人脸识别支付就更安全吗?支付宝和百度面对央视曝光这样回应
人脸识别支付就更安全吗?支付宝和百度面对央视曝光这样回应 2天前来源:第一财经 3月15日晚间举行的央视315晚会曝光了人脸识别技术的安全漏洞,在现场的测试中,可以使用软件后期修改人脸图片进行脸部识别,从而绕过网络实名认证系统。随后,支付宝和百度纷纷对此作出回应。 支付宝针对央视315晚会曝光的人脸识别漏洞发表声明称,支付宝只对在当前手机上用密码登录成功过的用户才开放人脸登录。...
View Article补天白帽大会月底举行 聚焦网络安全五大热点
补天白帽大会月底举行 聚焦网络安全五大热点 一点号360企业安全3天前 据悉,3月30日,补天白帽大会将在深圳开幕。本次大会由中国最大的漏洞检测与响应平台“补天”主办,国内外知名白帽、技术精英、安全爱好者、网络安全相关主管机构和知名企业的CISO齐聚一堂,共同解读当前网络安全形势和安全威胁,探讨漏洞响应与防范方案,分享交流漏洞挖掘与安全攻防等前沿议题。 php?url=0Frlmn8ZPV"...
View Article马云:支付宝可以租苹果手机但要先满足这个条件,安全更要第一!
马云:支付宝可以租苹果手机但要先满足这个条件,安全更要第一! 一点号探物科技3天前 今日支付宝成功上线一个全新功能叫趣先享,在这个功能里,用户可以租iPhone7以上型号的苹果手机,每个租赁期为一月,最低一月249元,更新型号的苹果手机租金会水涨船高,最贵的iPhone 7Plus 128G月租是339元。 php?url=0FsIWoq13w"...
View Article黑市公开售卖雅虎用户数据, 黑客攻击事件俄罗斯成主角!
黑市公开售卖雅虎用户数据, 黑客攻击事件俄罗斯成主角! 一点号天眼科技2天前 php?url=0FsJW8LkKk" alt="黑市公开售卖雅虎用户数据, 黑客攻击事件俄罗斯成主角!" />雅虎受到的攻击是美国有史以来处理过的最大规模黑客事件,按照雅虎先前知情高管估计,潜在的被盗账户规模可能在10亿到30亿之间,远远不止雅虎所对外公布的5亿!...
View Article【信息化时代】黑客们到底能用多么不可思议的方式窃取你的隐私
【信息化时代】黑客们到底能用多么不可思议的方式窃取你的隐私 一点号电子物证6小时前 php?url=0FszilZ0Qg" alt="【信息化时代】黑客们到底能用多么不可思议的方式窃取你的隐私" />授权转发! 近年来,大规模的网络安全事件频频发生: 2014 年 11 月,黑客组织“和平卫士”(Guardians of...
View Article称霸世界顶级黑客大赛!中国战队黑科技让外国人直呼大长见识
称霸世界顶级黑客大赛!中国战队黑科技让外国人直呼大长见识 一点号科学的fan1小时前 php?url=0Ft22TRYRU" alt="称霸世界顶级黑客大赛!中国战队黑科技让外国人直呼大长见识" />当地时间3月15日,Pwn2Own 2017世界黑客大赛在温哥华开幕。根据最新出炉的结果,中国 360 安全战队获得了第一个项目的冠军,也以总积分 63...
View Article比顶级黑客还厉害?360夺得2017世界黑客大赛总冠军
比顶级黑客还厉害?360夺得2017世界黑客大赛总冠军 一点号虎龙吟6小时前 作者:虎龙吟 最新消息,北京时间3月18日,在加拿大进行的“Pwn2Own 2017世界黑客大赛”上,由360公司组建的安全战队成功实现对Edge、Win10和VMware虚拟机的连环破解,最终以63分的成绩荣获大赛“Master of Pwn”(世界破解大师)总冠军。 php?url=0FsxUSMBdh"...
View Article美司法部揭秘俄黑客窃取雅虎5亿帐户资料全过程
BI中文站 3月16日报道 美国司法部周三表示,俄罗斯间谍和黑客联手侵入了成千上万个 雅虎 用户帐户。 这次泄密事件牵连到超过5亿的雅虎帐户,它也因此成为史上最大规模的黑客攻击事件。 黑客们是如何做到的?...
View Article雅虎5亿账户泄露案真相谍影重重:2名俄罗斯特工+2名黑客
去年雅虎接连曝出多个超大规模数据泄露事件,长期关注CodeSec的你们一定都知道,5亿、10亿账户信息泄露的,除了雅虎也没谁了。就在这两天,5亿账户泄露的真相似乎正在浮出水面。 事件回顾 我们今天要讲的就是这桩5亿信息泄露案的后续。首先简要回顾一下这起泄露事件。感兴趣的同学可以去看当时CodeSec上的详细报道。 最新进展...
View ArticleFix “Conflicting files: ca-certificates-utils:...
Today, I got this error “Failed to commit transaction Conflicting files: ca-certificates-utils: /etc/ssl/certs/ca-certificates.crt already exists in filesystem”while attempting to upgrade my Arch linux...
View ArticleNJCTF Web题解
注册的时候,用户名可以用空格截断注册一个admin [很多空格]12345 ,密码aasdewdwqff然后,登陆admin ,密码aasdewdwqff 就能拿到admin权限,这里是绕过varchar的限制 可以参考这篇文章: http://www.CodeSec.Net/articles/web/124537.html 注:必须是sql_mode为宽松模式时 Come on...
View ArticleNew Security Updates Hit Galaxy A7 & Sprint’s Galaxy S5
After rolling out the March Security Update toat least four of its smartphones and tablets over the past week, Samsung has now started to push the February security patch to the unlocked version of...
View ArticleEthical hacking: should you pay a white hat to break in?
Naked Security is reporting this week from Cloud Expo , Europe’s biggest digital transformation show In a bijou booth at London’s CloudExpo, BlackBerry, the much-diminished former behemoth of the...
View ArticleAn under-appreciated threat to your privacy: Security software
InterviewThe very software that is supposed to protect your security is an under-appreciated threat to privacy because of the massive amount of data many products secretly gather on customers,...
View ArticleGetting Developers to Care More About Security
Security, it’s a topic that’s become near and dear to my heart as a software developer. But that doesn’t mean that every developer shares my perspective. What’s more, we’re a funny breed. Despite being...
View ArticleGraham Cluley named Best IT Security blog at SysAdmin blog awards
This humble little website is honoured to announce that despite being up against some stiff competition, it has been named "Best IT Security blog" at the 2017 SysAdmin Blog Awards. "The goal of the...
View ArticleYou Don't Really Need an Anti-Virus App Anymore
Image: Shutterstock Ten years ago the first thing you needed to load on a brand new computer were anti-virus and malware applications. The internet was a mine field of malicious content that could...
View ArticleEmbrace the Machine & Other Goals for CISOs
Here are five ways we can become more effective for our organizations. Depending on how you look at it, the past year was either tough for security professionals or it showed the world how complex and...
View Article2017: the year when identity and access management is placed at the heart of...
The rise of ‘digital business’ isn’t merely a passing trend. Its development over the past few years in transforming all aspects of how organisations operate internally, as well as cooperate and...
View Article