【技术分享】Android内核漏洞利用技术实战:环境搭建&栈溢出实战
【技术分享】Android内核漏洞利用技术实战:环境搭建&栈溢出实战 2017-08-14 16:22:02 阅读:540次 点赞(0) 收藏 来源: 安全客 作者:for_while 作者:for_while 预估稿费:300RMB 投稿方式:发送邮件至linwei#360.cn,或登陆网页版在线投稿 前言 Android的内核采用的是 linux 内核,所以在Android...
View Article【安全报告】2017年第二季度 中国手机安全状况报告
【安全报告】2017年第二季度 中国手机安全状况报告 2017-08-14 19:08:06 阅读:400次 点赞(0) 收藏 来源: 安全客 作者:360手机卫士 第一章 恶意程序 一、 样本量与感染量...
View ArticleHackers Leverage Chat for Command&Control: How You Can Protect Your...
Chat platforms have become a cornerstone for businesses and their customersalike. These important tools make it possible for employees to communicate and collaborate from nearly any location, and...
View ArticleHackers are shaking down HBO for Bitcoin ― should the network pay up?
To pay or not to pay? For HBO and other companies targeted by cyber criminals, that is increasingly becoming the question. The network behind Game of Thrones is the latest victim of a massive digital...
View ArticleSQL injection attacks controlled using Telegram messaging app
Earlier this year, Russian cybercriminals started hawking around a new $500 (385) tool called “Katyusha Scanner” that automates searching for and exploiting SQL injection (SQLi) vulnerabilities on...
View ArticleCode for my educational gifs
During preparation for class I sometimes think up of animations that will explain the concept I am teaching. I sometimes share the resulting animations on social media via @rafalab . John Storey...
View Articlestealth/opmsg: A gpg alternative
opmsg A gpg alternative opmsg is a replacement for gpg which can encrypt/sign/verify your mails or create/verify detached signatures of local files. Even though the opmsg output looks similar, the...
View Article每日一博 | Java 使用 Hutool 实现 AES、DES 加密解密
介绍 AES和DES同属 对称加密 算法,数据发信方将明文(原始数据)和加密密钥一起经过特殊加密算法处理后,使其变成复杂的加密密文发送出去。收信方收到密文后,若想解读原文,则需要使用加密用过的密钥及相同算法的逆算法对密文进行解密,才能使其恢复成可读明文。在对称加密算法中,使用的密钥只有一个,发收信双方都使用这个密钥对数据进行加密和解密,这就要求解密方事先必须知道加密密钥。...
View ArticleDruid数据连接池字符串解密
Driud是什么 Druid是阿里巴巴开源平台上的一个项目,整个项目由数据库连接池、插件框架和SQL解析器组成。该项目主要是为了扩展JDBC的一些限制,可以让程序员实现一些特殊的需求,比如向密钥服务请求凭证、统计SQL信息、SQL性能收集、SQL注入检查、SQL翻译等,程序员可以通过定制来实现自己需要的功能。 Druid解密方式...
View ArticleUsing PKCE with IdentityServer from a Xamarin Client
The OpenID Connect and OAuth 2.0 specifications define a number of authentication flows between clients and authentication providers. These include: Implicit .This authentication flow is optimized for...
View ArticleOnionDog is not a Targeted Attack―It’s a Cyber Drill
by Feike Hacquebord, Stephen Hilt and Fernando Mercês Alleged attacks from North Korean actors are a hot security research topic. The infamous Sony Pictures hack in 2014 , for instance, was reported by...
View Article第二届广东省“强网杯” 网络安全大赛正式启动
羊城晚报讯 为提高全社会维护网络安全的意识和能力,重视发现和使用网络安全领域的优秀人才,第二届广东省“强网杯”网络安全大赛11日正式启动。...
View Article如何改进安全运营和安全分析水平
许多企业正为流程、工具、安全团队和IT运营团队的配合而头疼不已。 2017年安全预算持续走高,通常情况下,这些花销被用于提高安全运营水平。根据最近发布的ESG环境、社会和治理研究, 81% 的 网络安全专家认为企业应优先改善安全分析和运营水平。 所以,具体该从哪里着手呢?ESG研究报告也显示了企业所缺乏的东西。比如: 72% 的受访者同意或坚信以下观点:...
View ArticleJust What Is DevSecOps?
We all want to make the headlines, but only for the right reasons; DevSecOps may be the key to achieving just that. There are countless companies out there striving to become press darlings and be...
View ArticleXiaomi MIUI contains several security vulnerabilities making it easy to clone...
Smartphone security has become one of the features we all look at when buying that shiny new device; be it excellent biometrics or in some cases on-device encryption software like Samsung Knox....
View ArticleThe Guy Who Made Up All Those Password Rules Is Sorry
Security news took a turn for the existential this week, as President Donald Trump rattled apparently improvisatory sabers at North Korea, nudging the world one step closer to nuclear confrontation....
View ArticleSecurity Sense: Are We More Secure Today Than Yesterday?
I was chatting to a journo the other day on the latest cyber-something (there’s always a cyber-something happening somewhere), and they asked this question are we more secure today than yesterday? This...
View ArticleNick Lewis on server firmware security for enterprises
Android Hastily-written news/info on the firmware security/development communities, sorry for the typos. Android Developers Blog Hastily-written news/info on the firmware security/development...
View ArticleOpen Architecture Security Cameras
About a month ago, I got a pair of security cameras for the house. It took a bit of research to arrive at the right ones. There are a lot of cameras on the market, and most of them are cheap things...
View ArticleSamsung Galaxy S8 & S8 Plus Get August 2017 Security Patch
Samsung has begun its rollout of the Android Security Patch for the month of August, and the update is currently hitting theGalaxy S8 and Galaxy S8 Plus. At the moment, units in Germany, Turkey and...
View Article
More Pages to Explore .....