Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Cheating scandal forces ACT shakeup

Getty Images According to Reuters , ACT, Inc will audit education centers and lay off its head of security after the publication detailed cheating scandals. The ACT is a popular college entrance exam...

View Article



Image may be NSFW.
Clik here to view.

Why haven't we seen the smartphone security apocalypse in iPhone and Android...

Image: iStockphoto.com/Julia_Sudnitskaya Finally, the mobile security apocalypse is upon us. A recent BBC headline warned: "Android bug fear in 900 million phones." For those of us who lived through...

View Article

Apple launches blistering attack on Aussie banks; says demand for NFC access...

“Apple has launched a blistering attack on three of Australia’s big banks, saying their request to collectively negotiate over digital wallet access to the iPhone will compromise the handset’s...

View Article

IDG Contributor Network: Reach 'em and teach 'em--educating developers on...

How are developers supposed to build security throughout the development lifecycle if they are not taught security at any stage of their education? Vulnerabilities exist because products made by...

View Article

Linux on Windows 10 Poses a Security Risk

As the instances of linux virtual machines are increasing on Microsoft Azure, Microsoft is looking at Linux as a development platform. To enable sysadmins and developers to manage their Linux machines...

View Article


Advanced Threat Hunting: Are You The Hunter Or The Hunted?

Make proactive threat hunting a standard part of your security best practices and not just an element of incident-response measures. In my travels over the last six months, meeting with customers...

View Article

Image may be NSFW.
Clik here to view.

Security pros split on government access to cloud data, survey shows

Information security professionals are split over whether cloud suppliers should co-operate with governments by providing access to encrypted data, a survey has revealed. More than one-third of those...

View Article

Image may be NSFW.
Clik here to view.

自家WiFi也不安全!五招教你对蹭网“黑手”Say no

自家WiFi也不安全!五招教你对蹭网“黑手”Say no 一点号今日网事昨天 WiFi是什么? 是无线宽带 它无形无色无味…… (好像并不会有味道) 黑客是什么? 是顶尖电脑高手 他同样无影无踪神秘不可测…… 当黑客盯上你家WiFi,你家那简单可笑的密码对他们来说只是一层薄薄的防护栏,只需花费一杯咖啡的时间,黑客们就能轻松破解。 php?url=0E9B5n4fmY"...

View Article


Image may be NSFW.
Clik here to view.

Imperva under pressure to find buyer after disappointing results

An activist investor is reportedly pushing data centre security firm Imperva to find a buyer following disappointing financial results. Cisco Systems, IBM, Raytheon or Symantec are touted as potential...

View Article


Image may be NSFW.
Clik here to view.

Launch a six-figure career in white hat hacking with these 7 courses, for the...

Security breaches are happening every day, and they’re increasing in severity. Considering this, it’s no wonder companies are hiring white hat hackers at an unstoppable rate. White hat hacking, or the...

View Article

Image may be NSFW.
Clik here to view.

Over half of security pros say cloud vendors shouldn't give governments data...

There are a number of concerns that companies have over migrating to the cloud, but one of the key ones is who else might have access to the data. Cloud security company Bitglass has released the...

View Article

Image may be NSFW.
Clik here to view.

Container Defense in Depth

The three layers of a container environment. Containers/Images Working from the center, we begin with the container images themselves. Container images are made up of: Operating System Binaries...

View Article

Image may be NSFW.
Clik here to view.

Your Smartwatch May Leave You Vulnerable to Security Threats

How much would you pay someone to count your steps? To follow you wherever you went and tell you how many calories you were burning, even while you slept? Unless you’re willing to empty your bank...

View Article


Image may be NSFW.
Clik here to view.

A BLACK PATH TOWARD THE SUN - HTTP Tunnel 工具简介

A BLACK PATH TOWARD THE SUN - HTTP Tunnel 工具简介 2016-08-12 10:35:57 来源:同程安全应急响应中心 作者:YSRC阅读:239次 点赞(0) 收藏分享到:Part One - 简介 NCC Group作为老牌的代码安全审计机构,在OpenSSL...

View Article

Image may be NSFW.
Clik here to view.

如何在暗网中收集公开情报资源(下集)-Python+Shodan+SSH密钥

如何在暗网中收集公开情报资源(下集)-python+Shodan+SSH密钥 2016-08-12 10:33:41 来源:安全客 作者:Mickeyyyyy阅读:54次 点赞(0) 收藏分享到:文章结构 一、前情提要 二、继续我们的旅程 三、Shodan搜索引擎和SSH密钥指纹 四、运行结果 五、总结 六、参考链接 (一)、前情提要...

View Article


Image may be NSFW.
Clik here to view.

凌乱!智能性爱玩具被黑客盯上:这是性侵犯

凌乱!智能性爱玩具被黑客盯上:这是性侵犯 2小时前来源:快科技 计算机安全专家警告称,由于新一代性玩具可以联网,它们变得不再安全,可能被黑客远程控制。入侵联网性玩具是计算机安全专家需要面临的全新挑战,这攸关个人的最亲密时刻。专家们称,如果性玩具遭黑客袭击,可能被视为性侵犯。 计算机安全研究人员对新式性玩具We-Vibe 4...

View Article

泉州出现新型网络诈骗卡在身上却被告知钱被扣了

泉州出现新型网络诈骗卡在身上却被告知钱被扣了 2小时前来源:人民网 卡在身上,没有收到短信验证,也没有到柜台转账,却收到银行短信称银行卡里的钱凭白无故被扣了52000元。近日,南安的杨先生遇到这令他纳闷的事情,迅速向南安市公安局官桥派出所报案。...

View Article


WP8.1 RSA 加解密实例(导入公钥私钥)

因项目上需要用到,之前在WP8.0的环境上调试通过,现在在开发8.1时发现已不支持原来的加密库,所以无法使用以前的方法,不得已,去寻找windows命名空间下RSA的加解密方法,经过几天的尝试,将解决方案贴出来,看能否帮助碰到如此类型的问题的同学. 本示例的应且场景,服务器端返回RSA的公钥私钥,客户端导入公钥及私钥 服务端:...

View Article

Image may be NSFW.
Clik here to view.

高度可定制化的远程访问木马“Remvio”,仅售58美金

赛门铁克公司的安全研究专家透露,名为“z3r0”的恶意软件作者(意大利籍)目前正在向外界出售一款远程访问木马。据悉,该木马的出售价格仅为58美金(约合人民币386元)。 按照授权协议收费...

View Article

Image may be NSFW.
Clik here to view.

打印 上一主题 下一主题 为什么黑客那么挣钱,原因就在此

有朋友在群里问黑客如何学习?这个题目也是一个可大可小的问题,因为黑客编程没有一个死的界限。不是说到什么级别就算或者不算,同样是属于黑客技术,也有简单和复杂之分。 总体来说,要成为较为资深的黑客编程者,你需要掌握以下一些必不可少的编程技术知识: 1,C、C++编程 作...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images