分析:对乌克兰电网的网络攻击是为了什么
分析:对乌克兰电网的网络攻击是为了什么 一点号首席安全官昨天 乌克兰遭到的两次网络攻击侧面反映了黑客对关键基础设施的攻击能力。 2015年,乌克兰发生大规模网络攻击,造成近25万户断电。该事件表明黑客有能力攻击关键基础设施。当2016年12月份乌克兰电网再次发生异常的时候,人们首先就猜测这是另一场网络攻击。最近一项调查似乎证实了这一猜测,这也提出一个问题:网络攻击对于网络安全战略而言,意味着什么。...
View Article中央情报局败给维基解密,专家称AI将改变黑客行为
斯诺登事件之后,维基解密再报猛料,3月7日,维基解密公布了据称是美国中央情报局(CIA)大范围使用的黑客工具的相关信息,其中包括针对微软windows、安卓、苹果、OSX和linux等系统及互联网路由器等对象的恶意软件。...
View Article安卓手机钓鱼软件肆虐 专家详解诈骗陷阱
2016年,各种形式的移动平台黑色产业不断浮出水面,严重危害用户手机安全。 钓鱼软件、勒索软件、色情播放器软件、顽固木马成为了去年最“流行”的恶意软件。以钓鱼软件为例,360手机卫士数据显示,仅去年第四季度,通过短信传播的钓鱼软件短信拦截量就高达约4233万条,平均每月拦截数量约1411万条。...
View ArticleTime's up for SHA-1 hash algo, but one in five websites still use it
One in five websites (21 per cent) are still using certificates signed with the vulnerable SHA-1 hash algorithm, according to a new survey. Reliance on the obsolete hashing technology leaves companies...
View ArticleHKPC urges Hong Kong enterprises to tighten privileged access to critical IT...
Twenty-five percent of those who provided shared accounts with privileged access to internal staff or external partners (31 percent) admitted to not imposing additional security measures. The Hong Kong...
View ArticleNew: Professional Hacker Certification Package drops to $59
The AAPicks team writes about things we think you’ll like, and we may see a share of revenue from any purchases made through affiliate links. The Vizual Coaching Academy has put a temporary price drop...
View ArticleFighting attackers in the era of data jacking
In this podcast recorded atRSA Conference 2017, Zohar Alon, CEO at Dome9 Security , talks about how attackers can compromise systems with valuable data that are either on-prem or in the cloud, how...
View ArticleWikiLeaks Vault 7: what you need to know about the alleged CIA hacking
Surprise, everyone, the US Central Intelligence Agency (CIA) allegedly has the means to hack everyday electronics. The revelation comes from WikiLeaks, which has released thousands of purported CIA...
View ArticleUS senator probes into CloudPets smart toy hack
A U.S. senator is probing reports of a breach of data from smart toys from Spiral Toys, writing to the company’s CEO a letter with ten questions about the issue, including about the company’s security...
View ArticleAlphabet's Nest Working on Cheaper Thermostat, Home Security System
Alphabet Inc.'s Nest, seekinga bigger share of the connected home market, is developing a cheaper version of its flagship thermostat and new home security products, according to a person familiar with...
View ArticleApple Says ‘Many’ Vulnerabilities in Today’s Leaked CIA Documents Have Alread...
Various documents leaked by WikiLeaks from earlier today indicated that the CIA has a dedicated unit to bypass the various security measures that Apple employs on iOS. The team usually relies on some...
View Article如何在linux下限制各种资源
pam_limits 限制用户 查看vim /etc/pam.d/system-auth 我们就知道session 部分 sessionrequiredpam_limits.so 这样的话我们就可以通过控制pam_limits.so相关的规则来控制用户 /etc/security/limits.conf /etc/security/limits.d/*conf 限制cpu...
View Article【技术分享】黑客攻击的7个阶段
【技术分享】黑客攻击的7个阶段 2017-03-09 10:12:11 来源:countuponsecurity.com 作者:pwn_361 阅读:429次 点赞(0) 收藏 翻译:pwn_361 预估稿费:200RMB 投稿方式:发送邮件至linwei#360.cn,或登陆网页版在线投稿 前言...
View ArticleNest is supposedly developing a brand new security system and more affordable...
Our smartphones are incredible tools. They allow us to communicate with friends and family members, capture memories with high-quality cameras, play endless hours of video games, and control our entire...
View ArticleTrump budget borrows from Coast Guard, TSA, to pay for wall
Draft documents of the White House budget request indicate that President Trump intends to follow through on his campaign vows to build a wall on the border ofthe United States and Mexico. But that...
View Article92 per cent of US government websites suck, says report
A new report into nearly 300 websites run by the US government has reached an unsurprising conclusion: they suck. What may be startling, however, is just how much they suck. According to the...
View ArticleResearchers Find Multiple Critical Flaws In Confide Secure Messaging App
All flaws have been fixed, says maker of app purportedly used for secret communications by political operatives in DC. Confide, a messaging app that has seen big growth recently following reports of...
View ArticleChasing the Storm
In this blog, we’ll discuss new tactics used in Hailstorm campaigns. Thesenew tactics includeinfecting systems with a trojan for sending out spam, and leveraging a single systemfor hosting a large...
View ArticlePractical Packet Analysis 3rd Edition Released!
Ten years after releasing the first edition of Practical Packet Analysis, the third edition is finishedand has beenreleased! It’s hard to believe it’s been so long. So far, existing editions have sold...
View ArticleParrot Security OS 3.5 Ethical Hacking Distro Brings Cryptkeeper, Kernel 4.9.13
The developers of the Debian-based Parrot Security OS distribution have announced today, March 8, 2017, the general availability of version 3.5 of the ethical hacking and penetration testing oriented...
View Article