Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

10 Reasons Why You Should Pursue a Career in Information Security

The escalating number of data breaches and threats like ransomware has created a mad dash for information security help. Organizations are scrambling to fill jobs and to compete for top talent, and...

View Article



Image may be NSFW.
Clik here to view.

This Week in Security News: Banks and Botnets

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, the FBI warned U.S. banks of a wide-scale...

View Article

Image may be NSFW.
Clik here to view.

PNP, Globe Telecom intensify crackdown on network hackers

The Philippine National Police (PNP) and Globe Telecom’s security team have intensified their nationwide clampdown on the unauthorized sale of international long distance calls in a bid to effectively...

View Article

Intrusion Detection for Containers Q&A What’s Next for Alert Logic’s Con ...

Last month, Alert Logic announced the industry’s first network intrusion detection for containers. Since then, we have been going “under the hood” so to speak with a three-part blog series about our...

View Article

IDG Contributor Network: Balancing cybersecurity and regulatory compliance

Rigorous regulations like GDPR and California’s Consumer Privacy Act will only become more prevalent, as long as our current cybersecurity landscape continues to suffer the near-crippling data breach...

View Article


Image may be NSFW.
Clik here to view.

Container Image Registry Security Best Practices

What Is a Container Registry? You don’t store containers for deployment ― you store container images, and you generate containers from those images as needed. Each container is an instance of the...

View Article

Image may be NSFW.
Clik here to view.

Launching scans

In the past few days, we've been describing Burp's forthcoming support for multiple parallel scans , improved management of system resources , and the new configuration library . Today, we'll look at...

View Article

Image may be NSFW.
Clik here to view.

Stuff The Internet Says On Scalability For August 17th, 2018

Hey, it's HighScalability time: The amazing Zoomable Universe from 10^27 meters―about 93 billion light-years―down to the subatomic realm, at 10^-35 meters. Do you like this sort of Stuff? Please lend...

View Article


Image may be NSFW.
Clik here to view.

Samsung Galaxy Note 9 update adds toggle for super slow-motion recording...

One of the biggest highlights of Samsung’s Galaxy S9 earlier this year was the camera, and the super slow-motion video mode got a lot of attention. That same feature is available on the Note 9, and...

View Article


Image may be NSFW.
Clik here to view.

BlackHat USA 2018 议题 PPT 下载

原文来自安全客,原文链接: https://www.anquanke.com/post/id/153621 BlackHat USA 2018 已经结束,我们目前收集到了BlackHat今年75%的议题PPT,欢迎各位安全爱好者下载学习。 下载链接: https://yunpan.360.cn/surl_ydv5brvsi49 (提取码:7ce7) 活动简介...

View Article

Image may be NSFW.
Clik here to view.

Trickbot Banking Trojan August 2018 Updated with Stealth Code Injection

The Trickbot banking Trojan has received an August 2018 update which adds a new code injection module. The infamous malware has remained active over the years as one of the most prominent Trojans used...

View Article

Trump says he may revoke another security clearance 'very quickly'

President Trump on Friday said he is close to revoking the security clearance of a current Justice Department employee who had been in contact with the author of the controversial dossier alleging ties...

View Article

Increasing Online Security by Reducing Passwords

Anyone who has been online for a while most likely has numerous online accounts. It’s just a fact of online life. For example e-commerce sites may ask you to register so you can come back later to...

View Article


Image may be NSFW.
Clik here to view.

What is Nmap? Why you need this network mapper

Network administrators, IT managers and security professionals face a never-ending battle, constantly checking on what exactly is running on their networks and the vulnerabilities that lurk within....

View Article

Image may be NSFW.
Clik here to view.

2018世界杯:网络钓鱼诈骗瞄准各国球迷

在激情四射的2018世界杯期间,各国球迷除了要管好手,不去点击博彩网站外,还要警惕越来越难防的网络钓鱼诈骗。根据安全研究机构指出,早在赛事正式启动前,就有攻击者开始蠢蠢欲动了。 网络钓鱼伺机而动 安全研究人员表示,他们首先发现了广泛的网络钓鱼攻击。这些攻击是通过电子邮件形式发送给各国球迷的。邮件中号称附带了赛程和比赛结果的跟踪工具,球迷们只需下载安装就能随时了解世界杯的最新战况。...

View Article


Think Like an Attacker: Three Network Security Points to Identify and Protect

Pulling the plug on the Internet is often jokingly referred to as the best solution for network security . All kidding aside, anything you can do to make it harder for the bad guys to gain access to...

View Article

Image may be NSFW.
Clik here to view.

HTTPS Web Filters Can Harm Your Security Here’s How!

Security features that decrypt and inspect HTTPS traffic almost always harm security. Some even introduce “severe vulnerabilities,” according to research from the Internet Society. In The Security...

View Article


Image may be NSFW.
Clik here to view.

加密和解密

最近学习HTTPS的知识,涉及了一些加密和解密的内容,在Mozilla MDN上找到一篇文章 Encryption and Decryption ,清晰明了,特地翻译一下,与大家分享。 加密(Encryption )是将原始信息转化为对其他用户非明了信息的过程,除非信息的接受者; 解密(Decryption) 是将非明了信息转化为原始数据的过程。加密算法,也称作 密码 (cipher,...

View Article

Image may be NSFW.
Clik here to view.

今日宝典:黑客到底多爱搞酒店

今天是什么日子? 七夕,对单身狗不太友好的一天。除了朋友圈里的花式秀恩爱,杜蕾斯七夕文案一如既往的骚,顺便还搞了个抽奖:你所有登顶的姿态,都有我来见证。转发本条微博,杜杜随机抽选2位朋友送出杜蕾斯&Jeep七夕定制礼盒。 然而就在这条微博下,有个不一样的声音,某个性网友:放心,我已经安排了哥们去黑附近的酒店了,安排得明明白白。...

View Article

10 Benefits of Security Awareness Training

Great training is the bedrock of engaged employees. Engaged means they are aware of and follow directives. Without training, employees could be making serious mistakes, especially in the realm of...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images