Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Hacker Discloses Unpatched Windows Zero-Day Vulnerability (With PoC)

A security researcher has publicly disclosed the details of a previously unknown zero-day vulnerability in the Microsoft's windows operating system that could help a local user or malicious program...

View Article



Image may be NSFW.
Clik here to view.

The Dark Side of APIs: Denial of Service Attacks

Ryan Barnett, Principal Security Researcher, Akamai Elad Shuster, Senior Security Researcher, Akamai In this blog post, we will discuss different Denial of Service (DoS) attacks that may negatively...

View Article

Image may be NSFW.
Clik here to view.

Hacking the Hackers: Honeypots on Ethereum Network

Hacking the Hackers: Honeypots on EthereumNetwork Not only good guys are excited about blockchain and crypto technologies. Bad guys are drawn by abundance of money in rotation as well. Black hats try...

View Article

Image may be NSFW.
Clik here to view.

腾讯手机管家安卓7.6.2版本上线 首推“安全实验室”直观展现...

随着智能手机使用频率的提升,用户更加关注手机安全和使用技巧。为了帮助用户获得更安全、便捷的手机使用体验,最近腾讯手机管家上线安卓7.6.2版本,从安全、防骚扰和流量福利三大方面,为用户提供更贴心的手机服务。 新版本中,腾讯手机管家首次联合腾讯安全联合实验室的能力,上线“安全实验室”功能,为用户搭建安全信息展示平台;其次,王卡专区新增专属特权,骚扰拦截功能整合等,持续为用户提供更贴心的服务。...

View Article

Image may be NSFW.
Clik here to view.

Secureworks Recognized as a Leader by Independent Research Firm in Global...

ATLANTA (BUSINESS WIRE) Secureworks (NASDAQ: SCWX), a leading global cybersecurity company that keeps organizations safe in a digitally connected world, has been named a in The Forrester Wave: Global...

View Article


VMware sharpens security focus with vSphere Platinum, ‘adaptive...

VMware is expanding its security range with a new version of its virtualization software that has security integrated into the hypervisor. “Our flagship VMware vSphere product now has AppDefense built...

View Article

Image may be NSFW.
Clik here to view.

Global EUV Lithography Market 2017-2018 Forecast to 2025: Trends, Drivers, Co...

Global EUV Lithography Market 2017-2018 Forecast to 2025: Trends, Drivers, Constraints, Opportunities and Challenges ResearchAndMarkets.com 0 VIEWS bySweetcode 20 mins ago InIndustry News DUBLIN...

View Article

Image may be NSFW.
Clik here to view.

Xage security automation tool could protect power grid from hackers

Xage , the company that wants to help make infrastructure more secure using the blockchain, announced a new policy manager tool to help protect utilities and other critical infrastructure from hackers...

View Article


Image may be NSFW.
Clik here to view.

Polish Parliament Enacts National Cybersecurity System

The system classifies security incidents and splits national incident response into three separate teams. The Parliament of Poland today passed into law a new act that will fully implement the NIS...

View Article


Image may be NSFW.
Clik here to view.

Email security systems miss thousands of malicious links

A new study from email security company Mimecast shows that malicious links in emails are being missed by many security systems. Mimecast examined more than 142 million emails that had passed through...

View Article

华住旗下酒店5亿信息疑被泄,专家:或因华住程序员失误所致

[ 摘要 ]出现这种问题大多是企业内部的安全管理、员工整体安全意识不强,这类信息泄露很可能已经进入网络黑产链条,影响恐难以弥补。 华住集团旗下酒店开房记录疑似泄露,涉及共计约5亿条公民个人信息。此事一经披露随即引发公众关注。 此次信息泄露的情况最早由民间非企运营互联网安全组织“网络尖刀”团队和互联网安全厂商紫豹科技发现,并分析认为Github...

View Article

No, eight characters, some capital letters and numbers is not a good password...

Internal cybersecurity audits rarely make it to the public domain, but when they do it’s often an eye-popping read. Take the Western Australian (WA) Auditor General’s 2017 recent report on the state of...

View Article

In the Financial Services Industry, the Time for a Fresh Approach to Cyber...

Back in the Old West, banks were the whipping boys of criminals. Anyone with a gun and an eye for ill-gotten gain would target banks because that’s where all the money was, and there weren’t a whole...

View Article


IDG Contributor Network: Stop playing “whack-a-mole” with your security

As security threats become more prevalent across organizations, solutions must have buy-in across the enterprise not just within the IT department. Equally importantly, organizations must stop...

View Article

Instagram Adds 2FA, Account Verification in Security Update

Social media platforms' struggle with safety and security is like a game of Whac-A-Mole. One day, the threat is coordinated bot activity; the next, it'sSIM hijackers stealing the identities of regular...

View Article


Image may be NSFW.
Clik here to view.

Inside Instagram’s New Plan to Improve Security Amid Bots, Fake Followers,...

Facebook often finds itself as the target these days when it comes to problems with security and privacy on social media . But the company’s popular subsidiary, Instagram, is increasingly feeling the...

View Article

Image may be NSFW.
Clik here to view.

Trends in Open Source Security

We recently held a Virtual Summit centered on the topic of open source library use and risk. Mark Curphey, CA Veracode’s VP of Strategy, gave the keynote address on trends in this space. Curphey, who...

View Article


Very Good Security

Did you ever wonder why doctor offices ask for your social security number? They don’t want to keep your SSN, but it’s the primary “key” that identifies you to an insurance company. In computer...

View Article

Image may be NSFW.
Clik here to view.

Remove YourHotTab.net Browser Hijacker

This article will help you to remove YourHotTab.net efficiently. Follow the browser hijacker removal instructions given at the end of the article. YourHotTab.netis a browser hijacker redirect. The...

View Article

Image may be NSFW.
Clik here to view.

动态调试|Maccms SQL 注入分析(附注入盲注脚本)

0x01 前言 已经有一周没发表文章了,一个朋友叫我研究maccms的代码审计,碰到这个注入的漏洞挺有趣的,就在此写一篇分析文。 0x02 环境 Web: phpstudy System: windows 10 X64 Browser: Firefox Quantum python version : 2.7 Tools: JetBrains PhpStorm 2018.1.6...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images