Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

警惕Ubuntu APT源污染

作者: Saviour 这个APT源污染,需要同步下载大量的源服务器文件,我下完之后大约220多G。 系统:Ubuntu 16.04 LTS 硬盘:500G 软件:apt-mirror 路径:/service/ubuntu/mirror 木马:sudo apt-get install slurm 第一个阶段:...

View Article



Image may be NSFW.
Clik here to view.

技术详解ASICBoost专利门及比特币打包挖矿原理

前言:近期“ASICBoost专利门”事件轰动整个币圈,并且影响比特币的未来。整个专利技术涉及比特币打包挖矿的低层,可能较少有人能弄懂。本文在参考大量文献后,尝试以通俗易懂的方式,介绍整个挖矿技术知识。任何支持判断要基于技术进行客观判断,会比基于一些人的主观言论判断要靠谱很多。 第一篇、哈希算法HASH...

View Article

Image may be NSFW.
Clik here to view.

手机盗销“黑产”调查:黑客攻击离我们并不远

南京北安门街便衣民警逮着了2个偷手机的小偷。(图/CFP) 《财经》新媒体 王玮 高素英/文 正听着音乐,忽然就没有了声音,一摸口袋手机不见了踪影,回头四望早已是茫茫人海,根本就不知道谁偷走了手机……这样的场景几乎每天都在不同城市里上演。不到一个月的时间,《财经》新媒体记者身边就有四位朋友有过类似的遭遇。然而手机被偷背后,不仅是财产的丢失,更重要的是信息安全,一旦泄露后果不堪设想。...

View Article

Image may be NSFW.
Clik here to view.

安全报告:1/5 的外部数据泄露事件涉及政府背景(附下载)

最近,威瑞森电信公司(Verizon)又发布了一年一度的《2017年的数据泄露调查报告》,对以往的的安全事件和数据泄露进行了分析。威瑞森是美国著名的通信公司,相当于美国版的“中国移动”,收购雅虎的就是这家公司。 每年他们都会发布一份具有相当高参考意义的数据泄露报告,今年也不例外。 2017...

View Article

Image may be NSFW.
Clik here to view.

探秘 | 比朝鲜核武器更炸裂更神秘的,是黑客部队

本文作者:谢幺 ,雷锋网网络安全作者。 最致命的可能是张牙舞爪的猛兽,也可能是脚边悄然无声的蛇蝎。 前不久朝鲜大核搞核试验的消息闹得沸沸扬扬,却没有太多人关注另一则新闻: 2017年4月底韩国媒体称,网络安全公司赛门铁克发布了一个报告, 估测朝鲜网络攻击集团对世界多国银行发动了攻击,窃取资金超过一千亿韩元(折合人民币6.13亿元) 。 除此之外,...

View Article


Image may be NSFW.
Clik here to view.

What?机器人会成为安全黑洞?―― 研究发现工业机器人容易遭到黑客攻击

在科幻作家艾萨夫阿西莫夫(Isaac Asimov)的作品中,他设想了一个无处不在的机器人减轻了人类劳动需求的世界。他预测了一套不可改变的三项定律来管理他们的行为,其中第一条是: 「机器人永远不会伤害人类,或坐视人类受伤。」 但在现实生活中,这种机器人的存在似乎只是个美好的设想,至少不是现有的家用和工业机器人所能实现的。而根据新的研究,...

View Article

Image may be NSFW.
Clik here to view.

“APP“和”TSP“成为黑客攻击第一练兵场,车联网安全如何防护?

近日刷爆朋友圈的《速度与激情8》上映短短十天,票房就突破了20亿美元,《速8》除了延续以往的豪车、硬汉、美女等要素外,还引入了当下在IT圈与汽车圈都备受关注的汽车破解技术。不同于以往竞速电影中人类驾驶汽车追逐、围堵的套路,《速8》中的大反派已经可以在空中操纵众多“僵尸车”在街头统一行驶、并线、冲撞……...

View Article

Image may be NSFW.
Clik here to view.

MongoDB被盗,黑客真能帮你恢复?

谈到MongoDB,想必大家都不陌生,这是一个基于分布式文件存储的数据库。由 C++ 语言编写。旨在为 WEB 应用提供可扩展的高性能数据存储解决方案。 它是介于关系数据库和非关系数据库之间的产品,是非关系数据库当中功能最丰富,最像关系数据库的,因此它得以快速发展。...

View Article


$7 Malware Allows Anyone to Become a Hacker Overnight

Security company Proofpoint has discovered a new form of malware that can be purchased for just $7 and which has the potential of going undetected by antivirus software. In an in-depth analysis of the...

View Article


Image may be NSFW.
Clik here to view.

(New) Become A Professional Hacker ― 9 Online Training Courses

How to become a Professional Hacker? This is one of the most frequently asked queries we came across on a daily basis. Do you also want to learn real-world hacking techniques but don’t know where to...

View Article

Image may be NSFW.
Clik here to view.

To battle hackers, IBM wants to encrypt the world

( Christiaan Colen / Flickr ) There are only two types of companies, it is commonly said: those that have been hacked, and those thatjust don't know ityet. IBM, the computing giant, wants to get rid...

View Article

Image may be NSFW.
Clik here to view.

Hackers tried to infiltrate state's voter registration system almost 150,000...

Hackers tried to access South Carolina 's voter registration system almost 150,000 times on Election Day alone, a new report from the state's Election Commission has revealed. The report plays into a...

View Article

The 10 Best Ways to Protect Your Mobile Device Against Hackers

When trying to protect your business from the threat of having systems hacked into and valuable data compromised or stolen , unprotected mobile devices should cause particular concern. It is vital...

View Article


Image may be NSFW.
Clik here to view.

Hacker Allegedly Steals $7.4 Million in Ethereum with Incredibly Simple Trick

A hacker has allegedly just stolen around $7.4 million dollars worth ofether, the cryptocurrency that underpins the app platform ethereum, by tricking victims into sending money to the wrong address...

View Article

GCHQ Says Hackers Have Likely Compromised UK Energy Sector Targets

A UK cybersecurity authority has issued a warning about hackers targeting the country's energy sector, and says that some industrial control system organizations are likely to have been successfully...

View Article


Image may be NSFW.
Clik here to view.

直播平台6000元雇黑客攻击对手 群里发红包黑客接单

2016年9月,浙江苍南县雨季,警方趟着城中积水将犯罪嫌疑人杨琛送进看守所。警方供图 直播平台6000元雇佣黑客攻击“对手” 浙江警方破获网络DDOS攻击案;网上黑客自编软件发展代理商销售;群里发红包就能攻击网站 来源:新京报...

View Article

The Latest App Coding Trend Is a Hacker’s Dream

Every time you search for something on Google, hail an Uber or log into a bank account, your personal data likely flow behind the scenes through a series of separate, freestanding packages of software...

View Article


Image may be NSFW.
Clik here to view.

【知识】7月24日 - 每日安全知识热点

【知识】7月24日 - 每日安全知识热点 2017-07-24 10:29:15 阅读:142次 点赞(0) 收藏 来源: 安全客 作者:童话 热点概要:Black Hat USA 2017军火库、看我如何黑掉PayPal的服务器,从任意文件上传到远程代码执行、通过Excel.Application RegisterXLL()方法执行DLL、Cisco WebEx Browser Extension...

View Article

Image may be NSFW.
Clik here to view.

【技术分享】Source游戏中的远程代码执行漏洞的分析

【技术分享】Source游戏中的远程代码执行漏洞的分析 2017-07-24 10:03:15 阅读:667次 点赞(0) 收藏 来源: oneupsecurity.com 作者:myswsun 译者:myswsun 预估稿费:140RMB 投稿方式:发送邮件至linwei#360.cn,或登陆网页版在线投稿 0x00前言 Valve的Source...

View Article

Image may be NSFW.
Clik here to view.

【木马分析】深入剖析滥用合法ffmpeg的.NET恶意软件

【木马分析】深入剖析滥用合法ffmpeg的.NET恶意软件 2017-07-24 12:08:48 阅读:316次 点赞(0) 收藏 来源: malwarebytes.com 作者:shan66 译者:shan66 预估稿费:190RMB 投稿方式:发送邮件至linwei#360.cn,或登陆网页版在线投稿...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images