Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Kaspersky Lab to Host CyberStarts Boston on September 20

Inaugural event aims to empower the next generation of cybersecurity professionals BOSTON (BUSINESS WIRE) #boston ― Kaspersky , a global cybersecurity company, is hosting CyberStarts , a free, one-day...

View Article



Image may be NSFW.
Clik here to view.

AWS Security For Beginners | Cloud Tips

AWS security is a complicated topic, and security should be one of the top priorities in every IT environment. The cloud actually makes it easier to be secure as long, as people keep best practices in...

View Article

私信通:保障数据通信安全,打造隐私聊天工具

在国家“十三五”规划中,明确将保障数据信息安全和信息技术变革作为未来重点发展方向。“互联网+”已经上升为国家战略层面,互联网与传统产业的深度融合,使得操作系统更加复杂,各种数据海量增长,新情况新问题层出不穷,网络数据安全和用户信息安全问题将更加突出。...

View Article

The Netgear Arlo Q security camera is within dollars of its all-time low today

Indoor security cameras come in all shapes and sizes, and generally you get what you pay for. Unless you can get a killer deal like the one we found today. Amazon is selling the Netgear Arlo Q for...

View Article

Image may be NSFW.
Clik here to view.

Superdrug to “Hackers”: No Evidence You’ve Pwned Our Systems

Add to favorites Fortunately the credit card details of customers don’t appear to be held to ransom at this stage High Street chain Superdrug says there is no evidence that its systems have been...

View Article


Image may be NSFW.
Clik here to view.

Getting To The Root Of Security With Trusted Silicon

The increasinglydistributed nature of computing and the rapid growth in the number of the small connected devices that make up the Internet of Things (IoT) are combining with trends like the rise of...

View Article

‘Legacy system’ exposed Black Hat 2018 attendees’ contact information

A “legacy system” was to blame for exposing the contact information of attendees of this year’s Black Hat security conference. Colorado-based pen tester and security researcher who goes by the handle...

View Article

Image may be NSFW.
Clik here to view.

Lessons in Resilience: A Conversation on Security at REdeploy 2018

I spent last week out in San Francisco at REdeploy to learn about Resilience Engineering and what it means to build solid, sustainable infrastructures, organizations, and teams. This was the first...

View Article


Elasticsearch Audit Trail and Log File Filter Policies Explained

This post provides a thorough overview of the audit functionality of an Elasticsearch cluster. It defines some audit trail concepts, clarifies some implementation decisions and delves into some of the...

View Article


Image may be NSFW.
Clik here to view.

Picking Apart Remcos Botnet-In-A-Box

This blog post was authored by Edmund Brumaghin and Holger Unterbrink with contributions from Eric Kuhla and Lilia Gonzalez Medina . Overview Cisco Talos has recently observed multiple campaigns using...

View Article

Image may be NSFW.
Clik here to view.

Code42 Forensic File Search on Exhibit at VMworld 2018

Accelerates incident response by delivering comprehensive answers to challenging data security questions in near real time MINNEAPOLIS (BUSINESS WIRE) #VMworld ― Code42 , a leading data security...

View Article

Image may be NSFW.
Clik here to view.

Cisco smells a RAT in Breaking Security's Remcos tool

Cisco Talos says criminals are using one research company's testing tools to set up and run botnets. A report released Wednesday by Talos researchers found that Breaking Security's Remcos remote...

View Article

Image may be NSFW.
Clik here to view.

Review: The Barracuda Web Application Firewall 460 Offers Affordable Security

A business’s size offers little protection against network threats today. Hackers will target a small business just as readily as they will a larger organization, and may even see it as a softer...

View Article


Image may be NSFW.
Clik here to view.

How’s that Security Back Door Doing? (Part 2)

In the first part of this blog post I wrote about how recursive DNS (rDNS) is an attack surface that many enterprises don’t currently protect. Bad actors are exploiting that fact and developing...

View Article

BrandPost: Listen to Your Customers and Make Security a Priority

As hackers wreak havoc on corporations such as Macy’s, Delta, Orbitz, and Chipotle, consumer interest in application security is growing exponentially. These days, web and mobile applications account...

View Article


BrandPost: Get Peace of Mind with Verification

Partnering with a certified secure vendor helps ensure code is free of security-related defects―and shows you’ve made security a priority. Lost revenue, legal liabilities, diminished market share,...

View Article

Image may be NSFW.
Clik here to view.

Researchers Blame ‘Monolithic’ Linux Code Base for Critical Vulnerabilities

With an OS design based on a verified microkernel, researchers contend almost all linux OS flaws could be mitigated to less than critical severity. In an exhaustive study of critical Linux...

View Article


Image may be NSFW.
Clik here to view.

2018年软件安全漏洞数量和严重性创下历史新高

Gartner在 2018年新技术成熟度曲线报告 中“冷落”了信息安全,但是根据Risk Based Security的最新报告,今年迄今为止披露的创纪录的10,644个漏洞中有近17%属于高危级别的严重漏洞,企业和个人面临的安全威胁与日俱增。 对于那些希望从软件补丁修补中获得喘息的组织来说,目前看起来似乎没有什么缓解的迹象。今天发布的Risk Based...

View Article

Image may be NSFW.
Clik here to view.

Ghostscript中的漏洞会让操作系统的安全受到威胁

Google Project...

View Article

Turla backdoors compromise European government foreign offices

ESET researchers tracking a notorious backdoor and cyberespionage campaign have warned that the list of government victims is far longer than previously thought -- and at least two new European offices...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images