Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

一份安全研究报告说,电商网站 91% 的登录访问来自黑客攻击

网络安全公司 Shape Security 发布了一份 2017 年全球身份信息泄露报告 ,报告指出电商网站 91% 的登录流量来自黑客的撞库攻击。 Shape Security 是加利福尼亚的一家网络安全创业公司,创始人曾是五角大楼的安全顾问。Shape 主要为零售商、金融机构、航空公司和政府机构提供恶意攻击防御服务。据 官方介绍 ,他们的客户包括北美排名前十的银行和财富 500 强排名的...

View Article


Image may be NSFW.
Clik here to view.

工控安全现场实施经验谈:如何加强工控系统主机防护?

1 . 背景 2018年7月16日,乌克兰安全局(SBU)对外声称,乌克兰境内的关键基础设施遭到了VPNFilter恶意软件的攻击,而这款恶意软件据说来源于俄罗斯情报机构。...

View Article


How ‘hackers, founders, and freaks’ built Silicon Valley

On this episode of Recode Decode , writer Adam Fisher talks with Recode’s Kara Swisher about his new oral history, “Valley of Genius: The uncensored history of Silicon Valley, as told to me by the...

View Article

Image may be NSFW.
Clik here to view.

风云再起,签名冒用引发信任危机

前言 近期,360核心安全团队独家监测到“签名冒用”的新动向,颁发机构除了之前披露的Go Daddy和Starfield...

View Article

Image may be NSFW.
Clik here to view.

Cisco and the Two-Factor Two-Step

In case you missed the news, Cisco announced yesterday that they are buying Duo Security. This is a great move on Cisco’s part. They need to beef up their security portfolio to compete against not...

View Article


Defending the Wall: Strong Passwords

Strong passwords are an important part of maintaining accounts and of any organization’s security infrastructure. They are the first line of defense that separates the access of sensitive and...

View Article

Singapore Healthcare Breach

Breaches and data thefts happen every day, but one incident uncovered in late July in Singapore points to a significant issue that merits some discussion. SingHealth, the country’s largest healthcare...

View Article

Image may be NSFW.
Clik here to view.

Malcolm Harkins: “Impossible is Not a Declaration. It’s a Dare.”

Impossible is not a declaration. It’s a dare. Impossible is potential. Impossible is temporary. Impossible is nothing. Malcolm Harkins is willing to take that dare. Cylance Chief Security and Trust...

View Article


Image may be NSFW.
Clik here to view.

The Threat Model and Improving One’s Security Online

We are currently doing our Sprint Challenge for Security and Theory of Computation in our coding school and part of our task is to discuss what the Threat Model is and talk about what concrete actions...

View Article


Image may be NSFW.
Clik here to view.

路由器漏洞复现终极奥义――基于MIPS的shellcode编写

前言...

View Article

Image may be NSFW.
Clik here to view.

曲速未来披露:一个集EternalBlue和PowerShell一身的多功能矿工

2018-08-03 20:56 区块链 技术 233 收藏 近日,曲速未来实验室报导经研究人员发现一起恶意挖矿活动,使用的恶意软件名为PowerGhost。 PowerGhost密码挖掘机能够在受感染的系统上保持未被发现,并且可以通过利用无文件感染技术自行传播。 该矿工的目标是工作站和服务器,它允许它分布在大型企业网络中。卡巴斯基发现,威胁利用与国家安全局相关的EternalBlue漏洞进行传播...

View Article

Image may be NSFW.
Clik here to view.

2018年7月勒索病毒疫情分析

auther:kangxiaopao 前言 勒索病毒的传播导致大量用户的重要文件被加密,360互联网安全中心针对勒索病毒进行了多方位的监控以及防御。从反馈数据分析本月勒索病毒的感染量处于下降状态,同时防黑加固相关数据显示对于弱口令爆破拦截的次数持续上升,且单日的拦截次数高达400多万次。...

View Article

Image may be NSFW.
Clik here to view.

Threatlist: SMB Security Challenges Grow with the Cloud

Top IT security barriers cited by respondents include budget constraints, and limited time to research and understand new threats. Firewall and network security is the No. 1 concern when it comes to...

View Article


台积电昨晚遭“病毒入侵”:全产线停摆

原标题:台积电昨晚遭“病毒入侵”:全产线停摆 【中关村在线新闻资讯】8月4日消息,昨日,晶圆代工龙头台积电传出电脑系统遭到电脑病毒攻击,造成台积电北、中、南三大生产基地停摆。对此台积电方面做出回应证实遭到电脑病毒攻击,但并非外传遭骇客攻击。...

View Article

Image may be NSFW.
Clik here to view.

台积电晶圆厂遭受病毒攻击,官方辟谣非黑客攻击

台积电是全球最大的晶圆代工厂,一家就占了全球代工市场总值500多亿市场的60%份额,是苹果、联发科、海思及AMD、NVIDIA等公司的主要代工厂。今天有消息称台积电的8寸及12英寸晶圆厂遭到病毒攻击,导致生产线停机,致使生产线上的晶圆报废。台积电官方声明证实了遭遇病毒,但否认是黑客攻击,具体损失情况还在了解中。...

View Article


Image may be NSFW.
Clik here to view.

FBI逮捕“千人计划”华裔工程师郑小清,称其盗窃GE公司商业机密

继上华人工程师张晓浪涉嫌盗取苹果无人驾驶技术机密被FBI逮捕事件后,另一位华人工程师也被捕了。 据《华尔街日报》报道,被捕者是国家“千人计划”专家、通用电气主任工程师(Principal Engineer at GE Power)郑小清,他被指控涉嫌窃取蒸汽涡轮制造流程图等技术机密送回中国。 根据纽约北区联邦法庭的起诉书,FBI 称郑小清把 39...

View Article

Agda 实现类型安全的 printf

完整问题描述 首先我自己想了一个比较 naive 的实现,是把 printf 的填充变量的参数做成一个 List ,然后对这个 List 通过 dependent function 的特性进行一些限制,达到类型安全的效果(比如传入一个该 List 合法的证明)。 于是我写了一个很丑很幼稚很年轻很简单的实现,最后发现传递证明比较繁琐,肯定是不理想的,遂放弃(并没有很好地理由 dependent...

View Article


Image may be NSFW.
Clik here to view.

苹果上你不知道的最牛5款杀毒软件

『搞机汇供稿』尽管iPhone和iPad不会像windows一样容易受到恶意软件的影响,但我们的设备还是会受到其他威胁的影响,例如恶意网站,烦人的广告,木马等等。...

View Article

Image may be NSFW.
Clik here to view.

Security world to hit Las Vegas for a week of hacking, cracking, fun

About a quarter of a century ago, a handful of hackers decided to have a party in a cheap hotel, and had a whale of a time. Fast forward to 2018, and that get-together has grown into events that will...

View Article

Image may be NSFW.
Clik here to view.

Build a DIY security camera with neural compute stick (part 2)

The previous post shows you how to build a security camera powered by Raspberry Pi and Movidius neural compute stick that detects people in real time and saves only useful image frames. This time, I...

View Article
Browsing all 12749 articles
Browse latest View live