Quantcast
Browsing all 12749 articles
Browse latest View live

Xfinity August 2018 security vulnerability: Everything you need to know

Out in the open Xfinity August 2018 security vulnerability: Everything you need to know Two different vulnerabilities exposed social security numbers and addresses. Joe Maring 9 Aug 2018 Comcast's...

View Article


百度利用AI技术构建网络安全,否认说过“All in AI”

虽然百度创始人李彦宏否认说过“All in AI”,但对AI的重视不言而喻。以“放肆AI安全”命名的BSRC盛典上,受邀的白帽子开始考虑如何把技术擅长与AI进行结合。 得益于AI技术的进步和发展,网络安全攻防战中的矛与盾都得到了“加固”。究竟谁能胜出? “长期一定是一个持续的对抗过程,阶段性能说谁有优势。特别是在AI方面,我认为阶段性是攻击者有优势,因为整个防御体系还没有建立起来。”...

View Article


我国网络安全执法体制还有待进步,助力推出规范化执法体系

12月26日,全国人大常委会执法检查组关于检查网络安全法、全国人大常委会关于加强网络信息保护的决定实施情况的报告日前提交全国人大常委会审议。报告指出,我国网络安全监管“九龙治水”现象仍然存在,网络安全执法体制有待进一步理顺。...

View Article

Image may be NSFW.
Clik here to view.

Complementary Gartner Report: Peer Insights ‘Voice of the Customer’ Securit ...

We’re pleased to announce InfoSec Institute is named to the Customers’ Choice Zone of the Gartner Peer Insights ‘Voice of the Customer’: Security Awareness Computer-Based Training Market Report . Free...

View Article

Image may be NSFW.
Clik here to view.

Oh, No, Not Another Security Product

Let's face it: There are too many proprietary software options. Addressing the problem will require a radical shift in focus. Organizations and businesses of all types have poured money into...

View Article


Image may be NSFW.
Clik here to view.

Researchers help close security hole in popular encryption software

Analysis of the AM-modulated signal showing the portion relevant to the security of the encryption software. Credit: Georgia Tech Cybersecurity researchers at the Georgia Institute of Technology have...

View Article

Image may be NSFW.
Clik here to view.

Chrome Redesign, Homeland Security, & More…

Keeping you up to date with the latest news and most interesting stories in software development, welcome to another weekly installment of the dev digest. This week’s articles discuss security, UX,...

View Article

Image may be NSFW.
Clik here to view.

DHS Research Shows Overwhelming Vulnerabilities in Smartphones

Research funded by the Department of Homeland Security (DHS) has reported that millions of smartphone users are potentially at risk of having cybercriminals take total control of their mobile devices....

View Article


Image may be NSFW.
Clik here to view.

People Think Their Passwords Are Too Awesome For Two Factor Authentication....

Two factor authentication vastly improves your security, but hardly anyone uses it: only 10 percent of Google users enable the feature, for example. Why is that? RELATED: What Is Two-Factor...

View Article


More Performance At The Edge

Shrinking features has been a relatively inexpensive way to improve performance and, at least for the past few decades, to lower power. While device scaling will continue all the way to 3nm and maybe...

View Article

A New Pacemaker Hack Puts Malware Directly On the Device

The first pacemaker hacks emerged abouta decade ago. But the latest variation on the terrifying theme depends not on manipulating radio commands, as many previous attacks have, but on malware...

View Article

Smartphone Voting Is Happening, but No One Knows if It's Safe

When news hit this week that West Virginian military members serving abroad will become the first people to vote by phone in a major US election this November, security experts were dismayed. For...

View Article

Tufin & Fortinet: Policy-Based Change Automation Across the Security...

Tufin and Fortinet have a long history of working together to help joint customers overcome their security concerns, so it’s very fitting that we’d team up at this year’s Black Hat the world’s leading...

View Article


Image may be NSFW.
Clik here to view.

West Virginia and the Voatz “blockchain” voting system ― scaling and security...

In May, West Virginia ran a limited pilot programme using Voatz’ “blockchain” voting system, which Iwrote about in June ― it’s actually a mobile phone voting system, with a blockchain tacked on the...

View Article

Image may be NSFW.
Clik here to view.

BlackHat USA 2018 | 次日议题精彩解读

Black Hat官网地址: https://www.blackhat.com/ 会议介绍 BlackHat作为全球信息安全行业的最高盛会,有着悠久历史,今年已经进入了第21个年头,每次会议的议题筛选都极为严格。众多议题提交后通过率不足20%,所以Black Hat也被称为最具技术性的信息安全会议。...

View Article


Image may be NSFW.
Clik here to view.

注意!全球超过170000台设备上被安装恶意挖矿软件

根据安全公司Trustwave发布的博客文章,上个月末,在MicroTik路由器上发生了一个大规模的网络攻击。Coinhive导致超过17000台设备上的恶意采矿软件。 TrustWave安全研究人员SimonKenin写道,所有的设备都使用“相同密钥”,这表明这个实体从所有设备中都可获取加密货币。 他写道:...

View Article

Image may be NSFW.
Clik here to view.

大受褒扬,BCH中国开发者走向世界!

作为数字货币中最具去中心化的存在,BCH有着去中心化的开发团队,比如bitcoinABC、bitcoinUnlimited、bitcoinXT等等,当然也有对BCH智能合约不懈努力的nChain团队。但是无论如何,其中最大的表象在于,中国的BCH开发者在开发权重上并没有太大的影响。但是随着国内BCH社区以及开发者的不断努力,这一切也在悄然改变。...

View Article


Image may be NSFW.
Clik here to view.

安博通策略可视化产品:我们为你看见更多安全可能

人眼能看到的最大视角是180度 这意味着我们只能看到世界的一半 跨越现实的介质,在网络世界中 我们无法看见的地方仍存在许多安全问题: 不可靠的安全架构 爆炸的节点数量 无法预测的安全风险 不可见的防御系统 我们不满足现有的状态 渴望看到一个360度的世界 于是我们创造了 SPOS-Trace 安全策略可视化平台 当我们这么做时,一切变得简单起来 我们从安全策略视角切入 让改变发生,让一切可视化...

View Article

Image may be NSFW.
Clik here to view.

Intel Graphics Driver update for Windows 10 brings security fixes and...

Image via IntelIntel has released a new integrated graphics (GPU) driver bumping the version up to 24.20.100.6229. The driver is compatible with 6th, 7th, and 8th generation processors as well as some...

View Article

Image may be NSFW.
Clik here to view.

Secure Your Gaming Company With Auth0's Fraud Protection

In April 2018, Epic Games’ Fortnite generated $296 million ―more than double what it generated in February. Growth was rapid across mobile, console, and PC platforms. At the same time as users peaked...

View Article
Browsing all 12749 articles
Browse latest View live