Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

我电脑感染了一种奇怪的病毒,它点中了我的笑穴!

更多互联网奇葩趣闻,欢迎点击右上角关注我~ 说出来你们可能不信,小发的电脑最近中了一种奇怪的病毒。 你们肯定会疑惑:这都什么年代了,怎么还有人的电脑会中病毒啊? 确实,随着各种免费杀毒软件的普及以及操作系统安全机制的不断更新,现在已经很少听说有大范围的电脑病毒事件了,很多人甚至都没见病毒长啥样。...

View Article



Image may be NSFW.
Clik here to view.

Half of Small Businesses Believe They're Not Cybercrime Targets

New SMB version of the NIST Cybersecurity Framework could help these organizations properly assess and respond to their security risks. Even with increased public awareness of cybersecurity threats,...

View Article

Image may be NSFW.
Clik here to view.

What’s Next for Smart Sex Toys Post-Teledildonics?

Think twice before making your privates public (via stux/Pixabay) Stay on target 'Side-Channel' Cyber Attacks Rare, But Chilling IBM Bans Removable Storage Devices for Workers Last week, US patent...

View Article

Image may be NSFW.
Clik here to view.

MicroWorld eScan Total Security Suite review: A suite not big on change

The world of computer security changes quickly, with new intriguing threats to consumers and unseen zero-day vulnerabilities. But like traditional email scams eScan Total Security Suite from MicroWorld...

View Article

Image may be NSFW.
Clik here to view.

Key Interventions for Electronic Healthcare Record Security

Cyber-attacks have become the biggest reason of concern for organizations and individuals alike. This concern mainly stems from the fact that organizations are ill-prepared to deal with cyber threats....

View Article


Image may be NSFW.
Clik here to view.

CVE-2018-8414:SettingContent-ms文件任意代码执行漏洞及在野攻击分析

背景 2018年6月,国外安全研究人员公开了利用windows 10下才被引入的新文件类型“.SettingContent-ms”执行任意命令的攻击技巧,并公开了POC(详见参考[1])。而该新型攻击方式被公开后就立刻被黑客和APT组织纳入攻击武器库用于针对性攻击,并衍生出各种利用方式:诱导执行、利用Office文档执行、利用PDF文档执行。...

View Article

Image may be NSFW.
Clik here to view.

A False Sense of Security

Emerging threats over the next two years stem from biometrics, regulations, and insiders. Over the coming years, the foundations of today's digital world will shake ― violently. Innovative and...

View Article

Image may be NSFW.
Clik here to view.

Researchers propose new method for secure, speech-based two-factor...

Nitesh Saxena, Ph.D. Credit: University of Alabama at Birmingham Researchers at the University of Alabama at Birmingham have developed a new method for two-factor authentication via wearables using...

View Article


Image may be NSFW.
Clik here to view.

Get the New Boogiedown Emote in Fortnite for Free by Enabling 2FA

Home News Get the New Boogiedown Emote in Fortnite for Free by Enabling 2FA Get the New Boogiedown Emote in Fortnite for Free by Enabling 2FA Fortnite is a huge game but that also means there are...

View Article


DiDi’s Fengmin Gong and Duo’s Mike Hanley to talk future of security at...

Cyber security has never gone away as a hot topic in the technology sphere and in 2018 it remains an enormous issue. As the next 3 billion or so of the planet’s people come online, it’s never been more...

View Article

Image may be NSFW.
Clik here to view.

浅谈量子保密通信

前言...

View Article

The Transition Toward Enterprise-class cybersecurity Vendors

Recently, ESG completed its second annual enterprise-class cybersecurity vendor research. The story behind this project goes something like this: Enterprise organizations (i.e. those with 1,000...

View Article

Image may be NSFW.
Clik here to view.

T-Mobile shuts down security breach that may have exposed customers' personal...

T-Mobile customers may have had some of their personal information exposed to hackers earlier this week, according to a notice sent out by the carrier. The breach happened on August 20, and the company...

View Article


How A.I is Shaking the Foundations of Cybersecurity

The crossroads are coming faster than ever for the world of cybersecurity. Information security leaders have had to do a lot of adapting over the past decade. They’ve shifted from an emphasis on...

View Article

金融业网络安全大赛落幕 长亭科技成背后智囊团

活动现场,中国人民银行副行长范一飞认为,当前金融行业网络安全形势复杂严峻,在国家有关部门的指导支持下,各金融机构不断加强关键信息基础设施保护,成功抵御了各类外部网络攻击。同时指出,新时期金融行业要进一步提高认识,培养更多优秀网络安全人才,切实筑牢行业网络安全屏障,有效保障金融安全。...

View Article


Image may be NSFW.
Clik here to view.

渗透测试神器Burp Suite现已推出2.0测试版

关于Burp Suite Burp Suite是进行Web应用安全测试的一个集成平台,无缝融合各种安全工具并提供全面的接口适配,支持完整的Web应用测试流程,从最初的映射和应用程序的攻击面分析到发现和利用安全漏洞等领域均适用。...

View Article

Image may be NSFW.
Clik here to view.

ThinkPHP3.2 框架sql注入漏洞分析(2018-08-23)

0x00 前言 北京时间 2018年8月23号11:25分 星期四,tp团队对于已经停止更新的thinkphp 3系列进行了一处安全更新,经过分析,此次更新修正了由于 select() , find() , delete() 方法可能会传入数组类型数据产生的多个sql注入隐患。 0x01 漏洞复现 下载源码: git clone...

View Article


Image may be NSFW.
Clik here to view.

Fixing authentication failure in Startup Security Utility

After migrating my 2018 MacBook Pro from a 2017 MacBook Pro, I found that I could no longer authenticate.The 2018 MacBook Pro had FileVault turned on and the 2017 MacBook Pro did not. I investigated...

View Article

Image may be NSFW.
Clik here to view.

Decoding an SSH Key from PEM to BASE64 to HEX to ASN.1 to prime decimal numbers

I'm reading a new chapter of The Imposter's Handbook: Season 2 that Rob and I are working on. He's digging into the internals of what's exactly in your SSH Key. I generated a key with no password:...

View Article

Image may be NSFW.
Clik here to view.

Cryptocurrency-stealing Trojan raises new concerns on the Mac malware front

Mac users have another potential worry on the security front, with the news that Lazarus, a notorious bunch of hackers from North Korea, has adapted its cryptocurrency-stealing malware to targetmacOS....

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images