keep finding old security problems
I decided to look closer at security problems and the age of the reported issues inthe curl project. One theory I had when I started to collect this data, was that we actually get security problems...
View ArticleTresorit Adds Features To Help Companies Keep Control of Data
Tresorit, the cloud encryption company, updates its file sync &sharing product for businesses with advanced data control features. Tresorit Business aims to support customers in protecting personal...
View ArticleHow to Create a Strong Password
Photo Illustration by Elena Scotti/Lifehacker, photos via Shutterstock The U.S. government recently revamped its password recommendations , abandoning its endorsement of picking a favorite phrase and...
View ArticleCanary improves livestream skills of its home security camera
Smart home security company Canary has unveiled a new range of features to make it easier to keep an eye on your home, including two-way audio, a web app and real-time monitoring. The updates join...
View ArticleCustomer Spotlight: Why Harvard University Chose LastPass to Bolster their...
A few weeks ago, we had the opportunity to speak with Miguel Sanchez, who has worked in Information Security at Harvard University for over 10 years. He previously enjoyed LastPass as a personal user...
View ArticleCanary finally brings two-way talk to its security cameras
Security startup Canary is bringing a handful of new features to its existing camera products, theall-in-one andFlex. Most notable here is the addition of two-way audio, which has been conspicuously...
View ArticleJASK Employs Artificial Intelligence to Automate Smarter Security
Add JASK to the list of startups looking to relieve the burden on overwhelmed security teams through the use of artificial intelligence . The San Francisco-based company unveiled its JASK Trident...
View ArticleCSS2017齐聚全球安全领袖,洞悉国际安全前沿趋势
8月15日,第三届中国互联网安全领袖峰会(Cyber Security Summit,简称CSS2017)将在北京国家会议中心召开。作为全球规模最大的互联网产业安全交流盛会,CSS2017将以“安全新秩序,连接新机遇”为大会主题,邀请全球顶级安全大咖和各界领袖,多维度探讨全球网络安全最新发展趋势,分享时下前沿安全技术与研究成果,为“互联网+”下各产业的发展进行全面解读把脉,护航“数字经济”健康发展。...
View ArticleIdentity and Access Management (IAM) in the aftermath of NotPetya
The recent NotPetya ransomware attack was a game changer in many ways the speed at which it spread and its destructive nature, have been a wakeup call to both the affected and unaffected organizations...
View Article机构预警:近期威胁数据安全的病毒有增加趋势
金山毒霸安全实验室发布预警称,近一段时间以来,威胁数据安全的病毒有增加趋势,这类病毒专门破坏用户数据,处理不当将会造成严重损失,广大网友要特别留意那些试图篡改硬盘分区信息的恶意病毒。...
View ArticleSecOps: The Next Stride for DevOps
Global IT spending is now touching a figure of $4 trillion. In today’s technology-intensive environment, data is the biggest commodity, more valuable and powerful than ever. And like Peter Parker’s...
View ArticleEnterprise security culture: Why you need it, and how to create it
Security awareness is a term that most information security professionals are familiar with security culture a little less so. “Security awareness training is based on a behavioural theory that was...
View ArticleNotes on McAfee Security Scan Plus RCE (CVE-2017-3897)
At the end of last month, McAfee published a fix for a remote code execution vulnerability in its Security Scan Plus software. Beyond Security, who we worked with for vulnerability coordination...
View ArticleIntroducing Ward: Web Application Realtime Defender - WAF, IDS, Automatic...
If you're a business owner, every hour spent worrying about criminals breaking into your website and stealing your customer's financial information is an hour you're not making your business more...
View ArticleSprint enables Calling PLUS on Samsung Galaxy S8/S8+
Sprint has announced that it has enabled the Calling PLUS functionality onSamsung Galaxy S8 andS8+ units on its network. It lets you use WiFi calling and VoLTE in conjunction - the latter was not...
View ArticleSome Workers Hide Security Incidents From Managers
Why Employees Hide Cyber-Security Incidents ByKaren A. Frenkel | Posted 08-14-2017 Email Why Employees Hide Cyber-Security Incidents Uninformed and careless employees are hiding security incidents from...
View ArticleEnhance the Security of Your iPhone with Bio Locker [Jailbreak Tweak]
While passcode and Touch ID are the best ways to secure your iPhone, there are times when you want to hand your device to someone else, but you’re afraid that they will check your private photos and...
View Article6 Short Links on PDNS Graph Analytics for Security
A short listing of research papers I’ve read or plan to read that use passive DNS (PDNS) data and graph analytics for identifying malicious domains. Host-Domain Graphs Host domain graphs are bipartite...
View ArticleHackers are forcing Hollywood to reevaluate its cybersecurity
(Bloomberg) ― Sony. Netflix. And now, HBO. While the 2014 hacking at Sony Pictures pushed entertainment giants to take computer security more seriously, recent incidents have exposed weaknesses...
View Article怎么看DNS是否被劫持 电脑及路由器判断DNS被劫持方法介绍
怎么看dns是否被劫持?一般来说,DNS被劫持有2种情况,一种是路由器DNS被劫持,另外一种是电脑DNS被劫持。针对这2种DNS劫持,下面分别介绍下如何查看。一、怎么看电脑DNS是否被劫持1、在电脑桌面右下角的网络图标上点击鼠标右键,在弹出的选项中,点击“打开网络和共享中心”。2、在打开的网络和共享中心,点击已经连接的网络名称,之后会打开网络状态3、然后点击网络状态下面的“属性”,在弹出的网络属性对...
View Article