Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Security researchers say they can hack Medtronic pacemakers

Medtronic emphasizes the safety of its products. Product safety and quality are top priorities for Medtronic, and we have a strong product security program that leverages internal and external security...

View Article


Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible?

Some people enter the technology industry to build newer, more exciting kinds of technology as quickly as possible. My keynote will savage these people and will burn important professional bridges,...

View Article


Image may be NSFW.
Clik here to view.

VMware Cloud on AWS: Advanced Networking and Security with NSX-T SDDC

Announced in AWS Summit in New York last month and also briefly mentioned on the prior blog, Announcing General Availability of VMware NSX-T Data Center 2.2.0 , NSX-T networking and security is now...

View Article

Image may be NSFW.
Clik here to view.

VERIS INCIDENT FRAMEWORK

The VERIS methodology was created by Verizon back in 2010. This was an effort to create an environment for the classification of specific information. The VERIS model is applied through the process of...

View Article

7 Most Difficult Information Security Certifications

Demand for information security professionals has grown in the last few years, as more companies are upping the ante on protecting the security of their digital assets. The infosec workforce gap is...

View Article


Image may be NSFW.
Clik here to view.

Why adding bugs to software can make it safer

When it comes to radar tracking, one of the most effective countermeasure is to release a cloud of aluminum strips or metallized plastic. These strongly reflect radar and create thousands of targets,...

View Article

Image may be NSFW.
Clik here to view.

Campaign Trail: Old Spice's boardroom agenda; eBay sets up shop; Trojan...

Campaign Trail is our look at some of the best and worst new creative efforts from the marketing world.View past columnsin the archives here. Clever use of interactive livestreaming, a partnership...

View Article

Image may be NSFW.
Clik here to view.

AUTHSCOPE:自动化挖掘在线服务中的授权漏洞

作者: {LIG}@ArkTeam 原文作者:Chaoshun Zuo, Qingchuan Zhao, Zhiqiang Lin 原文标题:AUTHSCOPE: Towards Automatic Discovery of Vulnerable Authorizations in Online Services 原文会议:2017 ACM SIGSAC Conference on...

View Article


Security Flaws Allowed Full Access To Spectrum Customers’ Accounts Without A...

A vulnerability on internet and cable TV provider Spectrum's website made it possible for just about anyone to take over customers’ accounts without a password. Only a Spectrum customer’s IP address...

View Article


Researchers Find New Fast-Acting Side-Channel Vulnerability

A group of researchers from Georgia Tech have discovered a method for pulling encryption keys from mobile devices without ever touching the phones, themselves. Looks like you've hit your article limit....

View Article

Image may be NSFW.
Clik here to view.

浏览器攻击框架BeEF Part 6:攻击用户与攻击浏览器

*本文原创作者:NT00,本文属CodeSec原创奖励计划,未经许可禁止转载 前言 这一章介绍如何使用BeEF来攻击用户和浏览器,攻击用户和浏览器的效果相对于上一章来说比较简单,效果也直接有效。 查看之前的五篇文章: 浏览器攻击框架BeEF Part 1 浏览器攻击框架BeEF Part 2:初始化控制 浏览器攻击框架BeEF Part 3:持续控制 浏览器攻击框架BeEF Part...

View Article

Image may be NSFW.
Clik here to view.

海外 | 2018年漏洞披露数量远远超过往年

根据Risk Based Security的最新报告,今年迄今披露的10,644个漏洞中,有近17%的是重大漏洞。 对于那些希望通过补丁修补来避免系统缺陷的组织来说,这并不是个好消息。今天发布的Risk Based Security新报告显示,软件产品中发现的漏洞数量没有减少的迹象。...

View Article

PHP-Horde-Image Security Update for Debian 9

- ------------------------------------------------------------------------- Debian Security Advisory DSA-4276-1 security@debian.org https://www.debian.org/security/ Sebastien Delafond August 17, 2018...

View Article


5 Reasons to Prioritize Security Awareness Training in 2018

Victims of cyberattacks are in the news nearly every day. These organizations are big and small and represent healthcare, finance and utilities to local government and entertainment. In their 2016...

View Article

Top 4 Best Practices for Protecting Your Business from Third-Party Risks

Enterprises rely heavily on third-party vendors for faster time to market, improved profitability and reduced costs. However, third-party partnerships come with varying risks, including financial,...

View Article


Trump doubles down on security clearances, former officials slam move

By Jeff Mason and Jonathan Landay WASHINGTON (Reuters) - President Donald Trump faced an unprecedented outcry from former intelligence officials on Friday after stripping the security clearance of...

View Article

Image may be NSFW.
Clik here to view.

Mobile Testing Part IV: An Introduction to Mobile Security Testing

Mobile security testing can be problematic for a software tester, because it combines thechallenges of mobile with the challenges of security testing . Not knowing much about mobile security testing,...

View Article


US seeks Messenger data in case that could mirror one in Australia

The US Government is going after Facebook in a bid to get the social media giant to break the encryption on its Messenger client, in order that it can gain access to voice data reportedly needed for a...

View Article

Image may be NSFW.
Clik here to view.

Use Azure Active Directory with Spring Security 5.0 for OAuth 2.0

We are excited to announce that Spring Starter for Azure Active Directory (AD) is now integrated with Spring Security 5.0. It offers you an easy way to build OAuth2.0 authentication and authorization...

View Article

Image may be NSFW.
Clik here to view.

Secure coding practices in Java: challenges and vulnerabilities

Secure coding practices in Java: challenges and vulnerabilities Meng et al., ICSE’18 TL;DR : don’t trust everything you read on Stack Overflow. Meng et al. conduct a study of Stack Overflow posts...

View Article
Browsing all 12749 articles
Browse latest View live