Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Leaving Your Mark: Thermal Signatures of Passwords Left on Keyboards

We leave evidence of where we’ve been and what we’ve done all over the place. From footprints to DNA, we seldom act without a trace. Our keyboards are no exception. I’m not talking just about...

View Article


Finding Your Weakness: Triaging Your Domains with SWAT

I have been involved in IT and security in one way or another for almost 30 years . I have worked full time for organizations and consulted in a wide variety of jobs and responsibilities. But one of...

View Article


Image may be NSFW.
Clik here to view.

Huobi, One of World’s Largest Crypto Exchanges, Invests in OpenFinance Network

OpenFinance Network announces strategic investment by global crypto exchange, Huobi, into its US-compliant security token trading platform. CHICAGO (BUSINESS WIRE) #DigitalSecurities ― Huobi , one of...

View Article

The complete guide to understanding web applications security

MODERN businesses use web applications every dayto do different things, from interacting and engaging with customers to supporting sales and operations. As a result, web applications are rich with data...

View Article

Image may be NSFW.
Clik here to view.

Here are 3 things that make cardless ATMs secure

iStock Technology makes our lives easier every day. How we respond to texts and emails, pay for our lunches, even withdraw cash ― it's all been affected by advances in lifestyle technology. Cardless...

View Article


Image may be NSFW.
Clik here to view.

Beefing Up Your Cloud Provider’s Security

Cloud computing environments are designed to be secure by default. That does not mean, however, that they are free from security vulnerabilities, or that there is nothing you need to do as a user to...

View Article

Image may be NSFW.
Clik here to view.

Gartner Says IT Security Spending to Hit $124B in 2019

Global IT security spending will grow 12.4% in 2018 and another 8.7% in 2019. IT security spending is growing at a healthy 12.4% and will continue to expand based on demand generated by concerns of...

View Article

Hack mobile point-of-sale systems? Researchers count the ways

Ever since the infamous and massive security breach at retailer Target nearly five years ago, more and more attention has focused on the potential flaws that can make payment systems vulnerable to...

View Article


How to Do User Authentication With the Symfony Security Component

In this article, you'll learn how to set up user authentication in php using the Symfony Security component. As well as authentication, I'll show you how to use its role-based authorization, which you...

View Article


Image may be NSFW.
Clik here to view.

Security assessment of corporate information systems in 2017

Each year, Kaspersky Lab’s Security Services department carries out dozens of cybersecurity assessment projects for companies worldwide. In this publication, we present a general summary and statistics...

View Article

Image may be NSFW.
Clik here to view.

Remove ShutUpAndDance Virus and Restore .ShutUpAndDance Files

The ShutUpAndDance Virus is a basic ransomware strain of the Hidden Tear family. The security analysis shows that this is the initial release of the threat, future updates are expected in coordinated...

View Article

Image may be NSFW.
Clik here to view.

CVE-2018-4878 Flash 0day漏洞攻击样本解析

背景 2018年1月31日,韩国CERT发布公告称发现Flash 0day漏洞的野外利用,攻击者执行针对性的攻击;2月1日Adobe发布安全公告,确认Adobe Flash Player 28.0.0.137及早期版本存在远程代码执行漏洞(CVE-2018-4878);2月2日,Cisco...

View Article

Image may be NSFW.
Clik here to view.

Beyond Basic R Mapping

(This article was first published on The USGS OWI blog , and kindly contributed toR-bloggers) Introduction There are many different R packages for dealing with spatial data. The main distinctions...

View Article


什么是整数溢出漏洞以及它带来的后果

本期将重点阐述智能合约中经常被利用且严重影响资产安全的高危漏洞类型“整数溢出”。 1.什么是“整数溢出漏洞”? 计算机语言中整数类型都有一个宽度,也就是说,一个整数类型有一个最大值和一个最小值。 当2个整数计算时,结果大于最大值或小于最小值就是溢出。举一个小例子说明一下:在区块链里面都是无符号整数,最小的就是0。 比如最大值为a,最小值为0。在最大值和最小值之间如果发生以下计算:...

View Article

Image may be NSFW.
Clik here to view.

由台积电“中毒”停摆带来的工控安全启示

台积电工厂病毒事件带来的教训是惨痛的,据估算,其带来的损失超过10亿人民币(台积电官方预估此次病毒感染事件将导致晶圆出货延迟以及成本增加,对公司第三季的营收影响约为百分之三,毛利率的影响约为一个百分点)。...

View Article


Image may be NSFW.
Clik here to view.

谁是安全产品领域的下一座圣杯(2018年)

按惯例,虽然犹豫再三拖了好几个月,还是发了这篇早已写就的文章。每年的下一座圣杯观点,介绍笔者认为两年后将初步见证成功的产品方向。很多时候,未来趋势就安静地等在那里,只是需要人们从纷繁复杂的表象中去砂里淘金。安全行业历史上的成功产品,初期即使并非蜂拥而至,也至少有五六家尝试。而追求创新却误中副车的也比比皆是。Hype...

View Article

Image may be NSFW.
Clik here to view.

牺牲安全换速度的恶果:英特尔芯片再添3个数据泄露安全漏洞

App、内核、虚拟机、SGX、SMM,全都危险了。 8月14日,英特尔再次披露 3 个芯片级漏洞,恶意软件和恶意虚拟机可利用这些漏洞从计算机内存中盗取秘密信息。...

View Article


Image may be NSFW.
Clik here to view.

6 most common cyber attacks

Cyber crime is at an all-time high. While organisationsare tryingto counter cyber attacks, criminal hackers are becomingmore innovative and their attacks more sophisticated. What isacyber attack? Cyber...

View Article

The best antivirus software? Kaspersky, Bitdefender and Trend Micro lead in...

The AV-TEST Institute recently tested the most popular windows 10 client antivirus products on three primary criteria: protection, performance, and usability. Only four of the 16 products tested earned...

View Article

Image may be NSFW.
Clik here to view.

Information Security Spending to Surge to Over $124bn by 2019

Add to favorites Robust security is not only required to protect corporate networks but has also now become a competitive advantage Global spending is expected to surge to over $124 billion by the end...

View Article
Browsing all 12749 articles
Browse latest View live