Extending the Edge: New Thinking on Data Security
Security, like most aspects of IT infrastructure, has historically been a siloed function. Focused on protecting data, applications, network connections, and with the advent of BYOD (bring your own...
View ArticleLearning About the 5 Levels of Open Source Security at Black Hat
At Black Hat 2016 I had the pleasure of attending a briefing presented by Jake Kouns of Risk Based Security and Christine Gadsby of Blackberry. Their presentation titled:“ OSS Security Maturity: Time...
View ArticleBIT9 PathNames
We live in a day and age when security (data, network, server, etc) is seemingly at the forefront of the daily news. In our quest to improve security we seemingly always find more and more products...
View ArticleOne of the biggest threats to the Rio Olympics will come from the internet
A Brazil fan uses her phone before the 2014 World Cup Group A soccer match between Cameroon and Brazil at the Brasilia national stadium in Brasilia, June 23, 2014. REUTERS/Dominic Ebenbichler The...
View ArticleBlackhat2016第二天部分精彩议题介绍(含PPT下载)
Blackhat2016第二天部分精彩议题介绍(含PPT下载) 2016-08-07 23:20:57 来源:360安全播报 作者:360安全播报 阅读:587次 点赞(0) 收藏 分享到: blackhat usa 2016第二天的议题 想下载PPT的来这里 https://www.blackhat.com/us-16/briefings.html 议题:windows 10 MITIGATION...
View Article电信诈骗致损逾29.9亿元 谎称代付机票成网络诈骗主流
电信诈骗致损逾29.9亿元 谎称代付机票成网络诈骗主流 3天前来源:环球网 8月4日上午,公安部打击治理电信网络犯罪防控中心成立仪式暨麒麟反“伪”行动发布会在北京召开。...
View Article福布斯都说金立M6好 手机安全成国内外共识
福布斯都说金立M6好 手机安全成国内外共识 一点号机客出发昨天 最近国产手机中的一款新机惊动了美国《福布斯》商业杂志,近年来国产手机登上国际杂志很多是因为在海外的专利战,但这一次《福布斯》点名表扬国内手机厂商却比较罕见。获得这项殊荣的就是上月发布会的金立M6手机。众所周知,这次金立M6系列手机主打手机安全加密,看来手机安全是不分国界的。 《福布斯》文章中开头是这么写到:...
View Article港媒:黑客小组网攻中俄5年 有中国航空公司中招
港媒:黑客小组网攻中俄5年 有中国航空公司中招 4小时前来源:凤凰网 php?url=0E8ZWRrl3b" alt="港媒:黑客小组网攻中俄5年 有中国航空公司中招" /> 中国网络曾遭黑客攻击。(图片来源:香港《经济日报》网站) 参考消息网8月11日报道...
View ArticleAugust security update starts hitting Samsung Galaxy S6 edge
The Samsung Galaxy S6 edge has started receiving Android security update for August. Weighing in at 63MB, the update - which is currently hitting units in India - bumps the firmware version to...
View ArticleApple says it won't let banks use the contactless payment tech in iPhones for...
A customer makes a purchase with a MasterCard using Apple Pay on the iPhone 6. AP Apple really doesn't want to let anyone else use its contactless payment technology. Modern iPhones come bundled with...
View ArticleSmart sex toy is oh so dumb when it comes to security
Are you familiar with the field of teledildonics? Do you own an internet-enabled “intimate personal massager”? Do you even know what I’m talking about? The truth is that most of us keep our lips sealed...
View ArticleUnlocked Galaxy S6 Edge Gets August Security Update In India
Samsung may have unveiled the Galaxy Note 7 last week, but that doesn’t mean the company isn’t willing to support its older handsets. TheGalaxy S6 Edge, which was launched last year, is now reportedly...
View ArticleSecurity Think Tank: Forget Brexit, use GDPR to foster customer relationships
Following the Brexit vote in the UK’s referendum on European Union (EU) membership , we now know that it is going to take many years potentially to fully extract ourselves from the EU. So in the first...
View ArticleHow to Make the Most Effective Use of a Multi-Tiered Security Model
Introduction Overview of the Last Article Our last article reviewed what a Biometrics in the Cloud infrastructure would like. Essentially, this involves placing the entire Biometric system into the...
View ArticleContinuous Security for Rails apps with Pipeline and Brakeman
This is a guest post byR. Tyler Croy, who is a long-time contributor to Jenkins and the primary contact for Jenkins project infrastructure. He is also a Jenkins Evangelist at CloudBees, Inc. When the...
View ArticleBackdoor CTF 2013: 杂项 75
0x00 题目 H4x0r曾在他的博客上说道,“时间最终赶上了每个人,除了H4x0r。如果你能挑战我!” 来吧: 时光穿梭门 0x01 解题 打开传送门之后,题目要求在3秒内提交前N(比如:30个)素数的和。 第一种方法的算法思想就是简单的素数判断方法 import re import httplib import urllib, urllib2, cookielib def...
View ArticleMicrosoft unlocks the backdoor with Secure Boot blunder
A blunder by Microsoft has resulted in the company accidentally leaking skeleton keys that unlock windows-powered tablets, phones, and other devices which are sealed by Secure Boot. At the centre of...
View ArticleHackers can remotely activate your smart vibrator and find out how often you...
So much has been written about the dangers of the Internet of Things. In just the past couple of weeks, we’ve reported a pet feeder that starved dogs because its servers went offline, a thermostat...
View ArticleBlackBerry DTEK50 review: Pushing the security narrative
It’s usually not a coincidence when a company goes back to its roots, which is hardly a surprise in BlackBerry’s case. Even amidst its current malaise, BlackBerry’s image is still centered around...
View ArticleIn the Crosshairs: Six Cyber Security Threats Gunning for Your Online Business
In today’s hyper-connected world, nearly all businesses, regardless of size or industry, have some element of their operations based online. From the largest online retailers and financial service...
View Article