Trustonic Embeds IoT Security Technology in Microchip MCU
Trustonic is working with Microchip Technology Inc. to embed its security technology at the chip level, with the latter releasing a new family of secure MCUs that will cost in the $1 range at volume ....
View ArticleFTAPI SecuTransfer - the secure alternative to emails? Not quite...
Emails aren’t private, so much should be known by now. When you communicate via email, the contents are not only visible to yours and the other side’s email providers, but potentially also to numerous...
View Article挥之不去的黑客阴影――区块链资产安全之殇
黑客如时代的梦魇,仿佛从互联网技术兴起至区块链蓬勃发展的今天,黑客入侵的阴霾持续不断。颠覆互联网的区块链技术登场,黑客同样乐此不疲的开始各种各样的“表演”。以太坊分裂、BTER失窃、门头沟时间,每一次币圈涨跌异常的背后,总有他们的得意成果。...
View ArticleSolving Second Bevx Challenge 2018
The Bevx challenge is a security challenge from Beyond Security for their Bevx conference. I didn’t know about the first challenge, and since I don’t use Twitter every day, I almost missed this second...
View ArticleHow Microsoft 365 Security integrates with the broader security...
Today’s post was coauthored by Debraj Ghosh, Senior Product Marketing Manager, and Diana Kelley, Cybersecurity Field CTO. This week is the annual Microsoft Inspire conference, where Microsoft directly...
View ArticleIndependent Research Firm Names ZeroFOX a Leader in Digital Risk Protection...
ZeroFOX secures “differentiated” ratings for “Vision and Execution” and “Digital Risk Protection Breadth and Depth” criteria BALTIMORE (BUSINESS WIRE) ZeroFOX , the social media and digital security...
View ArticleVerodin raises $21 million Series B round for automated red-teaming
Verodin , a company that provides automated security testing services, announced on Tuesday that it brought in $21 million for its Series B funding round. Based in McLean, Va., Verodin provides a...
View ArticleNearly Half of Security Pros Reuse Passwords
Survey exposes poor security practices by the people who should know better. One of the biggest no-no's in password best practices: using the same password across multiple online accounts. But some 45%...
View ArticleWhat is single sign-on? How SSO improves security and the user experience
Single sign-on (SSO) is a centralized session and user authentication service in which one set of login credentials can be used to access multiple applications. Its beauty is in its simplicity; the...
View ArticleA major election software maker allowed remote access on its systems for years
A major voting machine maker, Election Systems & Software, revealed in a letter to a US senator that it installed remote-access software on its machines over a period of six years. The revelation...
View ArticleAnalyzing Oracle Security Oracle Critical Patch Update for July 2018
Today Oracle has released its quarterly patch update for July 2018 . It fixes a record number of 334 vulnerabilities. The main highlights are as follows: The average number of security issues released...
View ArticleVoting machine maker sold states systems with remote-access tools
That admission raises a lot of questions over how seriously ES&S took its security, and it contradicts statements it previously made to reporters that it had no knowledge of selling machines with...
View ArticleAnalysys Mason scoops up AMI-Partners to expand market offering
Global telecommunications and tech analysis firm Analysys Mason has acquired New York-based SMB ICT research company AMI-Partners in a move designed to expand its worldwide research business. Analysys...
View Article2018上半年回顾:网络安全直面五大威胁
一、挖矿病毒风头盖过勒索攻击 回顾2018上半年,网络犯罪分子不断翻新攻击手段,除了零日漏洞的利用外,恶意挖矿、勒索软件大行其道,DDoS攻击更是突破TB级别,而且攻击渠道日益多变,工业网亦成为不法黑客的攻击重点,都为整个产业网络安全环境带来全新挑战。那么在此期间,波及广泛、影响巨大的安全威胁可以分为下面五类。 1. 挖矿病毒激增15%...
View Articleggplot2 快速入门:基础图形作法
一、实验介绍 1.1 实验内容 从课程《R 语言快速入门》 中,我们已经了解过 Hadley Wickham 的 tidyverse 生态链,知道了完整的数据分析大约包括以下流程: Source: Hadley Wickham, R for Data Science, 2016....
View Article8 Best Penetration Testing Tool Tips
<em>What makes a good pen testing tool? Speed, agility, efficiency or cost benefits? How about all of them?</em> Cyberspace is an incredible place for businesses; look at how far we’ve got....
View ArticleDDoS Attacks Get Bigger, Smarter and More Diverse
DDoS attacks is relentless. New techniques, new targets and a new class of attackers continue to reinvigorate one of the internet’s oldest nemesis. Distributed denial of service attacks, bent on taking...
View Article博客跑分优化
本篇文章会持续更新,因为优化无止境。 本文会罗列目前已经优化过的点。从开始页面略卡顿,到最后跑满分,笔者在这里都会一一展现出来。 起点 博客页面优化从 Chrome 的 Performance 开始。 从上图中可以看到页面前 550ms 都是空白,时间耗在了加载 JS 的过程上了。这段是 Disqus 的脚本和 Google 统计脚本。 笔者优化的原则是: 必须要加载的...
View ArticleUsing HTML Attribute Separators for Bypassing WAF XSS Filters
Using HTML Attribute Separators for Bypassing WAF XSS Filters Abstract This is an experiment I have done recently in order to identify and utilize attribute separators in constructing XSS vectors. The...
View ArticleNew Paper: Cybersecurity in Distributed Optimization
Conventional centralized optimization algorithms have challenge solving big optimization problems- at some scale, you simply can’t fit the problem on a single computer, let alone manage all of the...
View Article