Needle A modular framework to streamline security assessments of iOS apps
Assessing the security of an iOS application typically requires a plethora of tools, each developed for a specific need and all with different modes of operation and syntax. The Android ecosystem has...
View ArticleOur security team’s vision for defending the modern web
As the security team at Fastly, our vision is to employ our CDN’s unique position to defend the modern web. This vision, recently articulated by CSO Window Snyder , is of a world where your CDN is...
View ArticleAndroid Security Bulletin August 2016: What you need to know
Image: Jack Wallen Was August 2016 a banner month for Android security? Let's pick through the latest Android Security Bulletin and find out. SEE: 'Quadrooter' flaws affect over 900 million Android...
View ArticleSecurityScorecard发布2016年上半年美国金融行业网络安全情况报告
SecurityScorecard发布2016年上半年美国金融行业网络安全情况报告 2016-08-15 09:58:16 来源:安全客 作者:ResoLutiOn 阅读:311次 点赞(0) 收藏 分享到: 该报告的国内网盘镜像:https://yunpan.cn/c6hIAi9Dmahz2 (提取码:bbb2)...
View Article安卓系统高通软件安全漏洞曝光 威胁近10亿用户
【环球科技报道 记者 程君秋】据台湾“联合新闻网”8月9日报道,应用在数以亿计Android装置的软件被发现严重安全漏洞,将导致攻击者能完整存取手机资料。 Checkpoint公司研究人员揭露,美国高通公司(Qualcomm)生产应用在芯片组上的软件,有危及资料安全疑虑。 报道称,目前虽无证据显示有黑客利用这个漏洞,但Checkpoint公司移动装置管理部负责人萧洛夫(Michael...
View Article高通处理器发现安全漏洞 9亿部安卓手机恐遭袭
高通处理器发现安全漏洞 9亿部安卓手机恐遭袭 2016.8.10来源:21CN 网易科技讯8月10日消息,据每日邮报报道,互联网安全服务供应商Checkpoint的安全专家在高通处理器中发现严重安全漏洞,黑客可以控制手机和窃取用户大量数据。专家警告称,这个漏洞可能影响9亿部安卓手机,包括HTC One、索尼Xperia Z Ultra以及三星Galaxy...
View ArticlePen-test trio crafts 'Datasploit' tool for easy social engineering
Black HatA security trio has brewed a toolset to help attackers find sensitive open source intelligence on human targets. Shubham Mittal of NotSoSecure, Nutan Kumar Panda of eBay, and Sudhanshu...
View ArticleWhibOx part 3: Attacks on Whitebox crypto
WhibOx part 3: Attacks on Whitebox crypto 56 minutes ago Joppe Bos from NXP gave the same talk I had seen a couple month ago at SSTIC . To recap the white box model: you can inject fault you can access...
View ArticleWhat’s your security strategy?
In this podcast recorded atBlack Hat USA 2016 in Las Vegas, Chris Drake, CEO at Armor, talks about how corporate IT is being stretched thin. They have to tackle the corporate network, endpoints, BYOD,...
View ArticleEmployee awareness training: Key component of IT security initiatives
IT projects are most effective when they take into account people, processes, and technology. These three components should be addressed concurrently so the organization can get the maximum benefit...
View Article打击电话诈骗 路阻且长
通信世界网消息(CWW) 不断完善的通信网络,在满足了消费者日常通信需求、带来前所未有的便捷之余,发达的通信技术、网络也成为一些不法分子作案工具。 电话诈骗金额达16亿元...
View ArticleSecurity Audit - ithub.gov.ro
GovITHub is the government program that proposes to create the community of those that believe in a digital future for Romania, by changing public services with the help of technology. Few days ago I...
View ArticleSage data breach may impact hundreds of business customers
Kaspersky Sage Group has admitted to a data breach which may affect hundreds of UK business customers. Over the weekend, the accounting software company revealed that the network compromise was caused...
View ArticleThe increasing role of AI in cyber security [Q&A]
As attacks become more frequent and sophisticated, conventional security techniques and human analysis struggle to keep pace. As a result many companies are turning to artificial intelligence methods...
View ArticleSage Customer Data Exposed After Unauthorized Login
Accountancy software maker Sage has revealed it’s been hit by a data breach affecting a “small number” of its UK and Ireland business customers. Shares in the Newcastle-based firm slumped by over 3% on...
View Article2016台湾骇客年会:三大亮点不容错过
【天极网网络频道】2016年台湾骇客年会在7.22――7.23号台北举行。本届年会的主题是“安全是一切”,聚焦于骇客技术和信息安全。 参加本次大会的大约1500人来自美国、印度、韩国、中国、日本和台湾。参会者可以充分享受他们拥有的机会,会见来自其它国家的安全专家、安全研究者和恶意软件分析师并和他们讨论信息安全、APT研究和恶意软件分析。在他们之中,超过20%是拥有高技术并未来充满希望的学生。...
View ArticleShade malware attack examines your finances before demanding ransom
Ransomware just got personal. To make sure victims can penny up for their files, a version of the Shade encryptor targets infected computers with a special gift: remote control tools. The Shade...
View ArticleOWASP TOP 10: Unvalidated Redirects and Forwards (#10)
OWASP is a non-profit organization with the goal of improving the security of software and the internet. They have put together a list of the ten most common vulnerabilities, which we will cover one...
View Article[图]黑客伪装KAT镜像网站试图窃取你的银行卡信息
今年夏天对于Torrent社区来说太过于寒冷。上个月网站创始人Artem Vaulin被捕后知名种子网站KickassTorrents关闭,上周互联网最大种子搜索引擎Torrentz.eu突然关闭。黑客利用用户搜索备用网站的心理,推出了一个含有恶意程序的KAT.am的克隆网站,试图窃取你的银行账号信息。...
View ArticleGenerate md5 Hash for Maven
Maven creates and checks MD5 checksums at various times. For instance, when downloading an artifact from a repository, Maven checks whether the checksum of the downloaded files (e.g. POM, JAR) is...
View Article