Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

When ok is not ok: Security presenter talks about synthetic clicks

A warnings bypass in macOS High Sierra made news this week in security land. Think on lines such as security check-ins, where the user is asked to confirm that an app should be granted permission to...

View Article



Image may be NSFW.
Clik here to view.

360企业安全:大数据驱动网络安全重构

8月14日,由国家计算机网络应急技术处理协调中心主办的中国网络安全年会在北京国家会议中心召开。360企业安全集团副总裁韩永刚和白皓文、潘博文、陈力波、郑晓峰5位专家在大会期间发表主题演讲,阐释了大数据驱动安全理念。 大数据驱动网络安全重构 “创可贴”思路已然过时...

View Article

2018中国网络安全年会:聚焦数据安全和信息保护

8月15日,以“荟聚安全大脑、护航智能生态”为主题的2018中国网络安全年会(第15届)在北京国家会议中心召开。本次大会由中央网络安全和信息化委员会办公室指导,国家互联网应急中心(CNCERT)主办,中国互联网协会网络与信息安全工作委员会和中国通信学会通信安全技术委员会协办。中央网信办副总工、国家互联网应急中心主任李湘宁,工业和信息化部网络安全管理局局长赵志国,公安部十一局副局长李彤等出席大会并作主...

View Article

Image may be NSFW.
Clik here to view.

Quanergy Extends Standard Warranty of M8 Sensor to Two Years

Industry-first warranty represents major confidence in newly automotive-compliant M8 sensors SUNNYVALE, Calif. (BUSINESS WIRE) #lidar Quanergy Systems Inc., a global leader in the design and...

View Article

Image may be NSFW.
Clik here to view.

盛邦安全出席2018中国网络安全年会并发声:AI助力网络安全将大有可为

2018年8月14日-16日,以“荟聚安全大脑...

View Article


Image may be NSFW.
Clik here to view.

Three-quarters of corporate network breaches are via web applications

According to a new report from Kaspersky Lab , 73 percent of successful perimeter breaches on corporate networks in 2017 were achieved using vulnerable web applications. In addition to web...

View Article

Image may be NSFW.
Clik here to view.

工信部网络安全管理局局长赵志国:突破网络安全核心技术是应对高等级网络攻击威胁的根 ...

【 编者按 】2018年8月15日,在2018中国网络安全年会上, 工信部网络安全管理局局长赵志国...

View Article

Image may be NSFW.
Clik here to view.

Malspam Campaign Targets Banks Using Microsoft Publisher

It's very unusual for malware authors to utilize publishing software like Microsoft Publisher which is mainly used for fancy documents and desktop publishing tasks. So when we saw an email sample with...

View Article


Apple confirms teen hacker took no customer data

An Australian teenager has pleaded guilty to charges of breaking into Apple’s main computer network and downloading data, sparking fears of another breach of customers’ personal data. However, Apple...

View Article


使用 openssl 生成证书(含openssl详解)

一、openssl 简介 openssl 是目前最流行的 SSL 密码库工具,其提供了一个通用、健壮、功能完备的工具套件,用以支持SSL/TLS 协议的实现。 官网: https://www.openssl.org/source/ 构成部分 密码算法库 密钥和证书封装管理功能 SSL通信API接口 建立 RSA、DH、DSA key 参数 建立 X.509...

View Article

How do I perform a security check and configure using the Doctrine and...

I'd like to understand how to do a safe "test and set" operation with Doctrine and Symfony. I'm building a meeting scheduling system. I have an entities called MeetingTime, Teacher and Student...

View Article

Image may be NSFW.
Clik here to view.

More efficient security for cloud-based machine learning

A novel encryption method devised by MIT researchers secures data used in online neural networks, without dramatically slowing their runtimes, which holds promise for medical-image analysis using...

View Article

Top 10 Skills Security Professionals Need to Have in 2018

The shortage of information security talent gives infosec professionals a strong advantage in the job market, and those looking for new employment don’t have to wait long to find it. Recent research by...

View Article


Best Practices for Securing Crypto Currency exchange

In our last blog on crypto we discussed on a case study related to penetration testing of crypto exchange. Today we are going to discuss on best security practices for securing crypto exchange sites....

View Article

Information Security Monthly Newsletter Aug 2018

The newsletter consists of high-level executive summary of most of the important news, articles, data breaches and Microsoft patches details that have been published on information security. Each news...

View Article


Image may be NSFW.
Clik here to view.

The International Association of Privacy Professionals CIPT Certification

One of the most pressing issues in the Internet age is data protection. The data of individuals and businesses must be protected from malicious entities, many of whom see clear profit in accessing the...

View Article

Advent of Code 2015 Day 4 - The Ideal Stocking Stuffer

Santa needs help mining some AdventCoins (very similar to bitcoins ) to use as gifts for all the economically forward-thinking little girls and boys. To do this, he needs to find MD5 hashes which, in...

View Article


Is Your Business at Risk of Identity Theft? Beware of These 4 Threats

The concept of identity has always fascinated me: it's tied to the way we define ourselves and relate to others. But I'm also constantly thinking about the ways in which we secure and managedigital...

View Article

Image may be NSFW.
Clik here to view.

关于 iOS 集合官方文档的一份小笔记

添加到 iOS 集合内的对象必须是对象。 作为集合,需要满足三个基本的特性: 获取元素 、 查找元素 、 遍历元素 ; 如果集合是可变的还需要另外支持 添加元素 和 删除元素 。 Array 添加到 Array 内的元素都是有序的,同一对象可多次被添加到集合。和其它集合相比, Array 遍历内部元素十分方便。 Array 内元素必须是对象 ( NSPointArray 除外)。 Array 的分类...

View Article

Image may be NSFW.
Clik here to view.

ThreatList: Almost Half of the World’s Top Websites Deemed ‘Risky’

An analysis of the world’s most-visited websites shows that vulnerable software, too much active content and large amounts of code execution open visitors to a raft of potential dangers. Nearly half of...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images