Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Extending the Edge: New Thinking on Data Security

Security, like most aspects of IT infrastructure, has historically been a siloed function. Focused on protecting data, applications, network connections, and with the advent of BYOD (bring your own...

View Article


Image may be NSFW.
Clik here to view.

Learning About the 5 Levels of Open Source Security at Black Hat

At Black Hat 2016 I had the pleasure of attending a briefing presented by Jake Kouns of Risk Based Security and Christine Gadsby of Blackberry. Their presentation titled:“ OSS Security Maturity: Time...

View Article


Image may be NSFW.
Clik here to view.

BIT9 PathNames

We live in a day and age when security (data, network, server, etc) is seemingly at the forefront of the daily news. In our quest to improve security we seemingly always find more and more products...

View Article

Image may be NSFW.
Clik here to view.

One of the biggest threats to the Rio Olympics will come from the internet

A Brazil fan uses her phone before the 2014 World Cup Group A soccer match between Cameroon and Brazil at the Brasilia national stadium in Brasilia, June 23, 2014. REUTERS/Dominic Ebenbichler The...

View Article

Image may be NSFW.
Clik here to view.

Blackhat2016第二天部分精彩议题介绍(含PPT下载)

Blackhat2016第二天部分精彩议题介绍(含PPT下载) 2016-08-07 23:20:57 来源:360安全播报 作者:360安全播报 阅读:587次 点赞(0) 收藏 分享到: blackhat usa 2016第二天的议题 想下载PPT的来这里 https://www.blackhat.com/us-16/briefings.html 议题:windows 10 MITIGATION...

View Article


电信诈骗致损逾29.9亿元 谎称代付机票成网络诈骗主流

电信诈骗致损逾29.9亿元 谎称代付机票成网络诈骗主流 3天前来源:环球网 8月4日上午,公安部打击治理电信网络犯罪防控中心成立仪式暨麒麟反“伪”行动发布会在北京召开。...

View Article

Image may be NSFW.
Clik here to view.

福布斯都说金立M6好 手机安全成国内外共识

福布斯都说金立M6好 手机安全成国内外共识 一点号机客出发昨天 最近国产手机中的一款新机惊动了美国《福布斯》商业杂志,近年来国产手机登上国际杂志很多是因为在海外的专利战,但这一次《福布斯》点名表扬国内手机厂商却比较罕见。获得这项殊荣的就是上月发布会的金立M6手机。众所周知,这次金立M6系列手机主打手机安全加密,看来手机安全是不分国界的。 《福布斯》文章中开头是这么写到:...

View Article

Image may be NSFW.
Clik here to view.

港媒:黑客小组网攻中俄5年 有中国航空公司中招

港媒:黑客小组网攻中俄5年 有中国航空公司中招 4小时前来源:凤凰网 php?url=0E8ZWRrl3b" alt="港媒:黑客小组网攻中俄5年 有中国航空公司中招" /> 中国网络曾遭黑客攻击。(图片来源:香港《经济日报》网站) 参考消息网8月11日报道...

View Article


Image may be NSFW.
Clik here to view.

August security update starts hitting Samsung Galaxy S6 edge

The Samsung Galaxy S6 edge has started receiving Android security update for August. Weighing in at 63MB, the update - which is currently hitting units in India - bumps the firmware version to...

View Article


Image may be NSFW.
Clik here to view.

Apple says it won't let banks use the contactless payment tech in iPhones for...

A customer makes a purchase with a MasterCard using Apple Pay on the iPhone 6. AP Apple really doesn't want to let anyone else use its contactless payment technology. Modern iPhones come bundled with...

View Article

Image may be NSFW.
Clik here to view.

Smart sex toy is oh so dumb when it comes to security

Are you familiar with the field of teledildonics? Do you own an internet-enabled “intimate personal massager”? Do you even know what I’m talking about? The truth is that most of us keep our lips sealed...

View Article

Image may be NSFW.
Clik here to view.

Unlocked Galaxy S6 Edge Gets August Security Update In India

Samsung may have unveiled the Galaxy Note 7 last week, but that doesn’t mean the company isn’t willing to support its older handsets. TheGalaxy S6 Edge, which was launched last year, is now reportedly...

View Article

Image may be NSFW.
Clik here to view.

Security Think Tank: Forget Brexit, use GDPR to foster customer relationships

Following the Brexit vote in the UK’s referendum on European Union (EU) membership , we now know that it is going to take many years potentially to fully extract ourselves from the EU. So in the first...

View Article


How to Make the Most Effective Use of a Multi-Tiered Security Model

Introduction Overview of the Last Article Our last article reviewed what a Biometrics in the Cloud infrastructure would like. Essentially, this involves placing the entire Biometric system into the...

View Article

Image may be NSFW.
Clik here to view.

Continuous Security for Rails apps with Pipeline and Brakeman

This is a guest post byR. Tyler Croy, who is a long-time contributor to Jenkins and the primary contact for Jenkins project infrastructure. He is also a Jenkins Evangelist at CloudBees, Inc. When the...

View Article


Backdoor CTF 2013: 杂项 75

0x00 题目 H4x0r曾在他的博客上说道,“时间最终赶上了每个人,除了H4x0r。如果你能挑战我!” 来吧: 时光穿梭门 0x01 解题 打开传送门之后,题目要求在3秒内提交前N(比如:30个)素数的和。 第一种方法的算法思想就是简单的素数判断方法 import re import httplib import urllib, urllib2, cookielib def...

View Article

Microsoft unlocks the backdoor with Secure Boot blunder

A blunder by Microsoft has resulted in the company accidentally leaking skeleton keys that unlock windows-powered tablets, phones, and other devices which are sealed by Secure Boot. At the centre of...

View Article


Image may be NSFW.
Clik here to view.

Hackers can remotely activate your smart vibrator and find out how often you...

So much has been written about the dangers of the Internet of Things. In just the past couple of weeks, we’ve reported a pet feeder that starved dogs because its servers went offline, a thermostat...

View Article

Image may be NSFW.
Clik here to view.

BlackBerry DTEK50 review: Pushing the security narrative

It’s usually not a coincidence when a company goes back to its roots, which is hardly a surprise in BlackBerry’s case. Even amidst its current malaise, BlackBerry’s image is still centered around...

View Article

Image may be NSFW.
Clik here to view.

In the Crosshairs: Six Cyber Security Threats Gunning for Your Online Business

In today’s hyper-connected world, nearly all businesses, regardless of size or industry, have some element of their operations based online. From the largest online retailers and financial service...

View Article
Browsing all 12749 articles
Browse latest View live