Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

The Best Ways to Improve Your Mobile Security Capabilities

The SANS Institute’s recent study, Endpoint Protection and Response: a SANS Survey, revealed that only 47% of attacks on mobile devices were detected by antivirus. Though this approach to mobile...

View Article


Image may be NSFW.
Clik here to view.

How a Potential Crypto-asset Security Classification Would Threaten to Unwind...

How a Potential Crypto-asset Security Classification Would Threaten to Unwind The Budding Decentralized Economy (High-Level Overview) In light of recent news that U.S. regulators are reviewing...

View Article

Evolv deploys speedy AI-powered body scanners at Oakland International

One of theworst things about flying is the inevitable wade through airport security. Average wait times at congested airports like Salt Lake City International and Washington Dulles regularly exceed...

View Article

C-Suite Cyber Security Awareness May Be the Key to Taking a Bite Out of Breaches

No matter how many breaches we read about, how many cautions we hear, or how many reminders we get about the importance of round-the-clock diligence, cyber security continues to slip through the cracks...

View Article

Image may be NSFW.
Clik here to view.

Nightvision Vacuum Cleaner’s Vulnerability Disclosed

Add to favorites Robot vacuum cleaners might not be as secure as you think. Robot vacuum cleaners are not immune from being vulnerable to cyberattacks as one London-based company has found. Positive...

View Article


Cloudflare recruits state and local governments for free election site...

After launching a free program to protect election systems last December, Cloudflare has an update on how things are going. The program, known as the Athenian Project , provides Cloudflare’s services...

View Article

Threat Hunting Techniques

Introduction Cyberthreat-hunting is a way of scouring through a network and finding sophisticated threats that could cause harm to systems and data, and which are not detectable to already existing...

View Article

Image may be NSFW.
Clik here to view.

10 Benefits of Threat Hunting

Introduction Organizations are constantly being challenged by an increasing number of cybersecurity threats. As the severity and frequency of attacks rise, there is a call for a more proactive...

View Article


Image may be NSFW.
Clik here to view.

为提高SD-WAN安全性能,你需要这样做

为了做好网络安全工作,SD-WAN技术提供商除了继续加强其产品固有的安全特性,还与网络安全伙伴创建强大的安全生态系统,IT经理也在积极考虑其分支网络安全需求,并仔细评估SD-WAN提供商的安全能力,包括其自身的安全特性及其与网络安全提供商的伙伴关系。 分支网络安全威胁...

View Article


Threat Hunting as an Active Defense

Introduction The current reality is that numerous organizations don’t realize hackers have already compromised their systems. Today, enterprises routinely fail to detect attacks in an effective and...

View Article

Image may be NSFW.
Clik here to view.

企业APT攻击取证(windows版本)

当年, APT 这个词刚出现的时候震慑了一大群安全同学, “ APT ( Advanced Persistent Threat )是指高级持续性威胁 ” ,这个专业定义让大家都无比崇拜。 随着逐步研究与接触,尤其是在处理过 APT 入侵后,慢慢明白,其实所谓 apt...

View Article

Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Multiple Vulnerabilities in ACD Systems Canvas Draw 4

These vulnerabilities were discovered by Tyler Bohan of Cisco Talos Today, Talos is disclosing several vulnerabilities that have been identified in Canvas Draw graphics editing tool for Macs. Canvas...

View Article

Golang语言之JSON md5

package main import ( "encoding/json" //自带的json工具 "fmt" ) //github.com/pquerna/ffjson/ffjson // 这个json工具,比自带的json效率要高很多 // 而且接口,完全一样, type worker struct { Name string `json:"worker_name"`...

View Article


Image may be NSFW.
Clik here to view.

Four Vulnerabilities in Cisco Policy Suite Fixed (CVE-2018-0374)

Cisco has released more fixes for a range of critical and high severity vulnerabilities found in several groups of products Policy Suite, SD-WAN, and Nexus. Let’s have a closer look at the Policy Suite...

View Article

Hacker Summer Camp 2018: Cyberwar?

I actually thought I was done with the pre-con portion of my Hacker Summer Camp blog post series, but it turns out that people wanted to know more about “ the most dangerous network in the world ”....

View Article


Image may be NSFW.
Clik here to view.

Hacker Noon Founder Interview, & More Top Tech Stories This Week

Image Credit, CoinStrategy.io PubNub , our weekly sponsor, empowers you to build immersive, interactive apps. Chat, maps, dashboards, smart device control ― powered by APIs, delivered through global...

View Article

Image may be NSFW.
Clik here to view.

Where in the World is NSX?

VMware NSX is going worldwide! We’ll be out and about through the end of the year, spreading networking and security love across America, Asia Pacific, and Europe. Our goal is to help agile...

View Article


That $20 Wyze Cam now works with Alexa

The Wyze Cam has long been a strong contender for the best deal in connected home security. I haven’t actually tried the thing out, but Greg was “surprisingly impressed” with his hands-on time with...

View Article

Wyze’s $20 connected security camera now supports Amazon Alexa

The$20 Wyze Cam security camera may not be the best option out there for a connected home security device, but it’s certainly the cheapest. And now it’s getting even more useful with an update that...

View Article

Image may be NSFW.
Clik here to view.

以太坊ERC827模板安全事件跟踪

2018-07-19 20:31 技术 ETH 990 收藏 EIP827即ERC827标准的提案,是以太坊平台众多提案之一,为Token标准提案,它是对ERC20标准的扩充。 事件回顾: 2018年6月24号,中国安全团队发现了不少 ERC827 合约实现存在类ATN Token 漏洞。黑客可以利用该漏洞,以合约的身份调用任意合约地址上的任意函数。其中大部分问题合约参考了 OpenZeppelin...

View Article
Browsing all 12749 articles
Browse latest View live