Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Hack the Box: Holiday Walkthrough

Hello friends!! Today we are going to solve another CTF challenge “Holiday” which is available online for those who want to increase their skill in penetration testing and black box testing. Holiday...

View Article



Image may be NSFW.
Clik here to view.

微信数据库最新的解密方式,使用C++代码解密微信加密数据库信息!

一、知识回顾 最近有人找我弄微信数据库解密的东西,其实这个现在网上都公开了,我在很早之前就静态分析过微信数据库加密算法,不了解的同学可以查看这里: Android中静态方式破解微信数据库加密密码 ,所以现在有人找我的话我都会告诉他们这个内容,微信数据库加密的密码很简单就是:MD5(IMEI+UIN).Substring(0,...

View Article

Image may be NSFW.
Clik here to view.

Checkmarx Closes 1H 2018 with Record Customer and Revenue Growth

Leader in Application Security Testing Continues to Redefine Security’s Role in the Software Development Lifecycle LAS VEGAS & RAMAT GAN, Israel (BUSINESS WIRE) Checkmarx , the Software Exposure...

View Article

Should a CSO/CISO Ever Be a DPO?

I finally figured out why this blog was so damned difficult [for me] to write; I’ve been thinking all wrong about what exactly a DPO actually is . Which is odd, because I had the exact same challenge...

View Article

Samsung Claims that Smartphones are the Best to Store Crypto Quashed by...

Last month, Samsung, a consumer electronics giant and one of the biggest companies worldwide, has released a blog post on its ‘Insights’ section, arguing that smartphones are the best avenue in...

View Article


Q&A: How your typing and screen swiping nuances can verify your identity

The recent data breaches at Timehop and Macy’s are the latest harbingers of what’s in store for companies that fail to vigorously guard access to all of their mission-critical systems. Related...

View Article

Making App Password Changes Easier

A common technical challenge for developers, operations, and IT security is the management of service account credentials used by applications. Service accounts are needed to authorize different...

View Article

Image may be NSFW.
Clik here to view.

The trend of issuing corporate stock on the Blockchain has already started

The trend of issuing corporate stock on the Blockchain has alreadystarted Programmable securities have been under discussion for the past 6 months in diverse mediaoutlets. While some experts are...

View Article


Open Source Security Tools for AWS

Does it surprise you that cloud platforms are not turnkey security environments? It shouldn’t, especially if your business has been using cloud services for a while. If you have oversight of any data...

View Article


Image may be NSFW.
Clik here to view.

Virtual Trusted Platform Module for Shielded VMs: security in plaintext

Virtual Trusted Platform Module for Shielded VMs: security in plaintext 2018-08-07 admin Uncategorized No comments Source: Virtual Trusted Platform Module for Shielded VMs: security in plaintext from...

View Article

Image may be NSFW.
Clik here to view.

Security in plaintext: use Shielded VMs to harden your GCP workloads

Security in plaintext: use Shielded VMs to harden your GCP workloads 2018-08-07 admin Uncategorized No comments Source: Security in plaintext: use Shielded VMs to harden your GCP workloads from Google...

View Article

Image may be NSFW.
Clik here to view.

Get The 2018 Cyber Security Bootcamp Bundle at 98% off - deal ends today

Today's highlighted deal comes from ourOnline Courses section of theNeowin Deals store, where you can save 98% off this 2018 Cyber Security Bootcamp Bundle . 75 cyber security courses, 115 hours of...

View Article

Image may be NSFW.
Clik here to view.

Deploying TLS 1.3 at scale with Fizz, a performant open source TLS library

The new generation of Transport Layer Security (TLS 1.3) incorporates several new features that make internet traffic more secure, including encrypting handshake messages to keep certificates private,...

View Article


Image may be NSFW.
Clik here to view.

Facebook open sources library to enhance latest Transport Layer Security...

For several years, the Internet Engineering Task Force (IETF) has been working to improve the Transport Layer Security (TLS) protocol, which is designed to help developers protect data as it moves...

View Article

A week in security (July 30 August 5)

Last week, we posted a roundup of spam that may have landed in your mailbox, talked about what makes us susceptible to social engineering tactics, and took a deep dive into big data . Other news:...

View Article


Image may be NSFW.
Clik here to view.

基于沙盒技术的企业移动应用安全平台设计

本文始发于博客: https://zhaomenghuan.github.i... 前言 移动互联网的飞速发展, 改变了企业传统的业务模式, 提高了工作效率. 但同时也给企业的数据安全带来了巨大的挑战, 我们面对各种攻击的可能性会大 大增加, 面临潜在的风险: 移动设备中的不安全应用程序会危及到企业网络的安全; 移动设备可能在不安全的网络(如公共 WiFi 热 点)中使用,...

View Article

Image may be NSFW.
Clik here to view.

芯片巨头台积电中招!3天内被勒索17亿 三大产线停摆

还记得去年5月肆虐全球的勒索病毒吗?这款病毒曾短时间内攻击150个国家,至少30万名用户中招,造成损失达80亿美元。 距离勒索病毒大规模爆发已经过去一年多,全世界最大的半导体代工厂、信息安全的典范企业台积电却于日前遭到侵袭,造成17.6亿元的营业损失。而作为即将在秋季发布的新款iPhoneX的芯片生产商,台积电此次遭入侵事件也让关注新一代iPhone的人们捏了把汗。...

View Article


Image may be NSFW.
Clik here to view.

New Attack on WPA/WPA2 Discovered, Most Modern Routers at Risk

A new attack on Wi-Fi protected access protocols has been discovered. The new technique to crack WPA PSK (Pre-Shared Key) passwords enables outside users to capture access credentials easily. The...

View Article

Image may be NSFW.
Clik here to view.

SSL Provider error 31 when connecting to SQL in a docker container

I recently bought a Dell XPS 13 running Ubuntu 16.04 and ran into an issue when connecting SQL Operations Studio (version 0.31.4) to SQL 2017 CU9 running in a docker container. Other people seem to...

View Article

Top iPhone Supplier Battles WannaCry Infection

Production lines were halted for two days, and the effects to the global supply chain for mobile phones could be felt for the third quarter and beyond. A top iPhone supplier, Taiwan Semiconductor...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images