Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

链圈必读:一文看懂区块链安全6大分类3大问题

文/阿尔法公社 一、导语...

View Article



Image may be NSFW.
Clik here to view.

New Uber Chief Security Officer Has N.S.A. Past

Advertisement Supported by Uber Picks N.S.A. Veteran to Fix Troubled Security Team Image Former National Counterterrorism Center Director Matt Olsen testifying before the House Intelligence Committee...

View Article

Security flaws in police body cameras open the devices to attack

Police body cameras are riddled with security vulnerabilities that could allow a hacker to remotely tweak or delete footage, track the cops wearing them, or weaponize the bodycam by installing malware...

View Article

Image may be NSFW.
Clik here to view.

PTC Launches Cybersecurity Initiative to Collaborate with Customers,...

New Program to Address Product Vulnerabilities as Component of PTC’s Shared Responsibility Model NEEDHAM, Mass. (BUSINESS WIRE) #IoT Continuing its commitment to promoting shared responsibility for...

View Article

Image may be NSFW.
Clik here to view.

Farsight Security COO Alexa Raad: 'Be Your Own Champion'

Alexa Raad is chief operating officer of Farsight Security , based in San Mateo, California. Farsight Security is a provider of real-time actionable Internet threat intelligence solutions. In this...

View Article


IoT Cybersecurity Requires More Than Scare Tactics

LAS VEGAS ― McAfee’s Lead Scientist and Senior Principal Engineer Christiaan Beek was in the hospital with his expectant wife when he inadvertently learned about a troubling IoT cybersecurity...

View Article

Image may be NSFW.
Clik here to view.

Recapping a Hot Week in Vegas

Our sunny week in Las Vegas has come to an end. Looking back, it's fascinating how so much happened in less than a week. Thousands of faces, hundreds of conversations and many new insights on AppSec....

View Article

Image may be NSFW.
Clik here to view.

Tencent Blade Team pair talk about smart speaker hack

Security researchers turned themselves into hackers this month to demo the way a smart speaker could be turned into a spy. The researchers took their story to DefCon 2018. They said they achieved...

View Article


Three more data-leaking security holes found in Intel chips as designers swap...

Intel will today disclose three more vulnerabilities in its processors that can be exploited by malware and malicious virtual machines to potentially steal secret information from computer memory....

View Article


Image may be NSFW.
Clik here to view.

Protecting Our Customers through the Lifecycle of Security Threats

By Leslie Culbertson Intel’s Product Assurance and Security (IPAS) team is focused on the cybersecurity landscape and constantly working to protect our customers. Recent initiatives include the...

View Article

August 2018 Security and Quality Rollup

Today, we are releasing the August 2018 Security and Quality Rollup. Security CVE-2018-8360 windows Information Disclosure Vulnerability This update resolves an information disclosure vulnerability in...

View Article

Image may be NSFW.
Clik here to view.

What Is an EV Multi-Domain SSL Certificate Revocation Information and...

What Is an EV Multi-Domain SSL Certificate Revocation Information and Reporting Policy? bwhitlock Tue, 08/14/2018 10:08 To illustrate, SSL certificate provider Entrust says it must revoke extended...

View Article

php中利用格式化字符串漏洞绕过addslashes注入

php中sprintf的使用方法 查阅 官方文档 如果熟悉c语言的printf对sprintf的用法也不会很陌生。 <?php $num = 5; $location = 'tree'; $format = 'There are %d monkeys in the %s'; echo sprintf($format, $num, $location); ?> 用 %...

View Article


Image may be NSFW.
Clik here to view.

威盛C3处理器惊现上帝模式后门:一个简单命令搞定

今年初曝光的Spectre幽灵、Metldown熔断让大家对处理器安全漏洞有了更深刻的认识和警醒。事实上,就像任何软件都不可能完美,处理器存在漏洞也是很平常的事儿,但除了漏洞还有一种人为隐藏的后门,就更可怕了。 在近日举办的黑帽大会上,安全研究员Christopher Domas就披露, VIA威盛旗下的C3系列处理器,存在一个超级后门,linux系统下只需要一个再简单不过的命令“.byte...

View Article

Image may be NSFW.
Clik here to view.

0-day flaw in macOS High Sierra lets hackers dump all passwords from keychain

Apple prides itself on the airtight security offered by its family of products, including the Mac operating system, macOS. But while considerably less targeted by hackers, macOS is still vulnerable to...

View Article


Image may be NSFW.
Clik here to view.

Kedi Trojan Removal ― Identify and Delete Active Infections

The Kedi Trojan is a newly discovered malware that is being distributed worldwide that uses Gmail to communicate with the hacker-controlled servers. The code analysis reveals that it is a complex...

View Article

Image may be NSFW.
Clik here to view.

CVE-2018-0131 in Cisco IOS and IOS XE Switch, Router Software Patched

A new Cisco patch is available, addressing a flaw in IOS and IOS XE switch and router software. The patch has been released in regards of a disclosure of security flaw (known as CVE-2018-0131) in the...

View Article


Image may be NSFW.
Clik here to view.

Trust no one: TrustKit SSL pinning bypass

This is a blog post about disabling SSL pinning… yes, again! :) About two weeks ago I researched an iOS application. The application used TrustKit from DataTheorem to implement SSL pinning. My goal...

View Article

The Midwest’s best-kept secret is its vibrant cybersecurity community

Cisco’s announcement this month that it intends to acquire Ann Arbor-based cybersecurity startup Duo Security for a whopping $2.35 billion shines a light on the Midwest’s increasing strength in the...

View Article

Putting Stickers On Your Laptop Is Probably a Bad Security Idea

Plenty of hackers, journalists, and technologists love to cover their laptop in all manner of stickers. Maybe one shows off their employer, another flaunts that local cryptoparty they attended, or...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images