Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Third-Party Extensions: The Hidden Security Risk

Third parties are a well-known risk for any company’s cybersecurity posture (just ask Target or dozens of other large enterprise that suffered a data breach due to an outside vendor or consultant...

View Article



Image may be NSFW.
Clik here to view.

CSS2018安全领袖峰会解读未来安全:安全步入全域化时代

腾讯科技讯 8月27日,第四届互联网安全领袖峰会(Cyber Security...

View Article

Image may be NSFW.
Clik here to view.

4 Stories of Security Vendors Overcoming Roadblocks

I think it might be safe to say that the majority of a security vendor’s time is trying to avoid being a roadblock or running into roadblocks. As part of the CISO/Security Vendor Relationship Series,...

View Article

Image may be NSFW.
Clik here to view.

Epic Games Rages Over Google Revealing Fortnite Security Flaw Earlier Than...

Home News Epic Games Rages Over Google Revealing Fortnite Security Flaw Earlier Than Expected Epic Games Rages Over Google Revealing Fortnite Security Flaw Earlier Than Expected Earlier this month,...

View Article

Five ways to step up your cybersecurity: The power of the cloud to combat...

The latest entry in a never-ending series of data breaches comes courtesy of popular internet platform Reddit. The company revealed that a hacker was able to access usernames, passwords, and email...

View Article


Image may be NSFW.
Clik here to view.

携手共建安全的网络生态和数字生态

今天,由云计算、大数据、物联网、人工智能、混合现实等新兴技术所引领的数字化转型,正在全球各地掀起一场波澜壮阔的产业变革。伴随技术创新飞跃式的发展和迅速普及,人们的生活、企业的效益、经济的发展,都越来越依赖于信息基础设施、业务应用和数字服务――与此同时,网络安全和数据保护所面临的潜在威胁也变得日益严峻起来。 以经济利益为驱动,网络犯罪呈现多元化和全球化趋势...

View Article

Diminished Data Privacy, Customer Doubt Could Affect Corporate Business...

Many companies have based their business models on collecting facts and statistics from their customers, accumulating big data which they analyze to improve not only customer experience, but also...

View Article

Image may be NSFW.
Clik here to view.

腾讯丁珂:安全已成产业发展驱动力 是所有0前面的1

【环球网科技报道】8月27日,在第四届互联网安全领袖峰会(Cyber Security Summit2018,简称CSS2018)大会上,腾讯高级副总裁丁珂围绕四个关键词:行业共建、生态共治、政府监管和企业自律,对数字经济时代的安全趋势做了研判和解读。丁珂表示,数字经济时代信息安全已不只是一种基础能力,还是产业发展升级的驱动力之一;安全是所有0前面的1,没有了1,所有0都失去了意义。...

View Article


Image may be NSFW.
Clik here to view.

青少年可轻易破坏州选举结果?黑客大会组织者:你们想多了

本月在拉斯维加斯召开的 Def Con 大会上,有一条趣闻占据了许多媒体的头条。这让一些人认为,渗透美国选举网站、并影响 2018 中期选举的结果,将成为孩子们的一场游戏。文章报道称,参会的青少年黑客能够“挫败即将到来的中期选举”,且“一个 11 岁的孩子只需 10 分钟就能改变选举结果”。然而,事实真的如此吗? ( 网站 截图) Politico Magazine 用一个 17...

View Article


Image may be NSFW.
Clik here to view.

勒索病毒突袭多省多家大型企业 腾讯电脑管家提醒用户勿恐慌

腾讯科技讯 8月26日,腾讯智慧安全御见威胁情报中心监测,发现国内多省多家大型企业遭遇GlobeImposter勒索病毒攻击。不法黑客入侵企业内网,利用RDP/SMB暴力破解在内网扩散,投放GlobeImposter勒索病毒,导致系统破坏,影响正常工作秩序。...

View Article

Image may be NSFW.
Clik here to view.

网鼎杯网络安全大赛部分Writeup第一场

一、Misc 1.题目:签到 解答: (1)提示让关注公众号,关注后在公众号里边输入“青龙之站”之后如下图所示; (2)回复1f5f2e进入下一关,如下图所示; (3)回复4c361b进入下一关,如下图所示; (4)回复7642a4进入下一关,如下图所示; (5)回复aac333得flag,如下图所示; (6)Flag:*flag{hello_wangdingbei} 2.题目:clip 解答:...

View Article

Image may be NSFW.
Clik here to view.

网络合作创新:大规模合作

导言 2018年5月,美国智库机构大西洋理事会(Atlantic Council)斯考克罗夫特战略与安全中心发布了一篇题为《网络合作创新:大规模合作》的报告(以下称报告)。报告由大西洋理事会“网络治理倡议”高级研究员、哥伦比亚大学国际与公共事务学院高级学者詹森希利(Jason Healey)撰写。...

View Article

New vulnerability discovered in Apache Struts threatens remote code execution

As one of the most popular open source frameworks used for helping developers build web applications such as public facing web portals, vulnerabilities in Apache Struts projects can have wide-reaching...

View Article


Voting machine maker vows to step up security, Fortnite bribes players to do...

RoundupSummer rolls on, Reg vultures are making the most of their hols before the September rush hits, and in the past week, we sawLazarus malware targeting Macs,Adobe scrambling to get an emergency...

View Article

Image may be NSFW.
Clik here to view.

12 things every IT security professional should know

See larger image Getty Images Fighting back Few complex professions change with the velocity of IT security. Practitioners are faced with an average of 5,000 to 7,000 new software vulnerabilities a...

View Article


What are next generation firewalls? How the cloud and complexity affect them

Traditional firewalls track the domains that traffic is coming from and the ports it's going to. Nextgen firewalls go beyond that -- they also monitor the content of the messages for malware and data...

View Article

Image may be NSFW.
Clik here to view.

年度安全盛誉 | WitAwards 2018互联网安全年度评选(报名通道开启)

2018年以来,安全大戏一波未平一波又起。芯片底层漏洞、脸书信息泄露、Memcached DDoS刷新流量峰值历史记录、挖矿与勒索占据黑产江湖的半壁江山……凡此种种,无一不牵动着大众的眼球。从近两年的百度指数也不难看出,“信息泄露”、“黑客”等关键词指数值一路飙升,网络安全与信息安全早已不仅限于技术范畴,而是关乎普罗大众的民生问题。...

View Article


The gigabit fibre NBN is a lost opportunity, when will we build and get it?

COMMENT: The sad reality of the NBN is that 100Mbps connections are just too slow in 2018, and only God knows when gigabit Internet will become cheap and affordable for all. I have relatives who live...

View Article

Image may be NSFW.
Clik here to view.

As customers gather for VMworld, VMware unveils new security and hybrid cloud...

(VMware Photo) Companies that rely on VMware’s software to manage their own data centers as they dip their toes in the public cloud will see several new vSphere features emerge this week alongside...

View Article

Adaptive Micro-segmentation Built-in Application Security from the Network to...

A zero trust or least-privileged, security model has long been held as the best way to secure applications and data. At its core, a zero trust security model is based on having a whitelist of known...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images