Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Last Winner的最后赢家:智能合约超大规模黑客攻击手法曝光

Last Winner(类 Fomo3D)游戏大火,导致以太坊异常拥堵,Gas 费用暴涨。大量以太币资金入场。北京时间 2018 年 8 月 10 日凌晨 1:38,加州时间 9 日上午 10:38,安比(SECBIT)实验室收到合作伙伴美国硅谷 AnChain.ai 公司消息,基于 AI 的态势感知系统发出预警信息,发现部分游戏合约出现大量交易并且存在异常的资金流动情况。...

View Article


Image may be NSFW.
Clik here to view.

Couplings of Normal variables

(This article was first published on R Statisfaction , and kindly contributed toR-bloggers) Hi, Just to play a bit with the gganimate package, and to celebrate National Coupling Day, the above plot...

View Article


Were You Attacked Today With Yesterday's Hacking Technique?

We’re all familiar with the idea of recycling as a means of reducing the waste stream. Most of us are in the habit of separating our paper, plastic, glass and metal trash from other garbage. What you...

View Article

Image may be NSFW.
Clik here to view.

T-Mobile Suffers Security Breach That May Affect Millions

On August 20th, T-Mobile experienced an unauthorized access incident (hacked) but they are confident that no financial information, social security numbers, or passwords were compromised. Only user's...

View Article

Image may be NSFW.
Clik here to view.

T-Mobile Hacked ― 2 Million Customers' Personal Data Stolen

T-Mobile today confirmed that the telecom giant suffered a security breach on its US servers on August 20 that may have resulted in the leak of "some" personal information of up to 2 millionT-Mobile...

View Article


Fortnite Says It Will Reward Users Who Enable 2FA With Free Emote

The Fortnite team announced it will reward users who enable two-factor authentication (2FA) on their accounts with a free emote. On 23 August, the makers of the popular online video game revealed an...

View Article

Image may be NSFW.
Clik here to view.

Global Endpoint Security Management Market Report 2018 Positioning Matrix & ...

DUBLIN (BUSINESS WIRE) The “Endpoint report has been added to ResearchAndMarkets.com’s offering. The positioning of the endpoint security management market vendors in FPNV Positioning Matrix are...

View Article

IDG Contributor Network: What your enterprise needs to know about cyber...

Imagine the following scenario: a large financial institution has heard about recent breaches and thefts that have occurred around the world against similar institutions and wishes to protect itself....

View Article


Image may be NSFW.
Clik here to view.

Get a free Fortnite emote for making your account more secure

The developer behindFortnite Battle Royale is rewarding players with a free legendary dance emote for enabling two-factor authentication (2FA) on their Epic Games account. The Boogiedown dance emote...

View Article


Image may be NSFW.
Clik here to view.

Alexa Top 1 Million Analysis - August 2018

It's time! August 2018 represents the 7th time I've published a report of the Alexa Top 1 Million sites so let's get stuck in and see what changes have taken place over the last six months on the...

View Article

Image may be NSFW.
Clik here to view.

Global Critical Infrastructure Protection (CIP) Market Size, Share &...

DUBLIN (BUSINESS WIRE) The “Critical Infrastructure Protection (CIP) Market Size, Share & Trends Analysis Report By Security Type (OT, IT), By Services (Consulting, Risk report has been added to...

View Article

Image may be NSFW.
Clik here to view.

Securing DevOps

出版时间:2018.8 官网链接: Manning 下载地址: 百度网盘(truePDF) 内容简介: about the technology An application running in the cloud can benefit from incredible efficiencies, but they come with unique security threats too. A...

View Article

Image may be NSFW.
Clik here to view.

T-Mobile Discloses Recent Security Breach Impacting 2M Customers, No...

T-Mobile and its subsidiary MetroPCS today disclosed a recent incident where hackers gained "unauthorized access to certain information" of its customers, which the companies have already reported to...

View Article


Image may be NSFW.
Clik here to view.

Symantec Earns High Marks on CRN’s 2018 Annual Report Card

Solution Providers Recognize Symantec as a Best-in-Class Channel Provider of Data Security MOUNTAIN VIEW, Calif. (BUSINESS WIRE) Symantec Corp. (NASDAQ: SYMC), the world’s leading cyber security...

View Article

Image may be NSFW.
Clik here to view.

Avast security products win awards | Avast

You deserve protection online, no matter what device or operating system you are using. When we started Avast, over 30 years ago, our motto was “cybersecurity for everyone.” Today, those words still...

View Article


T-Mobile August 2018 security breach: Everything you need to know

Stay in the loop T-Mobile August 2018 security breach: Everything you need to know Are you a T-Mobile customer? Here's what you should do to keep your info safe. Joe Maring 24 Aug 2018 T-Mobile, one of...

View Article

Netadmins: Grab a plate and wander down El Reg's network buffet

The Broadband Forum has dropped the first open-source code in an access interoperability project designed to support cloud-based access infrastructure and services. The Open Broadband Broadband Access...

View Article


Image may be NSFW.
Clik here to view.

This Week in Security News: Facebook and Faxploits

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Facebook removed 652 fake accounts...

View Article

Image may be NSFW.
Clik here to view.

God.Game 漏洞复盘:跑路还是黑客攻击?

8 月 22 日,一个名不见经传的游戏 God.Game 发出通告,声称遭遇黑客攻击,游戏内的以太币被黑客全部转走。这一消息一时间传遍各大媒体以及讨论群,人们在质疑相关游戏安全性之余,也在揣测项目方动机,一时间难以分清到底是黑客攻击,还是游戏开发方留有后门跑路。 安比(SECBIT)实验室的小伙伴在得到消息后,迅速开展了追踪分析。 God.Game 简单规则如下:GOD 股份购买的所有数量的 10%...

View Article

Image may be NSFW.
Clik here to view.

天融信关于勒索病毒 GlobeImposter 最新变种的预警通告

1.背景介绍 近日,部分单位内部网络受到勒索病毒攻击,经确认是“GlobeImposter”勒索病毒的最新变种,该勒索病毒采用高强度加密方式加密用户文件。 攻击者在进入内网后,利用黑客工具进行内网渗透并选择高价值目标服务器进行人工投放勒索病毒。为防止其它单位受到该勒索病毒的攻击,需积极应对。 1.1病毒情况描述...

View Article
Browsing all 12749 articles
Browse latest View live