Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Off-The-Shelf Hacker: Open Source Voice Recognition without a Net

Hedley, therobotic skull needs to react to voice commands so he can do cool things and help me in my quest for world domination. Amazon’s cloud-based Alexa voice service can easily be implemented on...

View Article


Hackers failed to hack into DNC voter database, says security firm

The Democratic National Committee has prevented an attempt to hack into its database of tens of millions of voters. CNN and the Associated Press reported on Wednesday, citing an unnamed party official,...

View Article


Airmail issues fix for security flaw that could let hackers read your email

Airmail has issued an update today to patch a vulnerability that security researchers said could let malicious third parties access email databases and read a user’s messages. Security consulting firm...

View Article

Image may be NSFW.
Clik here to view.

倪光南:国产不等于落后 国产自主可替代计划切实可行

中国工程院院士倪光南 新浪科技讯 6月30日上午消息,由工业和信息化部、北京市人民政府共同主办的第二十二届中国国际软件博览会在北京举行,中国工程院院士倪光南出席全球软件产业发展高峰论坛,并发表“工业互联网安全与发展核心技术”主题演讲。...

View Article

Image may be NSFW.
Clik here to view.

Verisign to Report Second Quarter 2018 Financial Results

RESTON, Va. (BUSINESS WIRE) VeriSign, Inc. (NASDAQ: VRSN), a global leader in domain names and internet security, announced that its earnings call for the second quarter 2018 will take place on...

View Article


Image may be NSFW.
Clik here to view.

阿里合伙人掌舵钉钉企业服务:信息安全是生命线

【环球网科技报道 记者 李文瑶】8月23日在重庆智博会现场,阿里巴巴集团合伙人、钉钉企业服务事业部总经理方永新(花名大炮)在接受记者采访时称,在移动互联网时代,信息安全是企业的生命线,也是钉钉做好企业服务的生命线。钉钉依托阿里积累的信息安全能力和经验,是钉钉最大的优势。...

View Article

Image may be NSFW.
Clik here to view.

Unencrypted laptop exposes personal details of 37,000 Eir customers, faulty...

Its not great when any organisation loses a laptop, but if the contents of the computers hard drive have been fully encrypted and a strong password has been used its hardly the end of the world. After...

View Article

Image may be NSFW.
Clik here to view.

Review: Using AI to outsmart threats with Vectra Cognito

Don't expect the pace of change to slow down in the cybersecurity industry. Even the so-called traditional protection methods will need to incorporate new technologies and methodologies. Many new...

View Article


Analysts: SD-WAN 5-year annual growth rate tops 40%

Whether users are looking to stabilize cloud-connected resources, better manage remote networks or simply upgrade a timeworn wide area environment, software-defined-WAN (SD-WAN) technologies are what’s...

View Article


Cryptographic agility is key to post-quantum security

The threat of quantum computing being able to crack encryption methods currently used to protect critical data is being exploited by unscrupulous security suppliers, a cryptographic expert has warned....

View Article

Image may be NSFW.
Clik here to view.

39% of UK CEOs admit that cyber attacks are unavoidable

A new study from KPMG has found that 39% of UK CEOs believe a cyber attack on their organisation is inevitable . This figure is likely a reaction to the upsurge in cyber attacks over the past few...

View Article

New Options for SQL 2008 End of Support

If you’re using SQL 2008 or 2008R2, you need to be aware that the extended support for those ends on July 9, 2019. This means the end of regular security updates which leads to more vulnerabilities,...

View Article

Image may be NSFW.
Clik here to view.

Trend Micro takes multi-pronged approach to narrowing the gaping...

Remember the old adage, you can never be too thin or too rich? The software development world has its own take on that dictum―you can never be too fast. Related: Gamification training targets iGens...

View Article


Netskope sets sights on being next iconic security company

Cloud Access Security Broker (CASB) provider, Netskope, has raised $US 231.4m in funding, but says its goals are not to be acquired but to be a key long-term cyber-security player. “The founders are...

View Article

Image may be NSFW.
Clik here to view.

千亿级网络黑灰产业背后 谁来守护网络安全?

千亿级网络黑灰产业背后 谁来守护我们的网络安全? 近日,浙江绍兴警方公布的一起“史上最大数据窃取案”引发大范围的讨论。在阻止30亿条公民信息泄露的同时,也揭开了“被加粉”的秘密。...

View Article


Image may be NSFW.
Clik here to view.

Simplifying and Prioritizing Advanced Threat Response Measures

I had to go to the doctor the other day because I was miserable and sick. I don’t like going to the doctor so I waited until my stuffy nose and congestion turned into a full blown sinus infection. The...

View Article

2018网络安全生态峰会召开 政府企业共建网络防线

2018网络安全生态峰会今天在北京举行。主题是“共建网络防线,共治安全环境,共享安全生态”。 网络安全正受到各方面的重视,而这也注定是一项系统工程。正如工业和信息化部网络安全管理局副局长梁斌在会上所说:“网络安全生态覆盖政府部门、制造厂商、网络运营者、用户等各主体,涉及设备、网络、平台、数据等各环节,构建良好网络生态环境,需要各方共同努力。”...

View Article


发展国家网信事业 维护国家网络安全

互联网是新时代条件下意识形态工作的主阵地、主战场和最前沿,是意识形态斗争最为激烈的地方。习近平同志曾指出,意识形态工作是党的一项极其重要的工作,关乎旗帜、关乎道路、关乎国家政治安全。由此可见,做好网上意识形态工作的重要性不言而喻。...

View Article

Epic Games just gave a perk for folks to turn on 2FA; every other big company...

Let’s talk a bit about security. Most internet users around the world are pretty crap at it, but there are basic tools that companies have, and users can enable, to make their accounts, and lives, a...

View Article

T-Mobile is notifying some customers about a recent security breach

Some T-Mobile customers may be receiving a message in the coming days regarding a security incident which took place on August 20th. According to the notice received by some customers already, "certain...

View Article
Browsing all 12749 articles
Browse latest View live