Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How the EFF was pushed to rethink its Secure Messaging Scorecard

As good as the idea behind Electronic Frontier Foundation’s Secure Messaging Scorecard is, its initial version left much to be desired. The ideawas to provide a guideline for users of communication...

View Article


Image may be NSFW.
Clik here to view.

Predictive risk technology helps fight phishing

Phishing attacksare on the increase and are becoming increasingly sophisticated.This means that older technologies such as blacklisting known phishing sites are struggling to keep up with the threat....

View Article


Image may be NSFW.
Clik here to view.

How well does social engineering work? One test returned 150%

White hat hackers see companies at their worst. It is, after all, their job to expose weaknesses. Network World Editor in Chief John Dix recently chatted with penetration testing expert Josh Berry,...

View Article

Image may be NSFW.
Clik here to view.

Upcoming O’Reilly Conferences with 20% Discount! (Sponsored)

O'Reilly has a few amazing conferences popping up in the short term that I'm excited to share. I also have an awesome discount code, PC20DWALSH , to save you 20% on conference fee! Velocity (DevOps...

View Article

Bloodhound Pen-test Tool Daily Security Byte

Penetration testers (pen-testers) have long exploited various windows authentication issues ( pass the hash , Mimkatz , etc.) to elevate their privileges, and laterally move in a Windows network. In...

View Article


Image may be NSFW.
Clik here to view.

An ATM hack and a PIN-pad hack show chip cards aren’t impervious to fraud

Security researchers are eager to poke holes in the chip-embedded credit and debit cards that have arrived in Americans' mailboxes over the last year and a half. Although the cards have been in use for...

View Article

Image may be NSFW.
Clik here to view.

How Hackers Plan Attacks and Hide Their Tracks

Oftentimes, priority no. 1 for a hacker preparing to launch a cyberattack is finding a suitable launchpad. The goal: to obfuscate the origin of an attack. To mask themselves, attackers generally...

View Article

Image may be NSFW.
Clik here to view.

Meet DDoSCoin, the cryptocurrency that pays when you p0wn

A curious proof-of-work project built on cryptocurrency has emerged that offers a means to prove participation in distributed denial of service (DDoS) attacks. University of Colorado assistant...

View Article


Image may be NSFW.
Clik here to view.

Canada security questioned after FBI tip thwarts attack

View photos A police photograph of a of taxi is projected on a screen during a news conference about Aaron Driver, a Canadian man killed by police on Wednesday who had indicated he planned to carry...

View Article


Image may be NSFW.
Clik here to view.

STICH: Inexpensive Coordinated GSM Anomaly Detection

Today's "interesting resin.io use case" is coming to you fresh from DEF CON 24 , which just finished last weekened). If you haven't heard about it yet, DEF CON is the biggest annual hacker convention,...

View Article

Image may be NSFW.
Clik here to view.

拒绝勒索! 英特尔与卡巴斯基联合推出反勒索软件网站

电脑上所有东西――文件、相片、视频,统统被黑客锁定,不给钱就不解锁,让你永远打不开!而原因仅仅是你打开了不该打开的邮件附件,或者点击了不该点击的链接。是不是很恼火?但这确实是勒索软件受害者所面临的噩梦场景。这种勒索软件可以悄悄加密电脑上的文件,只有攻击者持有的数字密钥才可以解锁。...

View Article

Image may be NSFW.
Clik here to view.

New air-gap jumper covertly transmits data in hard-drive sounds

Researchers have devised a new way to siphon data out of an infected computer even when it has been physically disconnected from the Internet to prevent the leakage of sensitive information it stores....

View Article

Image may be NSFW.
Clik here to view.

2699元商务旗舰金立M6,超级续航+安全很过硬

2699元商务旗舰金立M6,超级续航+安全很过硬 一点号GAKO科技评昨天 金立作为知名国产手机厂商,在去年发布了金立M5和金立M5和金立M5...

View Article


Image may be NSFW.
Clik here to view.

金立 M6 手机深度体验:安全为首

金立 M6 手机深度体验:安全为首 昨天来源:数字尾巴 『内置安全加密芯片』,这句广告语已经传遍了大江南北,金立希望这句话成为人们记住的另一句热门广告语,但金立能否仅靠广告语复制这种成功呢?还是说这部内置安全加密芯片的 M6 的确有自己不一样的亮眼卖点呢? 外形|金色即商务?金色包裹下的 M6...

View Article

Image may be NSFW.
Clik here to view.

Financial malware attacks increase as malware creators join forces

Kaspersky Lab blocked 1,132,031 financial malware attacks on users, a rise of 15.6 percent compared to the previous quarter, according to the results of the company’s IT threat evolution report for Q2....

View Article


Image may be NSFW.
Clik here to view.

老司机也吓够呛 1亿辆大众汽车无线钥匙恐被黑

腾讯数码讯(佳和)2013年,伯明翰大学计算机专家拉维奥加西亚(Flavio Garcia)与一个研究团队合作,准备披露一个漏洞,通过这个漏洞研究人员可以控制大众汽车――几百万辆大众汽车全都有漏洞,不需要钥匙就可以开走汽车,他们的举动招来诉讼,无奈之下,研究团队只好推迟公布结果,一推就是2年。 自动播放 搞机番外篇:土豪钟文泽说要马上买的Model X究竟是辆什么车? 正在加载......

View Article

Image may be NSFW.
Clik here to view.

Visualizing multiple dimensions of Google Analytics in R

(This article was first published on Tatvic Blog R , and kindly contributed toR-bloggers) Stack bar chart It is used when we wish to visualize a combination of categorical variables ggplot(data,...

View Article


台媒:世界反禁药组织遭黑客锁定 资料库未受损

台媒称,美联社报道,世界反禁药组织(WADA)遭黑客锁定,日前有不明人士数度尝试入侵线上资料库。该资料库长期追踪选手体能状态,检测是否服用禁药。 据台湾联合新闻网8月12日报道,WADA表示,本周、亦即奥运期间得知资料库遭锁定,不过还不确定明确入侵时间为何。 WADA公关专员杜兰德(Maggie...

View Article

Image may be NSFW.
Clik here to view.

The economic impact of security incidents on critical information...

Cyber security incidents affecting CIIs (Critical Information Infrastructures) are considered nowadays global risks that can have significant negative impact for several countries or industries within...

View Article

Image may be NSFW.
Clik here to view.

ISACA挑战安全观 手机支付比传统支付更安全

ISACA挑战安全观 手机支付比传统支付更安全 昨天来源:安全牛网 全球知名IT协会ISACA的一份新研究指出:手机支付安全技术的进步,在控制风险和提高消费者信任上,正将传统塑料制支付卡远远抛在身后。 php?url=0E9WwKgNQ8" alt="ISACA挑战安全观 手机支付比传统支付更安全" />无论消费者还是商家,都能从手机支付中受益。...

View Article
Browsing all 12749 articles
Browse latest View live