Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Hacking THAT: Resources for PenTesting

This year marks the 6th year (out of 7) that I attended ThatConference , and it’s also the 5th year I’ve been blessed to have been selected as a speaker. This year my session is titled HACKING THAT:...

View Article


The Era of Software Exposure

Software is at the backbone of the digital transformation We live in a world of massive digital transformation. The technical backbone of this transformation is software. Software can be found...

View Article


Image may be NSFW.
Clik here to view.

Drive-By Cryptomining: Another Way Cyber-Criminals Are Trying to Evade Detection

By the end of the last year, we saw a drastic rise in drive-by cryptocurrency mining activities and it is quite alarming to note that cyber-criminals are getting smarter and smarter day-by-day at...

View Article

Image may be NSFW.
Clik here to view.

Is Your Conveyancing Practice Secure From Hacking?

The recent media reports of fraud against conveyancing practices suggest that professionals should be taking measures for protecting their businesses from cyber attacks. Cybercriminals primarily rely...

View Article

Monthly Blog Round-Up July 2018

Here is my next monthly “Security Warrior” blog round-up of top 5 popular posts based on last month’s visitor data (excluding other monthly or annual round-ups): “New SIEM Whitepaper on Use Cases...

View Article


Reddit says hackers stole user data from 2007 and earlier in security breach

Reddit informed its users today that a hacker broke into some of its systems and accessed user data, including current email addresses and a 2007 database that contained usernames and passwords that...

View Article

Image may be NSFW.
Clik here to view.

Passwords vs. Private Keys

It is widely believed that public/private keys or certificates are “more secure” than passwords.E.g., an SSH login via key rather than using a password. Or a site-to-site VPN with certificate...

View Article

Telegram Tech Promised In ICO Vulnerable to Attack, Researchers Say

With $1.7 billion in the bank following its initial coin offering (ICO), Telegram has released its first crypto-friendly feature but security researchers are skeptical. As detailed in a blog post...

View Article


IDG Contributor Network: The new definition for threat prediction

In “ Redefining threat prediction ,” I discussed the various ways “prediction” is often misunderstood when discussed as a part of security tools, and three ways security analysts can address these...

View Article


AXIS 1034-W security camera setup

A couple years back I bought a wireless security camera, an AXIS 1034-W, and dida halfass setup using the ancient linux program “motion” to do the heavy work of recording video. I just revisited all...

View Article

Everything you need to know about Reddit’s recent security ‘incident’

Reddit recently learned that a hacker managed to access multiple employee accounts and walk away with “some” current email addresses and a 2007 database backup. It’s undergoing a “painstaking...

View Article

Reddit discloses ‘serious’ security breach it discovered on June 19th

Reddit has disclosed a security incident it’sdescribed as a “serious attack,” which it has been investigating for more than a month which the company says entailed a hacker breaking into some of its...

View Article

Image may be NSFW.
Clik here to view.

Securing Industrial IoT sensors, part 1: The TPM for network security

At a Sensors Expo 2018 workshop in San Jose, CA, with Embedded Computing Design, Trusted Computing Group (TCG) work group members presented information about TCG’s TPM for network security, the DICE...

View Article


Reddit's August 2018 security incident: What you need to know

Reddit, one of the world's most popular websites, announced on August 1, 2018 , that it experienced a security breach in which some user data was compromised. The breach mostly affects Redditors that...

View Article

Safe Harbor for Security Bug Bounty Participants

Mozillaestablished one of the first modern security bug bounty programs back in 2004. Since that time, much of the technology industry has followed our lead and bounty programs have become a critical...

View Article


Facebook's security boss is leaving, a day after the social network revealed...

Facebook Chief Security Officer Alex Stamos is leaving the social network to take an adjunct professorship role at Stanford University, reports the New York Times . News of Stamos' departure comes a...

View Article

Image may be NSFW.
Clik here to view.

Reddit Says Some User Data Accessed in Security Incident

Reddit said that a digital attacker infiltrated some of its systems and accessed user data during a recent security incident. On 1 August, the social news aggregation website revealed that an attacker...

View Article


Image may be NSFW.
Clik here to view.

Facebook’s Security Chief to Depart for Stanford University

Advertisement Supported by Facebook’s Security Chief to Depart for Stanford University Image Alex Stamos is leaving Facebook at a time when the social network is grappling with potential threats...

View Article

Facebook loses its chief security officer Alex Stamos

chief security officer since 2015, announced that he is leaving the company to take a position at Stanford University. The company has been shedding leadership over the last half a year largely owing...

View Article

'Unhackable' Bitfi crypto-currency wallet maker will be shocked to find...

PicsA crypto-currency wallet heavily promoted as "unhackable" complete with endorsements from the security industry's loopy old uncle John McAfee and a $350,000 bounty challenge has, inevitably, been...

View Article
Browsing all 12749 articles
Browse latest View live