Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

security things in Linux v4.18

Previously:v4.17. linux kernel v4.18 was released last week . Here are details on some of the security things I found interesting: allocation overflow detection helpers One of the many ways C can be...

View Article


Image may be NSFW.
Clik here to view.

If you’re still using a fax machine for ‘security’ think again

At this year's Def Con, Check Point researchers Yaniv Balmas and Eyal Itkin unveiled how they infiltrated the HP Officejet Pro 6830 all-in-one printer/copier/fax (it was the cheapest). It's important...

View Article

Image may be NSFW.
Clik here to view.

Don't Be So Sure AI Is Cybersecurity's Silver Bullet

There's a lot of hype around artificial intelligence as the greatest thing since sliced bread, but will AI really help with cybersecurity? Criminals who run cybercriminal businesses also are capable of...

View Article

Image may be NSFW.
Clik here to view.

What Happens If Dashlane Gets Hacked? Your Master Password Keeps You Safe

At Dashlane, we talk a lot about the importance of using unique, complex passwords to protect your accounts. This is especially true when it comes to constructing your Master Password, which protects...

View Article

Image may be NSFW.
Clik here to view.

Securing The Server, Inside And Out

Computing is hard enough, but the sophistication and proliferation of attacks on IT infrastructure, from the firewall moat surrounding the corporate network all the way down into the guts of the...

View Article


Dispelling the Myths Surrounding Security Technology and GDPR

Many of our customers conducting business in Europe are concerned about how the new General Data Protection Regulation (“GDPR”) impacts the ability to protect their organization’s data, network and IT...

View Article

Providing a More Complete Security Infrastructure

Cloudspace USA is in the business of selling infrastructure-as-a-service to small and medium businesses. Cloudspace provides its customers with a managed network comprised of everything you need to...

View Article

Definitive VMworld 2018 Guide for Micro-Segmentation Practitioners

As you plan to attend VMworld 2018 Do you have questions like : how do I micro-segment? What grouping strategies do I use? How to do a Firewall-As-A-Service in hybrid VM and Container environments? Or...

View Article


VMworld 2018 vSphere Security Sessions

It’s that time of year again! The time when we all pack our comfortable shoes and head to Las Vegas for VMworld! As we are all dealing with the seemingly ever-increasing IT security issues that plague...

View Article


Image may be NSFW.
Clik here to view.

Remove My Get Daily Bible Verses Redirect and Restore Your Browser

The Get Daily Bible Verses redirect is a browser-based threat which can infect target hosts based using a variety of different tactics. Depending on the scope of the targets the criminal operators can...

View Article

Image may be NSFW.
Clik here to view.

Remove Pdf2docpro.com Redirect

Pdf2docpro.commight be distributed by using different methods. One of those methods is through third-party installations. Those installer setups come from bundled applications and freeware that could...

View Article

Infineon enables open source software stack for TPM 2.0 for easier integratio...

Munich, Germany 16 August 2018 Infineon Technologies AG (FSE: IFX / OTCQX: IFNNY) has enabled a new open source software stack. It makes work easier for developers who want to use the Trusted Platform...

View Article

Image may be NSFW.
Clik here to view.

Watch that browser add-on

This is a story about how hard it is for normal folks to keep their computers secure. It is a depressing but instructive one. Most of us take for granted that when we bring up our web browser and go to...

View Article


Introducing Cloud HSM beta for hardware crypto key security

Data protection is a top consideration when running enterprise workloads in the cloud. At Google Cloud Platform (GCP), we offer numerous options to encrypt your data, including our default...

View Article

The enemy is us: a look at insider threats

They can go undetected for years. They do their questionable deeds in the background. And, at times, one wonders if they’re doing more harm than good. Although this sounds like we’re describing some...

View Article


Riding the Wave Alert Logic Recognized as a Leader in Global MSSPs

Forrester just released The Forrester Wave: Global Managed Security Services Providers (MSSPs), Q3 2018. Forrester analysts spent months evaluating 14 global managed security services...

View Article

Image may be NSFW.
Clik here to view.

New outcry over Trump's revocation of Brennan security clearance

FILE PHOTO: Former CIA director John Brennan is sworn in to testify before the House Intelligence Committee to take questions on "Russian active measures during the 2016 election campaign" on Capitol...

View Article


A week in security (August 13 19)

Last week on Malwarebytes Labs, we talked about how Process Doppelgnging meets Process Hollowing in the Osiris dropper , provided hints, tips, and links for a safer school year , gave a recap of Black...

View Article

HTTPS security best practices

The #1 HTTPS tip The single most important tip regarding HTTPS is to use it. It really should be a no-brainer, and as browsers (and search engines!) are moving to discriminate non-encrypted websites,...

View Article

Single point of failure

Yesterday[1], Gatwick Airport suffered a catastrophic failure. It wasn’t Air Traffic Control, it wasn’t security scanners, it wasn’t even check-in desk software, but the flight information boards....

View Article
Browsing all 12749 articles
Browse latest View live