Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

子弹短信存在用户信息安全隐患?官方回应

8月29日晚,子弹短信官方发布“关于子弹短信用户信息安全问题”的声明。 这两天有媒体报道称子弹短信存在用户信息安全隐患,为避免造成误解,子弹短信作出以下澄清。 子弹短信表示,自8月20日正式上线后, 由于web端接口设计疏漏,确实出现过web端显示铭文手机号和自增ID的问题。我们在21日晚上发现后立刻停止了web端服务,问题解决后,已于23日重新上线。 另外由于接口设置有限频功能,...

View Article



Image may be NSFW.
Clik here to view.

Go Blog with Hugo, the Static Site Generator

If you have an Internet connection, you may have heard of WordPress. WordPress as a blogging medium ― and eventually as a full-featured web content platform ― has evolved into the number one website...

View Article

How One Company's Cybersecurity Problem Becomes Another's Fraud Problem

How One Companys Cybersecurity Problem Becomes Another's Fraud Problem The solution: When security teams see something in cyberspace, they need to say something. Fraud isn't something new or something...

View Article

ABBYY woes: Doc-reading software firm leaves thousands of scans blowing in wind

Document-reading software flinger ABBYY exposed more than 203,000 customer documents as the result of a MongoDB server misconfiguration. The AWS-hosted MongoDB server was accidentally left publicly...

View Article

Image may be NSFW.
Clik here to view.

FC Barcelona choose Loadbalancer.org in AWS for flexibility and security

FC Barcelona , known simply as Barcelona and colloquially as Bara, is one of the worlds leading professional football clubs based in Barcelona, Catalonia, Spain. Domestically, Bara have won 25 La...

View Article


Cryptojacking attacks spiked in first half of 2018

Cryptojacking attacks have skyrocketed, locking in cryptojacking attempts as having the biggest security impact in the first half of 2018. So far this year, there has been a 141 percent increase in...

View Article

Image may be NSFW.
Clik here to view.

AWS Managed Microsoft AD Deep Dive Part 5 Security

You didn’t think I was done with AWS Managed Microsoft AD yet did you? In this post I’m going to perform some tests to evaluate the protocols and ciphers suites available for LDAPS as well as checking...

View Article

Ubuntu Security Guidance by GCHQ

This guidance was developed following testing on devices running Ubuntu 18.04 LTS. It's important to remember that this guidance has been conceived as a way to satisfy the 12 End User Device Security...

View Article


Image may be NSFW.
Clik here to view.

Searchmulty.com Redirect Removal

This article will help you to remove Searchmulty.com efficiently. Follow the browser hijacker removal instructions given at the end of the article. Searchmulty.comis a browser hijacker redirect. The...

View Article


More on Security Data Lakes And FAIL!

Naturally, all of you have read my famous “ Why Your Security Data Lake Project Will FAIL! ” [note: Anton’s ego wrote this line :-)] Today I read a great Gartner note on data lake failures in general (...

View Article

The most important attributes of a cybersecurity platform

We’ve seen an ongoing cybersecurity technology trend that goes something like this: Enterprise organizations address cybersecurity using disconnected point tools. This strategy is no longer adequate,...

View Article

Image may be NSFW.
Clik here to view.

Applying Seccomp Filters at Runtime for Go Binaries

Seccomp (short for security computing mode) is a useful feature provided by the linux kernel since 2.6.12 and is used to control the syscalls made by a process. Seccomp has been implemented by numerous...

View Article

Image may be NSFW.
Clik here to view.

25% of All Smart Contracts Contain Critical Bugs

Technology & Security 1 hour ago| By Kai Sedgwick - | 25% of All Smart Contracts Contain Critical Bugs For every problem that smart contracts solve, they seem to introduce another. In a week in...

View Article


Image may be NSFW.
Clik here to view.

Report: Nearly Half of Security Professionals Think They Could Execute a...

As potential threats and entry points into organizations’ databases keep growing, so does the amount of money folks are throwing at detecting and actioning insider threats . In fact, the ballooning...

View Article

The Trouble with Smart City Security Assessments

So, you’re running a city, and are in the process of making it smarter. You invest in new tech to broadcast warnings to all mobile phones in the area, you get free public WiFi at key points in the city...

View Article


7 Regulations Requiring File Integrity Monitoring for Compliance

Maintaining compliance can be a challenge with limited budgets and resources. Challenges by compliance and IT professionals include resource shortages, personal liability and regulatory change. In a...

View Article

Image may be NSFW.
Clik here to view.

What is Foreshadow, and How Can You Overcome this Vulnerability?

Earlier this month it was revealed that another vulnerability the fourth was discovered in Intel’s x86 chip architecture. Researchers in Belgium originally alerted Intel to this flaw, initially dubbed...

View Article


Image may be NSFW.
Clik here to view.

MY TAKE: Can ‘Network Traffic Analysis’ cure the security ills of digital...

If digital transformation, or DX , is to reach its full potential, there must be a security breakthrough that goes beyond legacy defenses to address the myriad new ways threat actors can insinuate...

View Article

Instagram Debuts New Security Tools

Updates include a new feature to verify the authenticity of popular accounts and a means of integrating two-factor authentication. Instagram today announced three security updates intended to drive...

View Article

NBN Co opens Melb biz centre to improve firms' network experience

NBN Co, the company rolling out Australia's national broadband network, the NBN, has opened a new business operations centre in Melbourne Docklands. The Thursday opening of the centre is "to improve...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images