信息采集及泄露呈普遍趋势 用什么保护个人隐私安全
邵海鹏 以8个比特币(约人民币37万元)标价,就可以轻松获得1.3亿条酒店入住登记身份信息,和2.4亿条酒店开房记录。 这是8月28日爆出的华住集团旗下所有酒店用户数据被泄露的情况。截至目前,华住集团官方回应,已启动内部自查并报警。同时,上海警方已介入调查,表示将始终严厉打击非法获取、买卖、交换、提供公民个人信息等违法犯罪行为。...
View ArticleIs Your Enterprise Ready for AI? A Look at Alexa for Business.
We all knew it would be just a matter of time before we went from saying “Alexa, what’s the temperature outside?” at home to “Alexa, start the conference call” at work. That’s right, enterprise AI...
View ArticleA Short Introduction to Web Security Standards
As a web developer, every day you come across so many acronyms that it can be challenging to remember what they all mean. Have you ever seen acronyms like XSS , CSRF ? They are all the bad things that...
View ArticleAustralian BPO firm Onehalf leaves data exposed on GitHub
Australian business process outsourcing company Onehalf left medical information for hundreds of individuals and bank account numbers for several large Australian enterprises exposed in a set of...
View ArticleSecurity camera catches speeding Tesla going airborne after hitting railroad...
Teslas are well known for their acceleration, but flying? A Canadian man caught some serious air after speeding over a railroad crossing in Barrie, Canada, on Tuesday at around 8 p.m. local time. A...
View ArticleInstagram’s New Security Tools are a Welcome Step, But Not Enough
Instagramusers should soon have more secure options for protecting their accounts against Internet bad guys. On Tuesday, the Facebook -owned social network said it is in the process of rolling out...
View ArticleDelphix adds data masking
The Delphix Dynamic Data Platform now includes data masking to allow the use of real data for development and testing without exposing sensitive information. Delphix Dynamic Data Platform provides a...
View ArticleBUF早餐铺 | 研究人员在Windows任务管理器中发现零日漏洞;雅虎邮箱被爆大规模扫描用户 ...
各位 Buffer 早上好,今天是 2018 年 8 月 30 日星期四,农历七月二十。今天份的BUF早餐铺内容有: 2018年上半年无文件 / PowerShell恶意活动飙升至新高度; 研究人员在 windows 任务管理器中发现零日漏洞; 雅虎邮箱被爆大规模扫描用户邮件,将数据出售给广告商; 网络犯罪分子正以更隐蔽的方法攻击数字货币; 网络安全行业平均月薪上万,实际薪资高于预期。...
View Article焦点分析 | 三六零日赚849万背后:网络安全巨头光环下的隐忧
核心提示: 网络安全依然是三六零维持高估值最重要的光环; 广告业务占比过重可能会冲淡三六零的“网络安全公司”定位; 在剥离企业安全后,三六零如何将安全业务有效变现是关键问题; 8月28日盘后,A、B两家公司先后公布2018年上半年财报: A公司营收71.09亿,同比增长26.05%,净利润33.46亿,同比增长32.14%,扣非后净利润28.18亿,同比增长33.69%;...
View Article2018上半年网络安全观察报告
近年来,安全事件逐渐成为媒体的宠儿,尤其是个人信息泄露、银行资金窃取和IoT 设备的攻击利用事件 牵动着众人的眼球。在公众关注度方面,从近两年的百度指数就能看出,“个人信息泄露”和“黑客”等关键词的整体日均值都在历史中高位波动,网络安全和信息安全已经不仅仅是一个技术问题,而是关乎普罗大众的民生问题。 执行摘要 与此同时,安全厂商的视角也在慢慢变化。从RSA 近年的主题上看,2016...
View ArticleCrypto Mining Attacks Soar in First Half of 2018
Malicious cryptomining attacks jumped 956 percent from the first half of 2017 to the first half of 2018, IT security firm Trend Micro reported Wednesday. In its latest Midyear Security Roundup , Trend...
View ArticleA Zero Trust Manifesto
A Google search for “zero trust” returns ~ 195Million results. Pretty sure some are not necessarily related to access management and cyber security, but a few probably are. Zero Trust was a term...
View ArticleThe 4 Critical Building Blocks for Digital Threat Hunting
Having the right set of broad data is the linchpin to effective threat-hunting. There was a time when no one could predict the weather the only way you knew if a blizzard or heat wave was coming was by...
View ArticleBeat the average price for this Ashampoo Software Bundle, or Pay What You Want
Today's highlighted deal comes via ourApps + Software section of theNeowin Deals store, where you can Pay What You Want for this Ashampoo Software Bundle . Supercharge your PC with this extensive app...
View ArticleDuckDuckGo gets $10M from Omers for global privacy push
Pro-privacy search engine DuckDuckGo , which offers an alternative to surveillance engines like Google, has quietly picked up $10M in fresh funding from Canadian pension fund Omers’ VC arm. The Globe...
View ArticleHow Canonical is Improving Ubuntu Linux Security
Cryptojacking attacks have been increasingly prevalent in 2018, even finding their way into the Ubuntu linux software center. Mark Shuttleworth, the founder of Canonical and Ubuntu Linux, isn't too...
View ArticleImproving security is top driver for ISO 27001
Improving information security is the biggest driver for implementing the ISO 27001 specification for an information security management system (ISMS), a survey shows. More than 70% of 120 global...
View ArticleThe Cyber Kill Chain: What You Need to Know
What is a Kill Chain? The term “kill chain” was originally used in the military. In October 1996, after the first Gulf War, General John Jumper formalized the methods necessary to compress the time it...
View ArticleTelecommunications Industry in the Bullseye
New report cites higher volume and increased sophistication of threats to the sector. The telecommunications sector has been experiencing a heightened number of attacks from threat actors - both in...
View Article如何成为一位 hacker
如何成为一位 hacker 怎么样才算是一位 Hacker ?? 在 Jargon File 有一堆关于 `hacker' 这个名词的定义, 大部份必须是技术上的行家或热衷于解决问题, 克服限制的人. 然而, 如果你想知道如何成为一位 hacker,有两件事是很有关连的. 这可以追溯到几十年前第一台 minicomputer 刚诞生, ARPAnet 实验也刚展开的时代....
View Article