Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Does Publicly Shaming Companies Improve Security?

You might think security teams inside big companies hate it when researchers and the press point out vulnerabilities, but that’s not always the case. Security teams are just one voice among many, and...

View Article


Image may be NSFW.
Clik here to view.

Off-by-none: Issue #2

Serverless Security, yeah, that’s all I want from you Hey, Everyone! Welcome to Issue #2 of Off-by-none . Thanks so much for being here.:raised_hands: Last week we talked about the goal of Off-by-none...

View Article


Image may be NSFW.
Clik here to view.

保证网络安全 大唐风暴六类屏蔽模块MK10-6P促销

【 PConline江苏站 行情 】 大唐风暴 六类屏蔽模块MK10-6P是一款六类网络模块,搭配非屏蔽网线,适用于普通网络布置,能有效保证网络通信网络安全运行和灵活使用。 苏州超汇网络科技有限公司 目前最新售价 37 元,商家电话 17798596621 。 大唐风暴六类屏蔽模块MK10-6P产品概览表 报价信息 参考价(元): ¥37 现价(元) ¥37 之前报价(元): ¥37 升跌(元):...

View Article

Image may be NSFW.
Clik here to view.

The best security and privacy features in iOS 12 and macOS Mojave

September ishardware season, where we expect new iPhones, a new Apple Watch and more. But what makes the good stuff run is the software within. First revealed earlier this year at the company’s annual...

View Article

British Airways Hack Update: Caused by Injected Script & PCI DSS...

Details of how the hack was orchestrated have now come to light. In a blog post RiskIQ researchers have claimed to have found evidence that a web-based card skimmer script was injected into the BA...

View Article


Image may be NSFW.
Clik here to view.

Gruntwork Newsletter, September 2018

Once a month, we send out a newsletter to all Gruntwork customers that describes all the updates we’ve made in the last month, news in the DevOps industry, and important security updates. Note that...

View Article

Image may be NSFW.
Clik here to view.

You can now report phishing e-mails to ProtonMail to protect other users

Image via Person Centered Tech The encrypted e-mail service, ProtonMail, has just launched a new feature which allows users to report e-mails for phishing. The secure e-mail provider hopes to shore up...

View Article

IP Expo 2018

Join us at this year’s IP Expo Europe, October the 3 rd 4 th , at the Excel exhibition centre in London. Nuvias will be hosting a Solution Village, packed with some of our leading vendors, such as...

View Article


Image may be NSFW.
Clik here to view.

Malta Stock Exchange and Binance Join Forces In Launching Security Token...

According to a breaking post from the Malta Stock Exchange, the exchange’s digital asset and financial technology subsidiary MSX is now partnering up with the cryptocurrency exchange behemoth Binance...

View Article


Image may be NSFW.
Clik here to view.

Google Puts Your Internet Security at Risk by Hiding Subdomains

The Chrome 69 update brought with it a raft of changes. Most were positive and well received. There were one or two eye-raisers, though. For instance, Google has unilaterally decided to remove certain...

View Article

Image may be NSFW.
Clik here to view.

CamuBot malware, SonarSnoop hacking, and government backdoors

Taylor Armerding, Synopsys Software Integrity Group senior strategist, gives you the scoop on application security and insecurity in this week’s Security Mashup. CamuBot malware is the new kid on the...

View Article

Blockchain App Factory Moves into Security Token Offering Development (STO)

Blockchain App Factory, an end-to-end permissioned and crypto blockchain solutions company, is expanding its offering by launching Security Token and White-label Exchange Development services....

View Article

Twenty Years of Network Security Monitoring: From the AFCERT to Corelight

I am really fired up to join Corelight. I’ve had to keep my involvement with the team a secret since officially starting on July 20th. Why was I so excited about this company? Let me step backwards to...

View Article


Image may be NSFW.
Clik here to view.

What is Incident Response? A 6-Step Plan

“We don’t rise to the level of our expectations, we fall to the level of our training.” Archilochus Incident Response is the art of cleanup and recovery when you discover a cybersecurity breach. You...

View Article

Image may be NSFW.
Clik here to view.

Crypto Scams Eat Away More Than $2 Million in 2nd Quarter of 2018

The grim reports coming in from Kaspersky Labs, a Russia-based antivirus firm is that cybercriminals have been able to steal more than $2.3 million in the second quarter of 2018 and this has been done...

View Article


智慧城市建设与信息安全

习近平总书记指出,没有网络安全就没有国家安全,没有信息化就没有现代化。他高度概括了信息化与现代化、信息安全与国家安全的关系。信息化是一把双刃剑,带来很多便利的同时,也出现了很多安全问题,因此应当把信息安全提高到国家安全重要组成部分的高度。 信息安全的基本要求...

View Article

Security Evolution Is Not Good Enough. It’s Time for a Security Revolution!

“Worldwide spending on information security products and services will reach more than $114 billion in 2018, an increase of 12.4 percent from last year, according to the latest forecast from Gartner,...

View Article


Image may be NSFW.
Clik here to view.

ISC2018观察:以网络安全滑动标尺模型浅谈ISC

网络安全滑动标尺模型(The Sliding Scale of Cyber Security)是2015年美国系统网络安全协会(SANS)首次提出,将企业在应对外部攻击时的五个信息安全能力阶段,分别是架构建设、被动防御、积极防御、威胁 情报以及 进攻反制(略 ) 。 安全 能力的构建离不开 产品 的支撑,结合本次 会议 的论坛、展厅等内容, 试图 从 网络 安全滑动标尺模型的角度 尝试着...

View Article

Security Gets ‘Baked In’ at VMworld

Another VMworld has come and gone, but the latest one was distinctly different from its predecessors―and I’m not talking about the presence of “The Mountain” from “Game of Thrones” in the Druva booth....

View Article

6 ways to outperform the Competition with Connected Products

With more and more organizations using the Internet of Things (IoT) to connect devices, systems, physical objects, and data, how do you ensure that your investment in connected products really does...

View Article
Browsing all 12749 articles
Browse latest View live