Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

The First Steps on a CISOs DevOps Journey

CISOs DevOps The marriage between DevOps and Security is rapidly gaining traction. Security is shifting from its former mindset of being its own silo to getting on the same agenda as their developer...

View Article



BrandPost: Do IT Pros Consider Security When Purchasing Software?

Traditionally, security was about cost avoidance. It was thought of like insurance something you have to have in case something bad happens, but not something that would boost the bottom line or...

View Article

BrandPost: Proving Security Is Your Priority

Customers conducting business with you require proof of your efforts to secure theapplications you build, use, and sell. Recent data breaches heightened the awarenessof your customers to the importance...

View Article

Image may be NSFW.
Clik here to view.

Is Hyper-Threading a Fundamental Security Risk?

Ever since Intel introduced Hyper-Threading (known generically as Symmetric Multi-Threading), debates about whether or not to disable the feature have almost entirely revolved around its impact on...

View Article

Image may be NSFW.
Clik here to view.

The Home of the Future is a security challenge

With great automation comes great responsibility. You may love your smart thermostat and door lock, but as long as they’re on the open network, they’re targets for all manner of digital attacks. And...

View Article


Image may be NSFW.
Clik here to view.

Sprint staff portal poorly secured, allowed for easy SIM swapping attack

ByStephen Silver Monday, August 27, 2018, 06:51 am PT (09:51 am ET) "Weak passwords" are being blamed for a security breach at wireless carrier Sprint, which could have set up users for an attack...

View Article

Image may be NSFW.
Clik here to view.

There Was ‘Zero-Trust’ at Black Hat

Individuals in the information security (infosec) space invaded Vegas for the 2018 BSides Las Vegas , Black Hat USA , and Defcon annual events. These events attract attendance from around the world...

View Article

Image may be NSFW.
Clik here to view.

Panda Dome review: Feature overload at a high price

If you know about Panda Security you probably think of it as one of the top choices for free antivirus. Behind its famous freebie, however, are several paid suites that add extra features and support....

View Article


Image may be NSFW.
Clik here to view.

Why websites should be using HSTS to improve security and SEO

Site users and search engines don’t take website security lightly which is probably why you’ve likely heard of added security measures like HTTPS. But a lesser-known security layer called HTTP Strict...

View Article


Latest SteamOS Linux Beta Brings Mesa 18.1.6 and Nvidia 396.54, Security Fixes

Valve pushed a new beta version of its Debian-based SteamOS linux operating system to the brewmaster_beta channel for public testing, updating the graphics stacks like it promised last month. When it...

View Article

The Difference Between Sandboxing, Honeypots & Security Deception

A deep dive into the unique requirements and ideal use cases of three important prevention and analysis technologies. Networks, cyberattacks, and the strategies used to stop them are continuously...

View Article

Listening-Watch wearable system provides secure 2FA

University of Alabama’s Nitesh Saxena and Prakash Shrestha have developed a new method to make two-factor authentication (2FA) super easy and secure ― Listening-Watch. It involves a wearable device...

View Article

Image may be NSFW.
Clik here to view.

Epic calls Google 'irresponsible' for exposing Fortnite security flaw

The CEO of Epic Games has slammed Google's "irresponsible" disclosure of a security bug in its hit game Fortnite. Tim Sweeney accused Google of trying to "score cheap PR points" by revealing a...

View Article


IDG Contributor Network: Cyber to the people! The democratization of security

One size does not fit all Taking a closer look at cybersecurity, it’s easy to see that something very wrong is going on when most companies prospect only the big fish - the large enterprises with...

View Article

Image may be NSFW.
Clik here to view.

Inside Secure Named a Representative Vendor in Gartner Market Guide for...

AIX-EN-PROVENCE, France (BUSINESS WIRE) Inside (Paris:INSD) (EuronextParis: INSD), at the heart of security solutions for mobile and connected devices, today announced it was recognized as a...

View Article


How Can We Improve the Conversation Among Blue Teams?

Dark Reading seeks new ways to bring defenders together to share information and best practices IT security pros, particularly those who work on blue teams doing everyday data defense, seldom have a...

View Article

Image may be NSFW.
Clik here to view.

Growing Your Small Business IT on a Budget

Business growth almost always means infrastructure growth and since IT systems represent the backbone of most company’s sales, management and marketing systems, any kind of growth tends to require some...

View Article


Wrong date leads to US$4000 charge for a day's parking

Drivers using four car parks in the city of Winchester in the US state of Virginia got a nasty surprise last week when they were suddenly issued parking tickets for US$4000 by the automated ticketing...

View Article

Bitcoin [BTC]’s self-proclaimed creator Craig Wright shoots bullets at Wormhole

Earlier this week, the proponent of Bitcoin Cash and self-claimed Satoshi Nakamoto, Craig S Wright criticized Wormhole, which is a token proposal put forth by the Bitmain developers in the wake of the...

View Article

Image may be NSFW.
Clik here to view.

【译】Web安全快速入门

原文: A quick introduction to web security 作者:Austin Tackaberry 发表时间:2018/8/15 译者:陈 昌茂 发表时间:2018/8/25 (转载请注明出处) 你有很多理由需要了解web安全,比如: 你是一位关心个人隐私数据正被泄露的用户 你是一名Web开发人员,想要编写更加安全的Web应用...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images