Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

keep finding old security problems

I decided to look closer at security problems and the age of the reported issues inthe curl project. One theory I had when I started to collect this data, was that we actually get security problems...

View Article


Tresorit Adds Features To Help Companies Keep Control of Data

Tresorit, the cloud encryption company, updates its file sync &sharing product for businesses with advanced data control features. Tresorit Business aims to support customers in protecting personal...

View Article

Image may be NSFW.
Clik here to view.

How to Create a Strong Password

Photo Illustration by Elena Scotti/Lifehacker, photos via Shutterstock The U.S. government recently revamped its password recommendations , abandoning its endorsement of picking a favorite phrase and...

View Article

Image may be NSFW.
Clik here to view.

Canary improves livestream skills of its home security camera

Smart home security company Canary has unveiled a new range of features to make it easier to keep an eye on your home, including two-way audio, a web app and real-time monitoring. The updates join...

View Article

Image may be NSFW.
Clik here to view.

Customer Spotlight: Why Harvard University Chose LastPass to Bolster their...

A few weeks ago, we had the opportunity to speak with Miguel Sanchez, who has worked in Information Security at Harvard University for over 10 years. He previously enjoyed LastPass as a personal user...

View Article


Image may be NSFW.
Clik here to view.

Canary finally brings two-way talk to its security cameras

Security startup Canary is bringing a handful of new features to its existing camera products, theall-in-one andFlex. Most notable here is the addition of two-way audio, which has been conspicuously...

View Article

JASK Employs Artificial Intelligence to Automate Smarter Security

Add JASK to the list of startups looking to relieve the burden on overwhelmed security teams through the use of artificial intelligence . The San Francisco-based company unveiled its JASK Trident...

View Article

Image may be NSFW.
Clik here to view.

CSS2017齐聚全球安全领袖,洞悉国际安全前沿趋势

8月15日,第三届中国互联网安全领袖峰会(Cyber Security Summit,简称CSS2017)将在北京国家会议中心召开。作为全球规模最大的互联网产业安全交流盛会,CSS2017将以“安全新秩序,连接新机遇”为大会主题,邀请全球顶级安全大咖和各界领袖,多维度探讨全球网络安全最新发展趋势,分享时下前沿安全技术与研究成果,为“互联网+”下各产业的发展进行全面解读把脉,护航“数字经济”健康发展。...

View Article


Image may be NSFW.
Clik here to view.

Identity and Access Management (IAM) in the aftermath of NotPetya

The recent NotPetya ransomware attack was a game changer in many ways the speed at which it spread and its destructive nature, have been a wakeup call to both the affected and unaffected organizations...

View Article


机构预警:近期威胁数据安全的病毒有增加趋势

金山毒霸安全实验室发布预警称,近一段时间以来,威胁数据安全的病毒有增加趋势,这类病毒专门破坏用户数据,处理不当将会造成严重损失,广大网友要特别留意那些试图篡改硬盘分区信息的恶意病毒。...

View Article

SecOps: The Next Stride for DevOps

Global IT spending is now touching a figure of $4 trillion. In today’s technology-intensive environment, data is the biggest commodity, more valuable and powerful than ever. And like Peter Parker’s...

View Article

Image may be NSFW.
Clik here to view.

Enterprise security culture: Why you need it, and how to create it

Security awareness is a term that most information security professionals are familiar with security culture a little less so. “Security awareness training is based on a behavioural theory that was...

View Article

Image may be NSFW.
Clik here to view.

Notes on McAfee Security Scan Plus RCE (CVE-2017-3897)

At the end of last month, McAfee published a fix for a remote code execution vulnerability in its Security Scan Plus software. Beyond Security, who we worked with for vulnerability coordination...

View Article


Introducing Ward: Web Application Realtime Defender - WAF, IDS, Automatic...

If you're a business owner, every hour spent worrying about criminals breaking into your website and stealing your customer's financial information is an hour you're not making your business more...

View Article

Image may be NSFW.
Clik here to view.

Sprint enables Calling PLUS on Samsung Galaxy S8/S8+

Sprint has announced that it has enabled the Calling PLUS functionality onSamsung Galaxy S8 andS8+ units on its network. It lets you use WiFi calling and VoLTE in conjunction - the latter was not...

View Article


Image may be NSFW.
Clik here to view.

Some Workers Hide Security Incidents From Managers

Why Employees Hide Cyber-Security Incidents ByKaren A. Frenkel | Posted 08-14-2017 Email Why Employees Hide Cyber-Security Incidents Uninformed and careless employees are hiding security incidents from...

View Article

Image may be NSFW.
Clik here to view.

Enhance the Security of Your iPhone with Bio Locker [Jailbreak Tweak]

While passcode and Touch ID are the best ways to secure your iPhone, there are times when you want to hand your device to someone else, but you’re afraid that they will check your private photos and...

View Article


6 Short Links on PDNS Graph Analytics for Security

A short listing of research papers I’ve read or plan to read that use passive DNS (PDNS) data and graph analytics for identifying malicious domains. Host-Domain Graphs Host domain graphs are bipartite...

View Article

Hackers are forcing Hollywood to reevaluate its cybersecurity

(Bloomberg) ― Sony. Netflix. And now, HBO. While the 2014 hacking at Sony Pictures pushed entertainment giants to take computer security more seriously, recent incidents have exposed weaknesses...

View Article

怎么看DNS是否被劫持 电脑及路由器判断DNS被劫持方法介绍

怎么看dns是否被劫持?一般来说,DNS被劫持有2种情况,一种是路由器DNS被劫持,另外一种是电脑DNS被劫持。针对这2种DNS劫持,下面分别介绍下如何查看。一、怎么看电脑DNS是否被劫持1、在电脑桌面右下角的网络图标上点击鼠标右键,在弹出的选项中,点击“打开网络和共享中心”。2、在打开的网络和共享中心,点击已经连接的网络名称,之后会打开网络状态3、然后点击网络状态下面的“属性”,在弹出的网络属性对...

View Article
Browsing all 12749 articles
Browse latest View live