Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Black Hat USA 2018: Know Before You Go

Every year, Las Vegas hosts one of the most notable information security conferences in the world: Black Hat USA . Black Hat stands out from the crowd for the many disclosures brought by its speakers...

View Article



The security solution for SMBs | Avast

Independent testing lab AV-Comparatives just published its semiannual Business Security Test report , which aggregates a half-year’s worth of tests known as the lab’s Business Main-Test Series. Avast...

View Article

Image may be NSFW.
Clik here to view.

University of Phoenix Poll: 20% of US Adults Have Considered Infosec Careers

Many respondents could enter the field by leveraging skills they already have. Twenty percent of respondents to a new survey have considered cybersecurity careers. While roughly half of the 2,000 US...

View Article

Image may be NSFW.
Clik here to view.

Security Begins at the Home Router

By Vijay SarvepalliSecurity Solutions ArchitectCERT Division In recent days, the VPNFilter malware has attracted attention, much of it in the wake of a May 25 public service announcement from the FBI ,...

View Article

Image may be NSFW.
Clik here to view.

Why you're using Tor wrong

Video: Global fitness tracker map lights up secret military bases ANDROID SECURITY Google has an Android security problem Security is everyone's responsibility, not just those with the cash to upgrade....

View Article


Image may be NSFW.
Clik here to view.

What’s the value that DevSecOps brings for Application Security?

Cybersecurity and Cyber threats are becoming a growing concern for every organization as well as an individual user. DevSecOps comes in as a concept and a methodology that plugs in security way ahead...

View Article

National Cyber Security Centre publish Ubuntu 18.04 LTS Security Guide

Last week the NCSC (National Cyber Security Centre) in the UK issued their latest publication which gives advice on how to configure Ubuntu 18.04 LTS in accordance with their security best practices....

View Article

Key Highlights of Good Archive Administration Programming

The successful implementation of a documentary management software starts with a detailed understanding of the specific challenges and requirements of the organization.But in turn,knowledge of the...

View Article


Image may be NSFW.
Clik here to view.

2018全球数字货币非法挖矿研究报告

4分钟前 作者:鸵鸟区块链的朋友们 2 微信公众号:链塔智库(ID:liantazhiku) 作者: 链塔分析师团队 随着数字货币交易量的增长,越来越多的相关产业也在蓬勃发展中。挖矿作为产业链的上游环节,创造出了巨大的利润,企业、供应商和交易者趋之若鹜。...

View Article


Image may be NSFW.
Clik here to view.

NetSpectre可利用芯片安全漏洞远程盗取信息(虽然很慢)

计算机安全研究人员设计出了远程利用现代处理器芯片预测执行漏洞的方法。听起来好像很严重,但实际上可能并没有。 目前为止,幽灵攻击尚需恶意代码在脆弱主机本地执行,才可以从本机其他软件的内存中盗取口令、密钥和其他秘密。...

View Article

Image may be NSFW.
Clik here to view.

总结:工业互联网安全受到威胁主要有三点原因

可能很多人对工业互联网并不是很了解,其实它就是工业制造与互联网深度融合的产物。它能够推动工业链、产业链、价值链的重塑再造,让设计、生产、服务等安全产业链的生产模式成为常态。但在提供生产效率的同时,也附带一定的安全隐患。所以近年来频发工业安全事件,这样引起了我们的高度重视。...

View Article

Image may be NSFW.
Clik here to view.

Embedding Security in the Container Runtime

Since the introduction of containers, DevOps has been pursuing the benefits: speed, agility, and portability. The promise of containers is what businesses were leveraging to accelerate their...

View Article

Security Think Tank: A risk-based approach to security outsourcing

A useful approach to begin with is to build a risk register , because managing controls that do not align to a risk your business faces is ultimately counterproductive. Even the smallest of SMEs...

View Article


BurnBox Makes Hidden Files Look Like You've Deleted Them

Imagine you're a human rights activist, pulling up to a border crossing. The on-duty customs agent requests that you hand over your phone and unlock it , without a warrant―an increasingly common...

View Article

The 6 Most Disturbing Data Breaches In 2018 So Far

You could argue that all cyber-attacks and data breaches are disturbing, and you wouldn’t be wrong. But all too often a cyber-incident comes along that hits a whole new level of intrusion or includes...

View Article


Image may be NSFW.
Clik here to view.

Now On Stage! Deep Hooks: Monitoring Native Execution In WOW64 Applications

Four months ago we published a 3-part series of blog posts, presenting a research carried out by two of our researchers: Yarden Shafir and Assaf Carlsbad. The research introduced a new way of...

View Article

Image may be NSFW.
Clik here to view.

The Need for Managed Detection and Response: Persistent and Prevalent Threats...

byJennifer Hernandez, Anjali Patil, and Jay Yaneza Compared to the first quarter of 2018 , where the prevalence of threats was the most pronounced trend, the second quarter in North America’s security...

View Article


Image may be NSFW.
Clik here to view.

腾讯安全首发2018互联网黑产报告 威胁情报系统成网络安全攻防关键

7月26日,腾讯安全正式发布《2018年上半年互联网黑产研究报告》(以下简称《报告》),通过腾讯安全联合实验室、腾讯电脑管家、腾讯手机管家、腾讯云的海量大数据,首次披露2018上半年互联网黑产攻击特征和发展变化。...

View Article

聚焦新时代网络安全热点 C3安全峰会在成都高新区举办

四川经济日报讯 (记者 鲍安华 文/图) 5月9日至10日,备受全球网络安全从业者关注的网络安全盛会――C3安全峰会在成都高新区举行。作为国内最高规格、最受瞩目的年度会议之一,“C3安全峰会”已在成都连续举办三年,C3即“网际空间Cyber、云Cloud、通信Communication”,寓意“立体、可控、可视”的安全新机制。...

View Article

未来网络安全需求转向云端 智能化安全产品受热捧

经济日报-中国经济网西安7月30日讯(记者 佟明彪)研究显示,未来网络安全威胁主要集中于关键数据与关键应用方面,黑客将在利益驱动下,进行勒索型攻击或窃取型攻击。随着这种复杂化的网络安全威胁,智能化的高端安全产品需求呈现增长趋势,另外,随着云计算的快速发展,未来网络安全需求也逐渐转向云端。...

View Article
Browsing all 12749 articles
Browse latest View live