Xfinity August 2018 security vulnerability: Everything you need to know
Out in the open Xfinity August 2018 security vulnerability: Everything you need to know Two different vulnerabilities exposed social security numbers and addresses. Joe Maring 9 Aug 2018 Comcast's...
View Article百度利用AI技术构建网络安全,否认说过“All in AI”
虽然百度创始人李彦宏否认说过“All in AI”,但对AI的重视不言而喻。以“放肆AI安全”命名的BSRC盛典上,受邀的白帽子开始考虑如何把技术擅长与AI进行结合。 得益于AI技术的进步和发展,网络安全攻防战中的矛与盾都得到了“加固”。究竟谁能胜出? “长期一定是一个持续的对抗过程,阶段性能说谁有优势。特别是在AI方面,我认为阶段性是攻击者有优势,因为整个防御体系还没有建立起来。”...
View Article我国网络安全执法体制还有待进步,助力推出规范化执法体系
12月26日,全国人大常委会执法检查组关于检查网络安全法、全国人大常委会关于加强网络信息保护的决定实施情况的报告日前提交全国人大常委会审议。报告指出,我国网络安全监管“九龙治水”现象仍然存在,网络安全执法体制有待进一步理顺。...
View ArticleComplementary Gartner Report: Peer Insights ‘Voice of the Customer’ Securit ...
We’re pleased to announce InfoSec Institute is named to the Customers’ Choice Zone of the Gartner Peer Insights ‘Voice of the Customer’: Security Awareness Computer-Based Training Market Report . Free...
View ArticleOh, No, Not Another Security Product
Let's face it: There are too many proprietary software options. Addressing the problem will require a radical shift in focus. Organizations and businesses of all types have poured money into...
View ArticleResearchers help close security hole in popular encryption software
Analysis of the AM-modulated signal showing the portion relevant to the security of the encryption software. Credit: Georgia Tech Cybersecurity researchers at the Georgia Institute of Technology have...
View ArticleChrome Redesign, Homeland Security, & More…
Keeping you up to date with the latest news and most interesting stories in software development, welcome to another weekly installment of the dev digest. This week’s articles discuss security, UX,...
View ArticleDHS Research Shows Overwhelming Vulnerabilities in Smartphones
Research funded by the Department of Homeland Security (DHS) has reported that millions of smartphone users are potentially at risk of having cybercriminals take total control of their mobile devices....
View ArticlePeople Think Their Passwords Are Too Awesome For Two Factor Authentication....
Two factor authentication vastly improves your security, but hardly anyone uses it: only 10 percent of Google users enable the feature, for example. Why is that? RELATED: What Is Two-Factor...
View ArticleMore Performance At The Edge
Shrinking features has been a relatively inexpensive way to improve performance and, at least for the past few decades, to lower power. While device scaling will continue all the way to 3nm and maybe...
View ArticleA New Pacemaker Hack Puts Malware Directly On the Device
The first pacemaker hacks emerged abouta decade ago. But the latest variation on the terrifying theme depends not on manipulating radio commands, as many previous attacks have, but on malware...
View ArticleSmartphone Voting Is Happening, but No One Knows if It's Safe
When news hit this week that West Virginian military members serving abroad will become the first people to vote by phone in a major US election this November, security experts were dismayed. For...
View ArticleTufin & Fortinet: Policy-Based Change Automation Across the Security...
Tufin and Fortinet have a long history of working together to help joint customers overcome their security concerns, so it’s very fitting that we’d team up at this year’s Black Hat the world’s leading...
View ArticleWest Virginia and the Voatz “blockchain” voting system ― scaling and security...
In May, West Virginia ran a limited pilot programme using Voatz’ “blockchain” voting system, which Iwrote about in June ― it’s actually a mobile phone voting system, with a blockchain tacked on the...
View ArticleBlackHat USA 2018 | 次日议题精彩解读
Black Hat官网地址: https://www.blackhat.com/ 会议介绍 BlackHat作为全球信息安全行业的最高盛会,有着悠久历史,今年已经进入了第21个年头,每次会议的议题筛选都极为严格。众多议题提交后通过率不足20%,所以Black Hat也被称为最具技术性的信息安全会议。...
View Article注意!全球超过170000台设备上被安装恶意挖矿软件
根据安全公司Trustwave发布的博客文章,上个月末,在MicroTik路由器上发生了一个大规模的网络攻击。Coinhive导致超过17000台设备上的恶意采矿软件。 TrustWave安全研究人员SimonKenin写道,所有的设备都使用“相同密钥”,这表明这个实体从所有设备中都可获取加密货币。 他写道:...
View Article大受褒扬,BCH中国开发者走向世界!
作为数字货币中最具去中心化的存在,BCH有着去中心化的开发团队,比如bitcoinABC、bitcoinUnlimited、bitcoinXT等等,当然也有对BCH智能合约不懈努力的nChain团队。但是无论如何,其中最大的表象在于,中国的BCH开发者在开发权重上并没有太大的影响。但是随着国内BCH社区以及开发者的不断努力,这一切也在悄然改变。...
View Article安博通策略可视化产品:我们为你看见更多安全可能
人眼能看到的最大视角是180度 这意味着我们只能看到世界的一半 跨越现实的介质,在网络世界中 我们无法看见的地方仍存在许多安全问题: 不可靠的安全架构 爆炸的节点数量 无法预测的安全风险 不可见的防御系统 我们不满足现有的状态 渴望看到一个360度的世界 于是我们创造了 SPOS-Trace 安全策略可视化平台 当我们这么做时,一切变得简单起来 我们从安全策略视角切入 让改变发生,让一切可视化...
View ArticleIntel Graphics Driver update for Windows 10 brings security fixes and...
Image via IntelIntel has released a new integrated graphics (GPU) driver bumping the version up to 24.20.100.6229. The driver is compatible with 6th, 7th, and 8th generation processors as well as some...
View ArticleSecure Your Gaming Company With Auth0's Fraud Protection
In April 2018, Epic Games’ Fortnite generated $296 million ―more than double what it generated in February. Growth was rapid across mobile, console, and PC platforms. At the same time as users peaked...
View Article