
Clik here to view.

12 Security Tricks to Stay Safe Online

Image: Brian Klug under Creative Commons Isn’t the web a wonderful place for exploring? Just like any other appealing destination though, if you don’t keep yourself safe, the attraction quickly wears...

View Article

75% of the top 20 US banks are infected with malware

SecurityScorecard released its 2016 Financial Cybersecurity Report, a comprehensive analysis that exposes cybersecurity vulnerabilities across 7,111 global financial institutions including investment...

View Article

Image may be NSFW.
Clik here to view.

Dynamic security made easy with SSAS 2016 and Power BI

Dynamic security is one of those design patterns you hear mentioned every now and then by the seasoned SSAS pro’s. It is a design pattern that allows you to move the user management from the user and...

View Article


Image may be NSFW.
Clik here to view.

There's Something Phishy in the Package

Theres Something Phishy in the Package The typosquatting risk is real. It's time to increase our vigilance and control over third-party source code. Building and maintaining a chain of trust for the...

View Article

Image may be NSFW.
Clik here to view.

Smoke Loader downloader with a smokescreen still alive

This time we will have a look at another payload from recent RIG EK campaign . It is Smoke Loader (Dofoil), a bot created several years ago one of its early versions was advertised on the black marker...

View Article

Image may be NSFW.
Clik here to view.

Hacker sneaks into airport lounges by generating fake QR codes on his phone

If you’ve ever had to wait hours for a delayed flight you’re fully aware of the difference between slumming it with hundreds of other frustrated travelers, or grabbing a nap, shower or just a nice...

View Article


Image may be NSFW.
Clik here to view.

Hacker uses fake boarding pass to get into every airline lounge for free

It sounds way too good to be true. “One Weird Trick Can Get You Into Any Airline Lounge You Want!” But as Wired reports , one ethical hacker did actually find a simple way to trick the computer...

View Article


Hackers Bring Ethics To Las Vegas

Steven Levy , who has been extensively covering the world of hackers for decades (fun fact: the first time he wrote about it, the word "hacker" didn't really mean much ), is sharing the changing...

View Article

Image may be NSFW.
Clik here to view.

Black Hat Las Vegas 2016 Observations: The Security Conundrum

On Wednesday, Dan Kaminsky delivered the opening keynote address at Black Hat. His talk was entitled, “The Hidden Architecture of our Time: “Why This Internet Worked, How We Could Lose It, and the Role...

View Article

Image may be NSFW.
Clik here to view.

这70个号码都是诈骗电话!

这70个号码都是诈骗电话! 一点号法制日报昨天 腾讯8月4日发布一份报告显示,2016年二季度,电话诈骗依旧是诈骗方式主流,骗子们二季度拨出诈骗电话18.8亿次,环比上季度增长了88%;同时,代付机票形式的网络诈骗高发;并出现"以快递赠送免费物品方式设'连环套'的新型诈骗手法”。 php?url=0E6LWmyNwK" alt="这70个号码都是诈骗电话!"...

View Article

Image may be NSFW.
Clik here to view.

2016世界黑客大会 百度安全张煜龙和韦韬入选荣誉殿堂

2016世界黑客大会 百度安全张煜龙和韦韬入选荣誉殿堂 一点号猫眼识天下2天前 美国拉斯维加斯当地时间8月3日,2016BlackHat黑帽技术大会在美国拉斯维加斯举行。来自百度安全事业部的X-lab(百度安全实验室)的张煜龙和韦韬共同入选BlackHat大会的Pebble Hall of...

View Article


$hell on Earth: From Browser to System Compromise

$hell on Earth: From Browser to System Compromise by Matt Molinyawe, Abdul-Aziz Hariri, and Jasiel Spelman. From the paper: The winning submissions to Pwn2Own 2016 provided unprecedented insight into...

View Article

Image may be NSFW.
Clik here to view.

Download guide: How to get a year of premium antivirus protection absolutely...

365 days of free premium antivirus Threats like ransomware, software vulnerabilities and theft of personal data make online security more important than ever. Free antivirus packages give you basic...

View Article


Image may be NSFW.
Clik here to view.

Resistance is futile: DARPA’s competition to automate security

At the DEF CON hacker conference in Las Vegas this week, the US Defense Advanced Research Projects Agency (DARPA)’s much-anticipated event finally took place the “world’s first all-machine hacking...

View Article

Image may be NSFW.
Clik here to view.

Tor 0.2.8.6 Is Released

The latest version of the Tor project was released this week, offering greater security and anonymity to individuals and organizations. Here's why you should care. Once upon a time, worrying about...

View Article


Image may be NSFW.
Clik here to view.

TNS Research: A Scan of the Container Vulnerability Scanner Landscape

Container registries and vulnerability scanners are often bundled together, but they are not the same thing.Code scanning mayoccur at multiple points in a container deployment workflow. Some scanners...

View Article

Image may be NSFW.
Clik here to view.

极限安全新闻播报(08.06)

摘要: 国内新闻 1、美国南卡罗来纳州大学、中国浙江大学以及中国安全厂商奇虎360相关人员组成的研究团队称他们利用无线电设备以及声光发生器成功欺骗了特斯拉自动驾驶系统的传感器并使其失效,在实验中特斯拉的车载电脑因此出现了虚警和漏警现象。(网易科技) 2、... 国内新闻...

View Article

Image may be NSFW.
Clik here to view.

Apple will finally pay hackers who discover critical software vulnerabilities

For a long while, Apple was seemingly the only top Silicon Valley company that didn’t make use of ‘bug bounty’ programs. Whereas companies likeGoogle, Microsoft and Facebook routinely doled out...

View Article
Browsing all 12749 articles
Browse latest View live