Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

信息采集及泄露呈普遍趋势 用什么保护个人隐私安全

邵海鹏 以8个比特币(约人民币37万元)标价,就可以轻松获得1.3亿条酒店入住登记身份信息,和2.4亿条酒店开房记录。 这是8月28日爆出的华住集团旗下所有酒店用户数据被泄露的情况。截至目前,华住集团官方回应,已启动内部自查并报警。同时,上海警方已介入调查,表示将始终严厉打击非法获取、买卖、交换、提供公民个人信息等违法犯罪行为。...

View Article



Image may be NSFW.
Clik here to view.

Is Your Enterprise Ready for AI? A Look at Alexa for Business.

We all knew it would be just a matter of time before we went from saying “Alexa, what’s the temperature outside?” at home to “Alexa, start the conference call” at work. That’s right, enterprise AI...

View Article

Image may be NSFW.
Clik here to view.

A Short Introduction to Web Security Standards

As a web developer, every day you come across so many acronyms that it can be challenging to remember what they all mean. Have you ever seen acronyms like XSS , CSRF ? They are all the bad things that...

View Article

Australian BPO firm Onehalf leaves data exposed on GitHub

Australian business process outsourcing company Onehalf left medical information for hundreds of individuals and bank account numbers for several large Australian enterprises exposed in a set of...

View Article

Image may be NSFW.
Clik here to view.

Security camera catches speeding Tesla going airborne after hitting railroad...

Teslas are well known for their acceleration, but flying? A Canadian man caught some serious air after speeding over a railroad crossing in Barrie, Canada, on Tuesday at around 8 p.m. local time. A...

View Article


Image may be NSFW.
Clik here to view.

Instagram’s New Security Tools are a Welcome Step, But Not Enough

Instagramusers should soon have more secure options for protecting their accounts against Internet bad guys. On Tuesday, the Facebook -owned social network said it is in the process of rolling out...

View Article

Delphix adds data masking

The Delphix Dynamic Data Platform now includes data masking to allow the use of real data for development and testing without exposing sensitive information. Delphix Dynamic Data Platform provides a...

View Article

Image may be NSFW.
Clik here to view.

BUF早餐铺 | 研究人员在Windows任务管理器中发现零日漏洞;雅虎邮箱被爆大规模扫描用户 ...

各位 Buffer 早上好,今天是 2018 年 8 月 30 日星期四,农历七月二十。今天份的BUF早餐铺内容有: 2018年上半年无文件 / PowerShell恶意活动飙升至新高度; 研究人员在 windows 任务管理器中发现零日漏洞; 雅虎邮箱被爆大规模扫描用户邮件,将数据出售给广告商; 网络犯罪分子正以更隐蔽的方法攻击数字货币; 网络安全行业平均月薪上万,实际薪资高于预期。...

View Article


Image may be NSFW.
Clik here to view.

焦点分析 | 三六零日赚849万背后:网络安全巨头光环下的隐忧

核心提示: 网络安全依然是三六零维持高估值最重要的光环; 广告业务占比过重可能会冲淡三六零的“网络安全公司”定位; 在剥离企业安全后,三六零如何将安全业务有效变现是关键问题; 8月28日盘后,A、B两家公司先后公布2018年上半年财报: A公司营收71.09亿,同比增长26.05%,净利润33.46亿,同比增长32.14%,扣非后净利润28.18亿,同比增长33.69%;...

View Article


Image may be NSFW.
Clik here to view.

2018上半年网络安全观察报告

近年来,安全事件逐渐成为媒体的宠儿,尤其是个人信息泄露、银行资金窃取和IoT 设备的攻击利用事件 牵动着众人的眼球。在公众关注度方面,从近两年的百度指数就能看出,“个人信息泄露”和“黑客”等关键词的整体日均值都在历史中高位波动,网络安全和信息安全已经不仅仅是一个技术问题,而是关乎普罗大众的民生问题。 执行摘要 与此同时,安全厂商的视角也在慢慢变化。从RSA 近年的主题上看,2016...

View Article

Crypto Mining Attacks Soar in First Half of 2018

Malicious cryptomining attacks jumped 956 percent from the first half of 2017 to the first half of 2018, IT security firm Trend Micro reported Wednesday. In its latest Midyear Security Roundup , Trend...

View Article

A Zero Trust Manifesto

A Google search for “zero trust” returns ~ 195Million results. Pretty sure some are not necessarily related to access management and cyber security, but a few probably are. Zero Trust was a term...

View Article

The 4 Critical Building Blocks for Digital Threat Hunting

Having the right set of broad data is the linchpin to effective threat-hunting. There was a time when no one could predict the weather the only way you knew if a blizzard or heat wave was coming was by...

View Article


Image may be NSFW.
Clik here to view.

Beat the average price for this Ashampoo Software Bundle, or Pay What You Want

Today's highlighted deal comes via ourApps + Software section of theNeowin Deals store, where you can Pay What You Want for this Ashampoo Software Bundle . Supercharge your PC with this extensive app...

View Article

DuckDuckGo gets $10M from Omers for global privacy push

Pro-privacy search engine DuckDuckGo , which offers an alternative to surveillance engines like Google, has quietly picked up $10M in fresh funding from Canadian pension fund Omers’ VC arm. The Globe...

View Article


How Canonical is Improving Ubuntu Linux Security

Cryptojacking attacks have been increasingly prevalent in 2018, even finding their way into the Ubuntu linux software center. Mark Shuttleworth, the founder of Canonical and Ubuntu Linux, isn't too...

View Article

Improving security is top driver for ISO 27001

Improving information security is the biggest driver for implementing the ISO 27001 specification for an information security management system (ISMS), a survey shows. More than 70% of 120 global...

View Article


Image may be NSFW.
Clik here to view.

The Cyber Kill Chain: What You Need to Know

What is a Kill Chain? The term “kill chain” was originally used in the military. In October 1996, after the first Gulf War, General John Jumper formalized the methods necessary to compress the time it...

View Article

Image may be NSFW.
Clik here to view.

Telecommunications Industry in the Bullseye

New report cites higher volume and increased sophistication of threats to the sector. The telecommunications sector has been experiencing a heightened number of attacks from threat actors - both in...

View Article

如何成为一位 hacker

如何成为一位 hacker 怎么样才算是一位 Hacker ?? 在 Jargon File 有一堆关于 `hacker' 这个名词的定义, 大部份必须是技术上的行家或热衷于解决问题, 克服限制的人. 然而, 如果你想知道如何成为一位 hacker,有两件事是很有关连的. 这可以追溯到几十年前第一台 minicomputer 刚诞生, ARPAnet 实验也刚展开的时代....

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images